Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1563920
MD5:3273f078f87cebc3b06e9202e3902b5c
SHA1:03b1971e04c8e67a32f38446bd8bfac41825f9cc
SHA256:4b6caa8467cf7ca3d7a3d3b2ac70e48510b7c4570e4810f3305aca1ef6cdf85c
Tags:NETAsyncRATexeMSILuser-jstrosch
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Yara detected RUNPE
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected XWorm
.NET source code contains very large strings
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 3364 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 3273F078F87CEBC3B06E9202E3902B5C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
file.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
    file.exeJoeSecurity_XWormYara detected XWormJoe Security
      file.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        file.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          file.exeJoeSecurity_RUNPEYara detected RUNPEJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
              00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                • 0x3e5c7:$s6: VirtualBox
                • 0x3e3ef:$s8: Win32_ComputerSystem
                • 0x4ce92:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                • 0x4cee3:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                • 0x4cf70:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                • 0x44e1a:$cnc4: POST / HTTP/1.1
                00000000.00000000.2101315489.000002273F209000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                  00000000.00000000.2101315489.000002273F209000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RUNPEYara detected RUNPEJoe Security
                    Click to see the 5 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: file.exeAvira: detected
                    Source: https://nkprotect.netAvira URL Cloud: Label: phishing
                    Source: http://nkprotect.netAvira URL Cloud: Label: phishing
                    Source: https://nkprotect.net/check.txtAvira URL Cloud: Label: phishing
                    Source: file.exeReversingLabs: Detection: 68%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
                    Source: file.exeJoe Sandbox ML: detected
                    Source: unknownHTTPS traffic detected: 82.197.80.96:443 -> 192.168.2.5:49704 version: TLS 1.2
                    Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: global trafficHTTP traffic detected: GET /check.txt HTTP/1.1Host: nkprotect.netConnection: Keep-Alive
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /check.txt HTTP/1.1Host: nkprotect.netConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: nkprotect.net
                    Source: file.exeString found in binary or memory: http://exmple.com
                    Source: file.exeString found in binary or memory: http://ip-api.com/csv/?fields=status
                    Source: file.exeString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: file.exe, 00000000.00000002.2161011605.000002274150D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nkprotect.net
                    Source: file.exe, 00000000.00000002.2161011605.00000227414EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: file.exeString found in binary or memory: https://api.telegram.org/bot
                    Source: file.exeString found in binary or memory: https://bin.equinox.io/c/bNyj1mQVY4c/ngrok-v3-stable-windows-386.zip
                    Source: file.exeString found in binary or memory: https://evilcoder.mysellix.io
                    Source: file.exe, 00000000.00000002.2161011605.00000227414EC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2161011605.0000022741502000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nkprotect.net
                    Source: file.exe, 00000000.00000002.2161011605.0000022741461000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2161011605.00000227414EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nkprotect.net/check.txt
                    Source: file.exeString found in binary or memory: https://pastebin.com/raw/H3wFXmEi
                    Source: file.exeString found in binary or memory: https://t.me/XCoderGroup
                    Source: file.exeString found in binary or memory: https://www.google.com/maps/place/)icons8-letter-16.png
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                    Source: unknownHTTPS traffic detected: 82.197.80.96:443 -> 192.168.2.5:49704 version: TLS 1.2

                    System Summary

                    barindex
                    Source: file.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                    Source: 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                    Source: Process Memory Space: file.exe PID: 3364, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                    Source: file.exe, SplashScreen.csLong String: Length: 913540
