Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ne7qNMCeuy.exe

Overview

General Information

Sample name:Ne7qNMCeuy.exe
renamed because original name is a hash value
Original sample name:884b2dca156a08177d0b717955790255b3504f9113f72827f6766faa563e5398.exe
Analysis ID:1563003
MD5:67e493d4df06f65cfb94bf984ef60720
SHA1:2db550dc9833b9b9b65108f43bf4cbe9f75f1ab3
SHA256:884b2dca156a08177d0b717955790255b3504f9113f72827f6766faa563e5398
Tags:148-135-121-165exeuser-JAMESWT_MHT
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains long sleeps (>= 3 min)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • Ne7qNMCeuy.exe (PID: 2544 cmdline: "C:\Users\user\Desktop\Ne7qNMCeuy.exe" MD5: 67E493D4DF06F65CFB94BF984EF60720)
    • conhost.exe (PID: 5396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Ne7qNMCeuy.exeReversingLabs: Detection: 26%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.7% probability
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.6:49707 version: TLS 1.2
Source: Ne7qNMCeuy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Ne7qNMCeuy.exe
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Ne7qNMCeuy.exe
Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: global trafficHTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165
Source: Ne7qNMCeuy.exe, 00000000.00000003.2749064237.000001692B7CF000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975277938.000001692B7D4000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2749100418.000001692B7D4000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148697121.000001692B7CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/
Source: Ne7qNMCeuy.exe, 00000000.00000003.2749199611.000001692B7C5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975277938.000001692B7C5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748931357.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148578026.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748999347.000001692B7F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3
Source: Ne7qNMCeuy.exe, 00000000.00000003.2749242586.000001692B7FC000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748931357.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148578026.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748999347.000001692B7F9000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975404596.000001692B7FC000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2749013744.000001692B7FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.6:49707 version: TLS 1.2
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF7620E11C00_2_00007FF7620E11C0
Source: classification engineClassification label: mal52.winEXE@2/0@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5396:120:WilError_03
Source: Ne7qNMCeuy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Ne7qNMCeuy.exeReversingLabs: Detection: 26%
Source: unknownProcess created: C:\Users\user\Desktop\Ne7qNMCeuy.exe "C:\Users\user\Desktop\Ne7qNMCeuy.exe"
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: dpapi.dllJump to behavior
Source: Ne7qNMCeuy.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Ne7qNMCeuy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Ne7qNMCeuy.exe
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Ne7qNMCeuy.exe
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe TID: 4152Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe TID: 4180Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: Ne7qNMCeuy.exe, 00000000.00000003.2749199611.000001692B7B8000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975277938.000001692B7BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: Ne7qNMCeuy.exe, 00000000.00000002.3975404596.000001692B80D000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148578026.000001692B808000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748972438.000001692B808000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2749228085.000001692B80A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF7620E2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7620E2098
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF7620E223C SetUnhandledExceptionFilter,0_2_00007FF7620E223C
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF7620E1B6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7620E1B6C
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF7620E2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7620E2098