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF848E749660_2_00007FF848E74966
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF848E757120_2_00007FF848E75712
                    Source: file.exe, 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7z.exe, vs file.exe
                    Source: file.exe, 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs file.exe
                    Source: file.exe, 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: teTEexe dll sysPEVFT2_FONT_TRUETYPEVFT2_FONT_VECTORVFT2_FONT_RASTERVERSIONED_PRINTERINPUTMETHODCOMMSOUNDINSTALLABLESYSTEMNETWORKMOUSEDISPLAYLANGUAGEKEYBOARDPRINTERVFT_STATIC_LIB0x6VFT_VXDVFT_FONTVFT_DRVVFT_DLLVFT_APPVFT_UNKNOWNVOS__WINDOWS32VOS__PM32VOS__PM16VOS__WINDOWS16VOS__BASEVOS_WINCEVOS_NTVOS_OS232VOS_OS216VOS_DOSVOS_UNKNOWNVOS_NT_WINDOWS32VOS_OS232_PM32VOS_OS216_PM16VOS_DOS_WINDOWS32VOS_DOS_WINDOWS16SPECIALBUILDINFOINFERREDPRIVATEBUILDPATCHEDPRERELEASEImage BaseHeap CommitHeap ReserveStack CommitStack ReserveDLL CharacteristicsSubsystemSubsystem VersionImage VersionOS VersionLinker VersionUninitialized Data SizeInitialized Data SizeCode SizeFile AlignmentSection AlignmentImage SizeMANIFESTHTMLANIICONANICURSORVXDPLUGPLAYDLGINCLUDEVERSIONGROUP_ICONGROUP_CURSORMESSAGETABLERCDATAACCELERATORFONTFONTDIRSTRINGDIALOGMENUICONBITMAPCURSORXBOXEFI ROMEFI RuntimeEFI BootWindows CEPosixWindows CUIWindows GUINativeCEEM32RCEFTriCoreMIPS-FPU16MIPS-FPUAlpha-64MIPS-16PPC-FPPPCAM33ARM-NTARM-ThumbSH5SH4SH3ESH3-DSPSH3MIPS-V2MIPS-R10000MIPS-R4000MIPS-R3000I860SharedNotPagedNotCachedDiscardableExtendedRelocationsGPCOMDATRemoveCommentsUninitializedDataInitializedDataCodeNoPadTerminalServerAwareWDMNoBindNoSEHNoIsolationNX-CompatibleIntegrityRelocatedBig-EndianLittle-EndianUniCPUSystemNetRunRemovableRunNoDebugInfoAggressiveWsTrimNoLocalSymsNoLineNumsNoRelocsLargeAddress32-bitDLLExecutableChecksum errorefi[].ico.bmpversion.txtstring.txt.debugVFT2_DRV_FILESUBTYPE FILETYPE FILEOS VS_FF_ | FILEFLAGS FILEFLAGSMASK ProductVersionFileVersionPRODUCTVERSION FILEVERSION .rsrc_1StringFileInfo, TranslationVALUEVarFileInfoBLOCKVS_VERSION_INFOFileVersionFileDescriptionOriginalFilename: _winzip_.rsrcCOFF_SYMBOLSCERTIFICATE vs file.exe
                    Source: file.exe, 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7z.dll, vs file.exe
                    Source: file.exe, 00000000.00000000.2101315489.000002273F209000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXWorm.exe, vs file.exe
                    Source: file.exeBinary or memory string: OriginalFilename7z.exe, vs file.exe
                    Source: file.exeBinary or memory string: OriginalFilename vs file.exe
                    Source: file.exeBinary or memory string: teTEexe dll sysPEVFT2_FONT_TRUETYPEVFT2_FONT_VECTORVFT2_FONT_RASTERVERSIONED_PRINTERINPUTMETHODCOMMSOUNDINSTALLABLESYSTEMNETWORKMOUSEDISPLAYLANGUAGEKEYBOARDPRINTERVFT_STATIC_LIB0x6VFT_VXDVFT_FONTVFT_DRVVFT_DLLVFT_APPVFT_UNKNOWNVOS__WINDOWS32VOS__PM32VOS__PM16VOS__WINDOWS16VOS__BASEVOS_WINCEVOS_NTVOS_OS232VOS_OS216VOS_DOSVOS_UNKNOWNVOS_NT_WINDOWS32VOS_OS232_PM32VOS_OS216_PM16VOS_DOS_WINDOWS32VOS_DOS_WINDOWS16SPECIALBUILDINFOINFERREDPRIVATEBUILDPATCHEDPRERELEASEImage BaseHeap CommitHeap ReserveStack CommitStack ReserveDLL CharacteristicsSubsystemSubsystem VersionImage VersionOS VersionLinker VersionUninitialized Data SizeInitialized Data SizeCode SizeFile AlignmentSection AlignmentImage SizeMANIFESTHTMLANIICONANICURSORVXDPLUGPLAYDLGINCLUDEVERSIONGROUP_ICONGROUP_CURSORMESSAGETABLERCDATAACCELERATORFONTFONTDIRSTRINGDIALOGMENUICONBITMAPCURSORXBOXEFI ROMEFI RuntimeEFI BootWindows CEPosixWindows CUIWindows GUINativeCEEM32RCEFTriCoreMIPS-FPU16MIPS-FPUAlpha-64MIPS-16PPC-FPPPCAM33ARM-NTARM-ThumbSH5SH4SH3ESH3-DSPSH3MIPS-V2MIPS-R10000MIPS-R4000MIPS-R3000I860SharedNotPagedNotCachedDiscardableExtendedRelocationsGPCOMDATRemoveCommentsUninitializedDataInitializedDataCodeNoPadTerminalServerAwareWDMNoBindNoSEHNoIsolationNX-CompatibleIntegrityRelocatedBig-EndianLittle-EndianUniCPUSystemNetRunRemovableRunNoDebugInfoAggressiveWsTrimNoLocalSymsNoLineNumsNoRelocsLargeAddress32-bitDLLExecutableChecksum errorefi[].ico.bmpversion.txtstring.txt.debugVFT2_DRV_FILESUBTYPE FILETYPE FILEOS VS_FF_ | FILEFLAGS FILEFLAGSMASK ProductVersionFileVersionPRODUCTVERSION FILEVERSION .rsrc_1StringFileInfo, TranslationVALUEVarFileInfoBLOCKVS_VERSION_INFOFileVersionFileDescriptionOriginalFilename: _winzip_.rsrcCOFF_SYMBOLSCERTIFICATE vs file.exe
                    Source: file.exeBinary or memory string: OriginalFilename7z.dll, vs file.exe
                    Source: file.exeBinary or memory string: OriginalFilenameXWorm.exe, vs file.exe
                    Source: file.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                    Source: 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                    Source: Process Memory Space: file.exe PID: 3364, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                    Source: file.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: file.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
                    Source: file.exe, ToolsBox.csCryptographic APIs: 'TransformFinalBlock'
                    Source: file.exe, Builder.csCryptographic APIs: 'TransformFinalBlock'
                    Source: file.exe, SplashScreen.csBase64 encoded string: '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
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@1/1@1/1
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMutant created: NULL
                    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ProcessorId FROM Win32_Processor
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: file.exeReversingLabs: Detection: 68%
                    Source: file.exeString found in binary or memory: -help
                    Source: file.exeString found in binary or memory: Check charset encoding and -scs switch.Cannot find listfilebsobbbtbdba-helph?asut012sea0-pstlsdelsncsnrsnssnisnlsnhspfspespdsasscsswsltsccscsslpsosiscrcsemlsfxstmrvuanaxaiiwstxtaoadybspbseUnsupported switch postfix -stmUnsupported switch postfix -bbDuplicate archive path:Incorrect Number of benmchmark iterationsOnly one archive can be created with rename commandstdout mode and email mode cannot be combined-ai switch is not supported for this commandCannot use absolute pathnames for this commandArchive name cannot by emptyCannot find archive nameUnsupported -spf:2Unsupported command:The command must be spcifiedThere is no second file name for rename pair:Unsupported rename command:-rIncorrect wildcard type markerToo short switchUnsupported Map data sizeMap data errorUnsupported Map dataMapViewOfFile errorCan not open mappingIncorrect volume size:incorrect update switch commandUnsupported charset:Can not delete output folderCan not delete output fileCan not rename existing fileCan not create file with auto nameSeSecurityPrivilege
                    Source: file.exeString found in binary or memory: [ Play ]9StopToolStripMenuItem1.Image-StopToolStripMenuItem1
                    Source: file.exeString found in binary or memory: [ Extra 1 ]IReportWindowToolStripMenuItem1.Image=ReportWindowToolStripMenuItem1![ ReportWindow ]9StartToolStripMenuItem.Image-StartToolStripMenuItem7StopToolStripMenuItem.Image+StopToolStripMenuItemGPerformanceToolStripMenuItem1.Image;PerformanceToolStripMenuItem1
                    Source: file.exeString found in binary or memory: -Plugins\Ransomware.dll1Plugins\ReverseProxy.dll7Plugins\Ngrok-Installer.dll
                    Source: file.exeString found in binary or memory: cActiveWindows.dll,Chat.dll,Clipboard.dll,FileManager.dll,FilesSearcher.dll,HRDP.dll,HVNC.dll,Informations.dll,Keylogger.dll,Maps.dll,Microphone.dll,Ngrok-Installer.dll,Options.dll,Pastime.dll,Performance.dll,ProcessManager.dll,Programs.dll,Ransomware.dll,Chromium.dll,Recovery.dll,Stealer.dll,Regedit.dll,RemoteDesktop.dll,ReverseProxy.dll,RunPE.dll,Shell.dll,StartupManager.dll,TCPConnections.dll,UACBypass.dll,VB.NET Compiler.dll,WebCam.dll,WSound.dll,ServiceManager.dll,MessageBox.dll,HVNCMemory.dll,Cmstp-Bypass.dll,HiddenApps.dll,HBrowser.dll,VoiceChat.dll
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: file.exeStatic file information: File size 15604224 > 1048576
                    Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0xebf200
                    Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF848E700BD pushad ; iretd 0_2_00007FF848E700C1
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: Yara matchFile source: 00000000.00000000.2101315489.000002273F209000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 3364, type: MEMORYSTR
                    Source: file.exeBinary or memory string: IF GETMODULEHANDLE("SBIEDLL.DLL").TOINT32() <> 0 THEN
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: 2273F680000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: 22759460000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\file.exe TID: 4712Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\file.exe TID: 6984Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ProcessorId FROM Win32_Processor
                    Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: file.exeBinary or memory string: If (manufacturer = "microsoft corporation" AndAlso item("Model").ToString().ToUpperInvariant().Contains("VIRTUAL")) OrElse manufacturer.Contains("vmware") OrElse item("Model").ToString() = "VirtualBox" Then
                    Source: file.exe, 00000000.00000002.2160556359.0000022741282000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 3364, type: MEMORYSTR

                    Language, Device and Operating System Detection

                    barindex
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: Yara matchFile source: 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 3364, type: MEMORYSTR