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF7620E1F70 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7620E1F70
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Ne7qNMCeuy.exe26%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://148.135.121.165/0%Avira URL Cloudsafe
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac0%Avira URL Cloudsafe
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3false
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://148.135.121.165/Ne7qNMCeuy.exe, 00000000.00000003.2749064237.000001692B7CF000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975277938.000001692B7D4000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2749100418.000001692B7D4000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148697121.000001692B7CE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeacNe7qNMCeuy.exe, 00000000.00000003.2749242586.000001692B7FC000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748931357.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2148578026.000001692B7F5000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2748999347.000001692B7F9000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3975404596.000001692B7FC000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2749013744.000001692B7FB000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
148.135.121.165
unknownSweden
158ERI-ASUSfalse
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1563003
Start date and time:2024-11-26 11:41:41 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 57s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Ne7qNMCeuy.exe
renamed because original name is a hash value
Original Sample Name:884b2dca156a08177d0b717955790255b3504f9113f72827f6766faa563e5398.exe
Detection:MAL
Classification:mal52.winEXE@2/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: Ne7qNMCeuy.exe
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
148.135.121.165BjLxqVU7m4.dllGet hashmaliciousUnknownBrowse
    Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ERI-ASUSBjLxqVU7m4.dllGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      la.bot.sh4.elfGet hashmaliciousUnknownBrowse
      • 150.132.118.42
      loligang.ppc.elfGet hashmaliciousMiraiBrowse
      • 147.214.206.40
      apep.x86.elfGet hashmaliciousMiraiBrowse
      • 131.168.79.136
      zgp.elfGet hashmaliciousMiraiBrowse
      • 148.135.186.71
      arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 169.144.189.36
      x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 129.200.252.43
      arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 169.144.206.208
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      72a589da586844d7f0818ce684948eeaBjLxqVU7m4.dllGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      LgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      file.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      No context
      No created / dropped files found
      File type:PE32+ executable (console) x86-64, for MS Windows
      Entropy (8bit):4.672068713963183
      TrID:
      • Win64 Executable Console (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:Ne7qNMCeuy.exe
      File size:18'232 bytes
      MD5:67e493d4df06f65cfb94bf984ef60720
      SHA1:2db550dc9833b9b9b65108f43bf4cbe9f75f1ab3
      SHA256:884b2dca156a08177d0b717955790255b3504f9113f72827f6766faa563e5398
      SHA512:d86d038d85b889bfa696fd2e95f436ae8799f0840815fa651f6715e2550fed00851397684ed2f2d1165571eafd796f5182219ddce6f35fae792c5cbfcc757c74
      SSDEEP:192:MHocDdqWYMmKeObo0eZSC+SrvfTtt+pkSv56t+E3Q5XfMcQu:MHocRqRy+KSrvfBt05B6tP3/u
      TLSH:08821A4AAB564DE9D436C13DC573492BE5B2B1105722DBCF63908A2E1EB73C0BC36E46
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......mse.)...)...)... j..#...9...*...9...#...9...2...9.../...bj..,...).......b...(...b...(...b...(...Rich)...........PE..d...+%2g...
      Icon Hash:00928e8e8686b000
      Entrypoint:0x140001b58
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x6732252B [Mon Nov 11 15:39:23 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:cc3f5f44573b1ef710307611a33ec304
      Instruction
      dec eax
      sub esp, 28h
      call 00007F763C80DDF4h
      dec eax
      add esp, 28h
      jmp 00007F763C80D857h
      int3
      int3
      inc eax
      push ebx
      dec eax
      sub esp, 20h
      dec eax
      mov ebx, ecx