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: Yara matchFile source: 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2101315489.000002273F209000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 3364, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: Yara matchFile source: 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 3364, type: MEMORYSTR
                    Source: Yara matchFile source: file.exe, type: SAMPLE
                    Source: Yara matchFile source: 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2101315489.000002273F209000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 3364, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Masquerading
                    OS Credential Dumping111
                    Security Software Discovery
                    Remote Services11
                    Archive Collected Data
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts2
                    Command and Scripting Interpreter
                    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    LSASS Memory41
                    Virtualization/Sandbox Evasion
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                    Virtualization/Sandbox Evasion
                    Security Account Manager13
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Deobfuscate/Decode Files or Information
                    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                    Obfuscated Files or Information
                    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file.exe68%ReversingLabsByteCode-MSIL.Backdoor.XWormRAT
                    file.exe100%AviraHEUR/AGEN.1307554
                    file.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://bin.equinox.io/c/bNyj1mQVY4c/ngrok-v3-stable-windows-386.zip0%Avira URL Cloudsafe
                    http://exmple.com0%Avira URL Cloudsafe
                    https://nkprotect.net100%Avira URL Cloudphishing
                    http://nkprotect.net100%Avira URL Cloudphishing
                    https://evilcoder.mysellix.io0%Avira URL Cloudsafe
                    https://nkprotect.net/check.txt100%Avira URL Cloudphishing
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    nkprotect.net
                    82.197.80.96
                    truefalse
                      unknown
                      s-part-0015.t-0009.t-msedge.net
                      13.107.246.43
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://nkprotect.net/check.txtfalse
                        • Avira URL Cloud: phishing
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://pastebin.com/raw/H3wFXmEifile.exefalse
                          high
                          http://nkprotect.netfile.exe, 00000000.00000002.2161011605.000002274150D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: phishing
                          unknown
                          http://exmple.comfile.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.org/botfile.exefalse
                            high
                            https://bin.equinox.io/c/bNyj1mQVY4c/ngrok-v3-stable-windows-386.zipfile.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            https://evilcoder.mysellix.iofile.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            https://nkprotect.netfile.exe, 00000000.00000002.2161011605.00000227414EC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2161011605.0000022741502000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: phishing
                            unknown
                            https://t.me/XCoderGroupfile.exefalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000000.00000002.2161011605.00000227414EC000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://www.google.com/maps/place/)icons8-letter-16.pngfile.exefalse
                                  high
                                  http://ip-api.com/csv/?fields=statusfile.exefalse
                                    high
                                    http://ip-api.com/line/?fields=hostingfile.exefalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      82.197.80.96
                                      nkprotect.netUnited Kingdom
                                      25577C4L-ASGBfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1563920
                                      Start date and time:2024-11-27 16:29:38 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 3m 7s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:2
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:file.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@1/1@1/1
                                      EGA Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 94%
                                      • Number of executed functions: 6
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Stop behavior analysis, all processes terminated
                                      • Exclude process from analysis (whitelisted): dllhost.exe
                                      • Excluded IPs from analysis (whitelisted): 52.149.20.212
                                      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, otelrules.afd.azureedge.net, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                      • Execution Graph export aborted for target file.exe, PID 3364 because it is empty
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: file.exe
                                      TimeTypeDescription
                                      10:30:39API Interceptor1x Sleep call for process: file.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      82.197.80.96file.exeGet hashmaliciousDynamic StealerBrowse
                                        file.exeGet hashmaliciousUnknownBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          nkprotect.netfile.exeGet hashmaliciousDynamic StealerBrowse
                                          • 82.197.80.96
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • 82.197.80.96
                                          s-part-0015.t-0009.t-msedge.netfile.dllGet hashmaliciousUnknownBrowse
                                          • 13.107.246.43
                                          FW_ Fwd_ Voice Mail Message - 5TH Judicial Circuit.emlGet hashmaliciousLure-BasedAttack, HTMLPhisherBrowse
                                          • 13.107.246.43
                                          UdY4Kc66Bc.exeGet hashmaliciousUnknownBrowse
                                          • 13.107.246.43
                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                          • 13.107.246.43
                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                          • 13.107.246.43
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 13.107.246.43
                                          file.exeGet hashmaliciousRemcosBrowse
                                          • 13.107.246.43
                                          zhbEGHo55P.exeGet hashmaliciousLockBit ransomwareBrowse
                                          • 13.107.246.43
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 13.107.246.43
                                          file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                          • 13.107.246.43
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C4L-ASGBfile.exeGet hashmaliciousDynamic StealerBrowse
                                          • 82.197.80.96
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • 82.197.80.96
                                          https://www.bing.com/ck/a?!&&p=1e0efd6506210b14dc50df6db1269046d1b674a947208352fc5ca1a6477c7b35JmltdHM9MTczMDQxOTIwMA&ptn=3&ver=2&hsh=4&fclid=155f8875-a60a-6e0e-1237-9d6ba7b16ff2&psq=goldsmithsucu.org&u=a1aHR0cHM6Ly9nb2xkc21pdGhzdWN1Lm9yZy9leGVjdXRpdmUtY29tbWl0dGVlLw&ntb=1Get hashmaliciousUnknownBrowse
                                          • 185.229.21.104
                                          https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=sf_rand_string_mixed(5)FgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Fir.nbaikp3.sa.com%2Fdelaw%2Flawn%2Fkoo%2Fsf_rand_string_mixed(24)/william.ferebee@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                                          • 82.197.65.139
                                          https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=sf_rand_string_mixed(5)FgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Fir.nbaikp3.sa.com%2Fdelaw%2Flawn%2Fkoo%2Fsf_rand_string_mixed(24)/mario.caligiuri@edmontonpolice.caGet hashmaliciousHTMLPhisherBrowse
                                          • 82.197.65.139
                                          https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=sf_rand_string_mixed(5)FgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Fir.nbaikp3.sa.com%2Fdelaw%2Flawn%2Fkoo%2Fsf_rand_string_mixed(24)/bill.wafford@qurateretail.comGet hashmaliciousHTMLPhisherBrowse
                                          • 82.197.65.139
                                          Action Desk Support 01 Nov.msgGet hashmaliciousUnknownBrowse
                                          • 82.197.65.139
                                          7950COPY.exeGet hashmaliciousFormBookBrowse
                                          • 82.197.83.199
                                          arm7.elfGet hashmaliciousUnknownBrowse
                                          • 109.104.114.215
                                          INV4092401.docx.docGet hashmaliciousRemcosBrowse
                                          • 82.197.64.93
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousDynamic StealerBrowse
                                          • 82.197.80.96
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • 82.197.80.96