      xor ecx, ecx
      call dword ptr [000014A3h]
      dec eax
      mov ecx, ebx
      call dword ptr [00001492h]
      call dword ptr [0000149Ch]
      dec eax
      mov ecx, eax
      mov edx, C0000409h
      dec eax
      add esp, 20h
      pop ebx
      dec eax
      jmp dword ptr [00001490h]
      dec eax
      mov dword ptr [esp+08h], ecx
      dec eax
      sub esp, 38h
      mov ecx, 00000017h
      call dword ptr [00001484h]
      test eax, eax
      je 00007F763C80D9E9h
      mov ecx, 00000002h
      int 29h
      dec eax
      lea ecx, dword ptr [000035FAh]
      call 00007F763C80DA8Eh
      dec eax
      mov eax, dword ptr [esp+38h]
      dec eax
      mov dword ptr [000036E1h], eax
      dec eax
      lea eax, dword ptr [esp+38h]
      dec eax
      add eax, 08h
      dec eax
      mov dword ptr [00003671h], eax
      dec eax
      mov eax, dword ptr [000036CAh]
      dec eax
      mov dword ptr [0000353Bh], eax
      dec eax
      mov eax, dword ptr [esp+40h]
      dec eax
      mov dword ptr [0000363Fh], eax
      mov dword ptr [00003515h], C0000409h
      mov dword ptr [0000350Fh], 00000001h
      mov dword ptr [00003519h], 00000001h
      Programming Language:
      • [IMP] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x3f8c0xdc.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x1e0.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x240.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x58.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x36200x70.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34e00x140.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x30000x258.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x18620x1a003272278371367b7d4aee9475cbb796b4False0.6045673076923077data5.950501702710063IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x30000x18dc0x1a008f7a1294d8cd43ac7ee0f20424ca46d4False0.37259615384615385data3.9662390155216176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x50000x7200x200144ab6bfe6bb39ce984c043b4aeb0c6fFalse0.23046875data2.0665233777045033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x60000x2400x4008646266eb1c41a7986c2e9ef88849c46False0.3115234375data2.449887087720597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x70000x1e00x2000b35de07beeb30d1d6013cbca2846303False0.525390625data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x80000x580x2000433091c18d69714fe1dcae46953db17False0.19921875data1.1833113271125035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x70600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
      DLLImport
      KERNEL32.dllSleep, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, RtlCaptureContext
      MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z
      WINHTTP.dllWinHttpReadData, WinHttpReceiveResponse, WinHttpOpenRequest, WinHttpQueryDataAvailable, WinHttpOpen, WinHttpAddRequestHeaders, WinHttpCloseHandle, WinHttpSendRequest, WinHttpSetOption, WinHttpConnect
      VCRUNTIME140_1.dll__CxxFrameHandler4
      VCRUNTIME140.dll_CxxThrowException, __current_exception, __current_exception_context, memset, __std_exception_destroy, memchr, memcpy, __C_specific_handler, __std_exception_copy, memmove
      api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment, terminate, _c_exit, _cexit, _register_onexit_function, _set_app_type, _seh_filter_exe, _initialize_onexit_table, _invalid_parameter_noinfo_noreturn, __p___argv, __p___argc, _exit, _register_thread_local_exe_atexit_callback, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _crt_atexit, _configure_narrow_argv
      api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, free, _callnewh, malloc
      api-ms-win-crt-math-l1-1-0.dll__setusermatherr
      api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
      api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Nov 26, 2024 11:42:35.194554090 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:35.194628000 CET44349707148.135.121.165192.168.2.6
      Nov 26, 2024 11:42:35.194694996 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:35.202482939 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:35.202536106 CET44349707148.135.121.165192.168.2.6
      Nov 26, 2024 11:42:36.544671059 CET44349707148.135.121.165192.168.2.6
      Nov 26, 2024 11:42:36.544857025 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:36.562695026 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:36.562783957 CET44349707148.135.121.165192.168.2.6