                                          z34SOLICITUDDEP.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 82.197.80.96
                                          oDisjCYpOPGet hashmaliciousXmrigBrowse
                                          • 82.197.80.96
                                          https://application-submit.com/form/redbullGet hashmaliciousUnknownBrowse
                                          • 82.197.80.96
                                          KQnOlYle1e.ps1Get hashmaliciousUnknownBrowse
                                          • 82.197.80.96
                                          HvgIFHzsqS.lnkGet hashmaliciousMalLnkBrowse
                                          • 82.197.80.96
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                          • 82.197.80.96
                                          VzhY4BcvBH.exeGet hashmaliciousAsyncRAT, RedLine, StormKitty, VenomRATBrowse
                                          • 82.197.80.96
                                          file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                          • 82.197.80.96
                                          No context
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:CSV text
                                          Category:dropped
                                          Size (bytes):1727
                                          Entropy (8bit):5.3718223239563105
                                          Encrypted:false
                                          SSDEEP:48:MxHKQwYHKGSI6o6+vxp3/elZHNp51qHGIs0HKCtHTHhAHKKkb:iqbYqGSI6o9Zp/elZtp5wmj0qCtzHeq/
                                          MD5:A2CB773BE435367C84F50E0C93D348C0
                                          SHA1:F48474211178C523021492E37F4084C1805986DD
                                          SHA-256:A70FB430EE10D7E312E69E2C6EF42D1E5B54534A549A11062339C176ED609DB0
                                          SHA-512:00967814FD27693E1DF73724D1CE7F81159421BCE8F766389A9844F82D5DC15CC9D44113FB976B769A8C7157AE1E01549BD4491C8D68BC522CD809E3C401E3B4
                                          Malicious:true
                                          Reputation:low
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Management\8af759007c012da690062882e06694f1\System.Management.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.3031
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):6.552918824670273
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:file.exe
                                          File size:15'604'224 bytes
                                          MD5:3273f078f87cebc3b06e9202e3902b5c
                                          SHA1:03b1971e04c8e67a32f38446bd8bfac41825f9cc
                                          SHA256:4b6caa8467cf7ca3d7a3d3b2ac70e48510b7c4570e4810f3305aca1ef6cdf85c
                                          SHA512:2a0bc7bf3ffd2f2e027e0feffb803f76dd11da48335e1b66a3c1927410e0a82c6ce212901c2ace9eca5bcce51eee49a12dc4619fc31711f0770e2d55ab7730f9
                                          SSDEEP:196608:Wf/BAe1d4ihvy85JhhYc3BSL1kehn4inje:WfyIhhkRka4i
                                          TLSH:46F69E1077D6C006E47669B00A947AE1A67ABEAB2B15D8AD30C4331C17F64CCF993BF5
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......e.........."...0......&......>.... ... ....@.. ....................................`................................
                                          Icon Hash:71331b969f1b1371
                                          Entrypoint:0x12c113e
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x65EB89ED [Fri Mar 8 21:58:05 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:v4.0.30319
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xec10f00x4b.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xec20000x223ae.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xee60000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xebf1440xebf2003957d14938a414363ebf7dce12c352beunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xec20000x223ae0x22400a7a7c947b38ceefba36d1e99792f8c0bFalse0.45502109945255476data5.558879950134356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xee60000xc0x200ad85960811ecfcfe1af3d5cffe8ea13cFalse0.044921875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "\354"0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0xec22200x9738PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9994058689811944
                                          RT_ICON0xecb9580x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2834 x 2834 px/m0.2102064355849994
                                          RT_ICON0xedc1800x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2834 x 2834 px/m0.2754487482286254
                                          RT_ICON0xee03a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/m0.33682572614107886
                                          RT_ICON0xee29500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.42401500938086306