      Nov 26, 2024 11:42:36.563040018 CET44349707148.135.121.165192.168.2.6
      Nov 26, 2024 11:42:36.616832972 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:36.934273005 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:36.975347042 CET44349707148.135.121.165192.168.2.6
      Nov 26, 2024 11:42:37.311460972 CET44349707148.135.121.165192.168.2.6
      Nov 26, 2024 11:42:37.311544895 CET44349707148.135.121.165192.168.2.6
      Nov 26, 2024 11:42:37.311623096 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:37.312454939 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:37.312477112 CET44349707148.135.121.165192.168.2.6
      Nov 26, 2024 11:42:37.312496901 CET49707443192.168.2.6148.135.121.165
      Nov 26, 2024 11:42:37.312503099 CET44349707148.135.121.165192.168.2.6
      • 148.135.121.165
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.649707148.135.121.1654432544C:\Users\user\Desktop\Ne7qNMCeuy.exe
      TimestampBytes transferredDirectionData
      2024-11-26 10:42:36 UTC194OUTGET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1
      Connection: Keep-Alive
      Content-Type: text/plain
      User-Agent: HCMUS-CTF Botnet
      Host: 148.135.121.165
      2024-11-26 10:42:37 UTC192INHTTP/1.1 200 OK
      Server: nginx/1.18.0 (Ubuntu)
      Date: Tue, 26 Nov 2024 10:42:37 GMT
      Content-Type: application/octet-stream
      Content-Length: 93
      Connection: close
      Content-Type: text/plain
      2024-11-26 10:42:37 UTC93INData Raw: 54 68 69 73 20 69 73 20 61 20 66 61 6b 65 20 43 32 20 73 65 72 76 65 72 20 74 68 61 74 20 67 69 76 65 73 20 79 6f 75 20 74 68 65 20 66 6c 61 67 2e 20 48 65 72 65 20 79 6f 75 20 67 6f 3a 20 48 43 4d 55 53 2d 43 54 46 7b 63 34 74 63 48 2d 6d 33 2d 31 66 2d 7c 5f 7c 2d 63 34 4e 7d
      Data Ascii: This is a fake C2 server that gives you the flag. Here you go: HCMUS-CTF{c4tcH-m3-1f-|_|-c4N}


      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:05:42:34
      Start date:26/11/2024
      Path:C:\Users\user\Desktop\Ne7qNMCeuy.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\Ne7qNMCeuy.exe"
      Imagebase:0x7ff7620e0000
      File size:18'232 bytes
      MD5 hash:67E493D4DF06F65CFB94BF984EF60720
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:1
      Start time:05:42:34
      Start date:26/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff66e660000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:22.1%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:21%
        Total number of Nodes:143
        Total number of Limit Nodes:1
        execution_graph 596 7ff7620e10b0 __std_exception_destroy 597 7ff7620e27f0 598 7ff7620e2803 597->598 599 7ff7620e2810 597->599 601 7ff7620e1660 598->601 602 7ff7620e1673 601->602 603 7ff7620e169f 601->603 604 7ff7620e1697 602->604 605 7ff7620e16b8 _invalid_parameter_noinfo_noreturn 602->605 603->599 606 7ff7620e1880 free 604->606 606->603 607 7ff7620e282c _seh_filter_exe 608 7ff7620e18cc 609 7ff7620e18e4 608->609 610 7ff7620e18ee 608->610 611 7ff7620e1880 free 609->611 611->610 612 7ff7620e1b0a 613 7ff7620e21e8 GetModuleHandleW 612->613 614 7ff7620e1b11 613->614 615 7ff7620e1b15 614->615 616 7ff7620e1b50 _exit 614->616 617 7ff7620e19c0 621 7ff7620e223c SetUnhandledExceptionFilter 617->621 622 7ff7620e26c0 623 7ff7620e26f8 __GSHandlerCheckCommon 622->623 624 7ff7620e2724 623->624 625 7ff7620e2713 __CxxFrameHandler4 623->625 625->624 626 7ff7620e1060 __std_exception_destroy 627 7ff7620e1095 626->627 628 7ff7620e1088 626->628 629 7ff7620e1880 free 628->629 629->627 631 7ff7620e1000 __std_exception_copy 482 7ff7620e19dc 483 7ff7620e19f5 482->483 484 7ff7620e1b33 483->484 485 7ff7620e19fd 483->485 521 7ff7620e2098 IsProcessorFeaturePresent 484->521 487 7ff7620e1b3d 485->487 492 7ff7620e1a1b __scrt_release_startup_lock 485->492 488 7ff7620e2098 9 API calls 487->488 489 7ff7620e1b48 488->489 491 7ff7620e1b50 _exit 489->491 490 7ff7620e1a40 492->490 493 7ff7620e1ac6 _get_initial_narrow_environment __p___argv __p___argc 492->493 497 7ff7620e1abe _register_thread_local_exe_atexit_callback 492->497 502 7ff7620e1440 493->502 497->493 499 7ff7620e1af3 500 7ff7620e1afd 499->500 501 7ff7620e1af8 _cexit 499->501 500->490 501->500 506 7ff7620e14a0 502->506 504 7ff7620e1576 memchr 505 7ff7620e15d5 Sleep 504->505 504->506 505->506 506->504 506->505 507 7ff7620e15e5 _invalid_parameter_noinfo_noreturn 506->507 508 7ff7620e1880 free 506->508 509 7ff7620e15a0 memchr 506->509 510 7ff7620e15ec SleepEx 506->510 527 7ff7620e11c0 WinHttpOpen 506->527 507->510 508->506 509->506 511 7ff7620e15bc Sleep 509->511 512 7ff7620e1632 510->512 513 7ff7620e15fe 510->513 511->506 551 7ff7620e1860 512->551 514 7ff7620e162a 513->514 517 7ff7620e1623 _invalid_parameter_noinfo_noreturn 513->517 548 7ff7620e1880 514->548 517->514 519 7ff7620e21e8 GetModuleHandleW 520 7ff7620e1aef 519->520 520->489 520->499 522 7ff7620e20be 521->522 523 7ff7620e20cc memset RtlCaptureContext RtlLookupFunctionEntry 522->523 524 7ff7620e2106 RtlVirtualUnwind 523->524 525 7ff7620e2142 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 523->525 524->525 526 7ff7620e21c2 525->526 526->487 528 7ff7620e1295 WinHttpSetOption 527->528 529 7ff7620e1245 WinHttpConnect 527->529 531 7ff7620e12bf WinHttpAddRequestHeaders WinHttpSendRequest 528->531 532 7ff7620e13eb 528->532 529->528 530 7ff7620e1266 WinHttpOpenRequest 529->530 530->528 533 7ff7620e1303 WinHttpReceiveResponse 531->533 534 7ff7620e13e2 WinHttpCloseHandle 531->534 535 7ff7620e13f0 WinHttpCloseHandle 532->535 536 7ff7620e13f9 532->536 533->534 545 7ff7620e1316 533->545 534->532 535->536 537 7ff7620e13fe WinHttpCloseHandle 536->537 538 7ff7620e1407 536->538 537->538 540 7ff7620e1860 8 API calls 538->540 539 7ff7620e1320 WinHttpQueryDataAvailable 560 7ff7620e18c4 539->560 542 7ff7620e1417 540->542 542->506 544 7ff7620e1880 free 544->545 545->534 545->539 545->544 545->545 546 7ff7620e13a4 memcpy 545->546 567 7ff7620e16c0 545->567 546->545 549 7ff7620e1ce8 free 548->549 552 7ff7620e1869 551->552 553 7ff7620e1641 552->553 554 7ff7620e1ba0 IsProcessorFeaturePresent 552->554 553->519 555 7ff7620e1bb8 554->555 591 7ff7620e1c74 RtlCaptureContext 555->591 564 7ff7620e1888 malloc 560->564 562 7ff7620e1893 562->560 562->564 583 7ff7620e1d10 562->583 586 7ff7620e1100 562->586 563 7ff7620e133e memset WinHttpReadData 563->545 564->562 564->563 568 7ff7620e1843 567->568 571 7ff7620e16ee 567->571 590 7ff7620e11a0 ?_Xlength_error@std@@YAXPEBD 568->590 570 7ff7620e1848 572 7ff7620e1100 Concurrency::cancel_current_task __std_exception_copy 570->572 571->570 573 7ff7620e173e 571->573 575 7ff7620e184e 572->575 574 7ff7620e17fc _invalid_parameter_noinfo_noreturn 573->574 576 7ff7620e1803 573->576 577 7ff7620e17af memcpy memcpy 573->577 574->576 580 7ff7620e180b memcpy 576->580 578 7ff7620e17ef 577->578 579 7ff7620e17da 577->579 581 7ff7620e1880 free 578->581 579->574 579->578 582 7ff7620e17fa 580->582 581->582 582->545 589 7ff7620e1cf0 583->589 585 7ff7620e1d1e _CxxThrowException 587 7ff7620e110e Concurrency::cancel_current_task 586->587 588 7ff7620e111f __std_exception_copy 587->588 588->562 589->585 592 7ff7620e1c8e RtlLookupFunctionEntry 591->592 593 7ff7620e1ca4 RtlVirtualUnwind 592->593 594 7ff7620e1bcb 592->594 593->592 593->594 595 7ff7620e1b6c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 594->595 632 7ff7620e1b58 635 7ff7620e1f70 632->635 636 7ff7620e1f93 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 635->636 637 7ff7620e1b61 635->637 636->637 638 7ff7620e18f8 639 7ff7620e1908 638->639 651 7ff7620e1da8 639->651 641 7ff7620e2098 9 API calls 642 7ff7620e19ad 641->642 643 7ff7620e192c _RTC_Initialize 649 7ff7620e198f 643->649 659 7ff7620e2030 InitializeSListHead 643->659 649->641 650 7ff7620e199d 649->650 652 7ff7620e1db9 651->652 656 7ff7620e1deb 651->656 653 7ff7620e1e28 652->653 657 7ff7620e1dbe __scrt_release_startup_lock 652->657 654 7ff7620e2098 9 API calls 653->654 655 7ff7620e1e32 654->655 656->643 657->656 658 7ff7620e1ddb _initialize_onexit_table 657->658 658->656

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_00007FF7620E1E34 1 Function_00007FF7620E1D30 42 Function_00007FF7620E25EC 1->42 2 Function_00007FF7620E2030 3 Function_00007FF7620E10B0 4 Function_00007FF7620E282C 5 Function_00007FF7620E2028 6 Function_00007FF7620E1DA8 14 Function_00007FF7620E2098 6->14 6->42 7 Function_00007FF7620E22A8 8 Function_00007FF7620E2020 9 Function_00007FF7620E2320 10 Function_00007FF7620E2820 11 Function_00007FF7620E11A0 12 Function_00007FF7620E201C 13 Function_00007FF7620E1F1C 53 Function_00007FF7620E2090 14->53 15 Function_00007FF7620E2050 16 Function_00007FF7620E10D0 17 Function_00007FF7620E224C 18 Function_00007FF7620E1ECC 18->42 19 Function_00007FF7620E18CC 58 Function_00007FF7620E1880 