                                          RT_ICON0xee39f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m0.6941489361702128
                                          RT_GROUP_ICON0xee3e600x5adata0.7666666666666667
                                          RT_VERSION0xee3ebc0x308data0.44458762886597936
                                          RT_MANIFEST0xee41c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 27, 2024 16:30:37.012147903 CET49704443192.168.2.582.197.80.96
                                          Nov 27, 2024 16:30:37.012196064 CET4434970482.197.80.96192.168.2.5
                                          Nov 27, 2024 16:30:37.012515068 CET49704443192.168.2.582.197.80.96
                                          Nov 27, 2024 16:30:37.049787998 CET49704443192.168.2.582.197.80.96
                                          Nov 27, 2024 16:30:37.049803019 CET4434970482.197.80.96192.168.2.5
                                          Nov 27, 2024 16:30:38.542994976 CET4434970482.197.80.96192.168.2.5
                                          Nov 27, 2024 16:30:38.543124914 CET49704443192.168.2.582.197.80.96
                                          Nov 27, 2024 16:30:38.547419071 CET49704443192.168.2.582.197.80.96
                                          Nov 27, 2024 16:30:38.547431946 CET4434970482.197.80.96192.168.2.5
                                          Nov 27, 2024 16:30:38.547734976 CET4434970482.197.80.96192.168.2.5
                                          Nov 27, 2024 16:30:38.598818064 CET49704443192.168.2.582.197.80.96
                                          Nov 27, 2024 16:30:38.635965109 CET49704443192.168.2.582.197.80.96
                                          Nov 27, 2024 16:30:38.683334112 CET4434970482.197.80.96192.168.2.5
                                          Nov 27, 2024 16:30:38.978415966 CET4434970482.197.80.96192.168.2.5
                                          Nov 27, 2024 16:30:38.978477001 CET4434970482.197.80.96192.168.2.5
                                          Nov 27, 2024 16:30:38.978544950 CET49704443192.168.2.582.197.80.96
                                          Nov 27, 2024 16:30:38.991838932 CET49704443192.168.2.582.197.80.96
                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 27, 2024 16:30:36.497648001 CET5727253192.168.2.51.1.1.1
                                          Nov 27, 2024 16:30:36.983969927 CET53572721.1.1.1192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Nov 27, 2024 16:30:36.497648001 CET192.168.2.51.1.1.10xeab7Standard query (0)nkprotect.netA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Nov 27, 2024 16:30:36.983969927 CET1.1.1.1192.168.2.50xeab7No error (0)nkprotect.net82.197.80.96A (IP address)IN (0x0001)false
                                          Nov 27, 2024 16:30:48.623646975 CET1.1.1.1192.168.2.50x13c0No error (0)shed.dual-low.s-part-0015.t-0009.t-msedge.nets-part-0015.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                          Nov 27, 2024 16:30:48.623646975 CET1.1.1.1192.168.2.50x13c0No error (0)s-part-0015.t-0009.t-msedge.net13.107.246.43A (IP address)IN (0x0001)false
                                          • nkprotect.net
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.54970482.197.80.964433364C:\Users\user\Desktop\file.exe
                                          TimestampBytes transferredDirectionData
                                          2024-11-27 15:30:38 UTC72OUTGET /check.txt HTTP/1.1
                                          Host: nkprotect.net
                                          Connection: Keep-Alive
                                          2024-11-27 15:30:38 UTC338INHTTP/1.1 200 OK
                                          Connection: close
                                          content-type: text/plain
                                          last-modified: Wed, 27 Nov 2024 13:56:33 GMT
                                          etag: "fe-67472511-43596ccb76ea087e;;;"
                                          accept-ranges: bytes
                                          content-length: 254
                                          date: Wed, 27 Nov 2024 15:30:38 GMT
                                          server: LiteSpeed
                                          platform: hostinger
                                          panel: hpanel
                                          content-security-policy: upgrade-insecure-requests
                                          2024-11-27 15:30:38 UTC254INData Raw: 31 37 38 42 46 42 46 46 30 30 38 30 30 46 31 32 0a 30 46 38 42 46 42 46 46 30 30 30 34 30 36 46 31 0a 42 46 45 42 46 42 46 46 30 30 30 39 30 36 45 44 0a 42 46 45 42 46 42 46 46 30 30 30 42 30 36 37 31 0a 31 46 38 42 46 42 46 46 30 30 30 33 30 36 45 34 0a 30 46 38 42 46 42 46 46 30 30 30 34 30 36 46 31 0a 31 46 38 42 46 42 46 46 30 30 30 34 30 36 46 31 0a 30 46 38 42 46 42 46 46 30 30 30 34 30 36 46 31 0a 30 46 38 42 46 42 46 46 30 30 30 33 30 36 46 32 0a 30 46 38 42 46 42 46 46 30 30 30 34 30 36 46 31 0a 30 37 38 42 46 42 46 46 30 30 38 33 30 46 31 30 0a 31 37 38 42 46 42 46 46 30 30 38 30 30 46 38 32 0a 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 0a 30 46 38 42 46 42 46 46 30 30 30 34 30 36 46 31 0a 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