19->58 20 Function_00007FF7620E2048 21 Function_00007FF7620E284A 22 Function_00007FF7620E2044 23 Function_00007FF7620E18C4 54 Function_00007FF7620E1D10 23->54 59 Function_00007FF7620E1100 23->59 24 Function_00007FF7620E1EC5 25 Function_00007FF7620E1040 26 Function_00007FF7620E2040 27 Function_00007FF7620E2740 28 Function_00007FF7620E11C0 28->23 31 Function_00007FF7620E16C0 28->31 47 Function_00007FF7620E1860 28->47 28->58 29 Function_00007FF7620E1440 29->28 29->47 29->58 30 Function_00007FF7620E19C0 30->12 33 Function_00007FF7620E223C 30->33 31->11 31->58 31->59 32 Function_00007FF7620E26C0 32->27 34 Function_00007FF7620E1C74 35 Function_00007FF7620E2074 36 Function_00007FF7620E1F70 37 Function_00007FF7620E1CF0 38 Function_00007FF7620E1EF0 38->26 39 Function_00007FF7620E27F0 48 Function_00007FF7620E1660 39->48 40 Function_00007FF7620E1B6C 41 Function_00007FF7620E1D6C 41->9 41->26 43 Function_00007FF7620E21E8 44 Function_00007FF7620E22E4 45 Function_00007FF7620E1060 45->58 46 Function_00007FF7620E1160 47->34 47->40 48->58 49 Function_00007FF7620E19DC 49->0 49->1 49->14 49->18 49->29 49->38 49->41 49->43 55 Function_00007FF7620E2088 49->55 57 Function_00007FF7620E2080 49->57 50 Function_00007FF7620E1F58 50->13 51 Function_00007FF7620E2058 51->15 51->20 52 Function_00007FF7620E1B58 52->36 54->37 56 Function_00007FF7620E1B0A 56->43 59->16 60 Function_00007FF7620E1000 61 Function_00007FF7620E18F8 61->2 61->5 61->6 61->7 61->8 61->12 61->14 61->22 61->26 61->35 61->50 61->51

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3975574699.00007FF7620E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7620E0000, based on PE: true
        • Associated: 00000000.00000002.3975560677.00007FF7620E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975588024.00007FF7620E3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975601670.00007FF7620E5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975615215.00007FF7620E6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7620e0000_Ne7qNMCeuy.jbxd
        Similarity
        • API ID: Http$CloseHandleRequest$DataOpen$AvailableConnectHeadersOptionQueryReadReceiveResponseSendmemcpymemset
        • String ID: /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3$148.135.121.165$Content-Type: text/plain$GET$HCMUS-CTF Botnet
        • API String ID: 1954243361-2234560942
        • Opcode ID: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
        • Instruction ID: 120b9c721facec3fe2f8b460d2fd957ae2995aa80ed667028535a96af45f18ea
        • Opcode Fuzzy Hash: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
        • Instruction Fuzzy Hash: 7E618125A08785D6EF90EF22A4446BAB790FB48B94F844139DE9D07B60DFBCD485C710

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3975574699.00007FF7620E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7620E0000, based on PE: true
        • Associated: 00000000.00000002.3975560677.00007FF7620E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975588024.00007FF7620E3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975601670.00007FF7620E5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975615215.00007FF7620E6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7620e0000_Ne7qNMCeuy.jbxd
        Similarity
        • API ID: Http$RequestSleep$DataOpen_invalid_parameter_noinfo_noreturnmemchr$AvailableConnectHeadersOptionQueryReadReceiveResponseSendmemset
        • String ID: HCMUS-CT
        • API String ID: 2434495133-4159949832
        • Opcode ID: 75995823342e5f479ed89da7937418d5bb3199919cb7ecf33f74943161ac90b3
        • Instruction ID: c7ebdf85ae7485bd427872865baeb1f0062f667d091224a1432207cc6f60c53d
        • Opcode Fuzzy Hash: 75995823342e5f479ed89da7937418d5bb3199919cb7ecf33f74943161ac90b3
        • Instruction Fuzzy Hash: AA51C162E18785D2EE94AB2595043ACE362AB457E0F954331EABD03BD5DFBCE8C0C310

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3975574699.00007FF7620E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7620E0000, based on PE: true
        • Associated: 00000000.00000002.3975560677.00007FF7620E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975588024.00007FF7620E3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975601670.00007FF7620E5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975615215.00007FF7620E6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7620e0000_Ne7qNMCeuy.jbxd
        Similarity
        • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
        • String ID:
        • API String ID: 1328870896-0
        • Opcode ID: 34205a4456bb8f744d28daca5d74241deeb67255457b9eb5234a8feeb582f312
        • Instruction ID: d30cab0949ae01a01fb6cb7b09c5c6f6888de27fd7e798e0d0ec5e19690fda86
        • Opcode Fuzzy Hash: 34205a4456bb8f744d28daca5d74241deeb67255457b9eb5234a8feeb582f312
        • Instruction Fuzzy Hash: EC312921A0814FE6EE94BB2494113B9E291AF85784FC84539E9DD076E7DEECACC4C270

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3975574699.00007FF7620E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7620E0000, based on PE: true
        • Associated: 00000000.00000002.3975560677.00007FF7620E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975588024.00007FF7620E3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975601670.00007FF7620E5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975615215.00007FF7620E6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7620e0000_Ne7qNMCeuy.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
        • String ID:
        • API String ID: 313767242-0
        • Opcode ID: 70127c65dbb65fcc678ebc04994dd07b7d6ce4f23746a00d0cd93d4de428bf81
        • Instruction ID: a58fbc1ffcff0e87775daf6c0ae0723afd05d463e8fae2c9c97a70da343a3a18
        • Opcode Fuzzy Hash: 70127c65dbb65fcc678ebc04994dd07b7d6ce4f23746a00d0cd93d4de428bf81
        • Instruction Fuzzy Hash: E5311072A05B85D9EBA09F60E8503FDB760F784744F44443ADA8D47B99DF78D688C720

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3975574699.00007FF7620E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7620E0000, based on PE: true
        • Associated: 00000000.00000002.3975560677.00007FF7620E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975588024.00007FF7620E3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975601670.00007FF7620E5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975615215.00007FF7620E6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7620e0000_Ne7qNMCeuy.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: 9d677862f94bbf438b6af7ca56c0fb3e7aeb705d45f25b37a36768f31ef9442e
        • Instruction ID: 2b24313eecaeda75cc0641b1032fd96f5512a7d1a7bbdf4dfa91161798c0455a
        • Opcode Fuzzy Hash: 9d677862f94bbf438b6af7ca56c0fb3e7aeb705d45f25b37a36768f31ef9442e
        • Instruction Fuzzy Hash: E1111C26B14B05DAEF40DB60E8543B877A4FB19758F840E31EAAD467A4DFBCD298C350
        Memory Dump Source
        • Source File: 00000000.00000002.3975574699.00007FF7620E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7620E0000, based on PE: true
        • Associated: 00000000.00000002.3975560677.00007FF7620E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975588024.00007FF7620E3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975601670.00007FF7620E5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975615215.00007FF7620E6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7620e0000_Ne7qNMCeuy.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2b693434f938f5f99c1aa01dec3e4834eb247ea5cf64080b7bcdac2271f85257
        • Instruction ID: fa881c2228251d9d3e6b9f3c8bcaf26e0f0f9bc08b0f0015c0a540b9630a9210
        • Opcode Fuzzy Hash: 2b693434f938f5f99c1aa01dec3e4834eb247ea5cf64080b7bcdac2271f85257
        • Instruction Fuzzy Hash: F0A00121D0990AF4EA88AB04A864571A620EB58300B804075C09D414719EACA580C320

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3975574699.00007FF7620E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7620E0000, based on PE: true
        • Associated: 00000000.00000002.3975560677.00007FF7620E0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975588024.00007FF7620E3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975601670.00007FF7620E5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3975615215.00007FF7620E6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7620e0000_Ne7qNMCeuy.jbxd
        Similarity
        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
        • String ID:
        • API String ID: 1775671525-0
        • Opcode ID: 2c71489f02de5e234a46f037b57d54b9cac513202be81fedc4cee65fbf92f26f
        • Instruction ID: cf52db53d163c2ebe645d4eb84f633b243c2c7731a29cc37236370f3c7327520
        • Opcode Fuzzy Hash: 2c71489f02de5e234a46f037b57d54b9cac513202be81fedc4cee65fbf92f26f
        • Instruction Fuzzy Hash: 6841D362B0864AE5EE64AB1295053ADE361FB48FD0FD80635DEED07B85DEBCD481C320