                                          Data Ascii: 178BFBFF00800F120F8BFBFF000406F1BFEBFBFF000906EDBFEBFBFF000B06711F8BFBFF000306E40F8BFBFF000406F11F8BFBFF000406F10F8BFBFF000406F10F8BFBFF000306F20F8BFBFF000406F1078BFBFF00830F10178BFBFF00800F8200000000000000000F8BFBFF000406F10000000000000000


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Target ID:0
                                          Start time:10:30:34
                                          Start date:27/11/2024
                                          Path:C:\Users\user\Desktop\file.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                          Imagebase:0x2273e570000
                                          File size:15'604'224 bytes
                                          MD5 hash:3273F078F87CEBC3B06E9202E3902B5C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.2101315489.000002273EEB7000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2101315489.000002273F209000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_RUNPE, Description: Yara detected RUNPE, Source: 00000000.00000000.2101315489.000002273F209000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Reset < >
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2162075970.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff848e70000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5697ba1c23d0ba517f504b5564df800328e6449573134579264d5b67405473db
                                            • Instruction ID: 12d1e7263c2518f06e321417a090b963cc9d9563caa8cf26dbe186ec3939aae3
                                            • Opcode Fuzzy Hash: 5697ba1c23d0ba517f504b5564df800328e6449573134579264d5b67405473db
                                            • Instruction Fuzzy Hash: 59F1C43090CA8D8FEBA8EF28C8557E977E1FF54350F04426EE84DC7295DB3899458B86
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2162075970.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff848e70000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4079e62752ccb009d43903c28b73a333b163cc5b09998dfc78854539e188c1db
                                            • Instruction ID: b818cc1bfca25e5c40fc1b037446e787b7c235e4e5205de9ceb9e0d5e0cfb0ba
                                            • Opcode Fuzzy Hash: 4079e62752ccb009d43903c28b73a333b163cc5b09998dfc78854539e188c1db
                                            • Instruction Fuzzy Hash: 24E1A23090CA8E8FEBA8EF28C8557E977E1FF54350F14426AE84DC7291DF74A8458B81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2162075970.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff848e70000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 6FQ'
                                            • API String ID: 0-2260291693
                                            • Opcode ID: fdcde57900027b3cb382f3f3137ac9952d2df61a46fe263937a1fd253968dc29
                                            • Instruction ID: 2137780e01129892d03b0fd333a8ba57cc63d6e48b855dfbf3eb2f9820cebd76
                                            • Opcode Fuzzy Hash: fdcde57900027b3cb382f3f3137ac9952d2df61a46fe263937a1fd253968dc29
                                            • Instruction Fuzzy Hash: 20818C70D0DA998FDBA5EBA884556EDBBB1FF4A300F5400BED04DD7292CB396841CB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2162075970.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff848e70000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 82fd1d03c21307c8f78c1cd4c3f0e122f65faa1c610ddd093e8520d109c22f95
                                            • Instruction ID: ee3ad99fbfd3bfa5f06b96ff60b149fa44ab08929be579fc8ef92e426c087a2e
                                            • Opcode Fuzzy Hash: 82fd1d03c21307c8f78c1cd4c3f0e122f65faa1c610ddd093e8520d109c22f95
                                            • Instruction Fuzzy Hash: 0CB1C33050CA8D8FEB69EF28C8557E93BE1FF55350F04426EE84DC7292DB3498458B86
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2162075970.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff848e70000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8cc05a005a51f48ed56f7bde65de39359fcca9cd894824345834f1a73ca3101d
                                            • Instruction ID: b582d7ad3aec45290bc41a8cc257ee7394b46dbe818e5f5b5d3c62c75aee040e
                                            • Opcode Fuzzy Hash: 8cc05a005a51f48ed56f7bde65de39359fcca9cd894824345834f1a73ca3101d
                                            • Instruction Fuzzy Hash: 30516E30908A5C8FDB58EF58D845BE9BBF1FF59310F0482AAD44DE3252DF34A9858B81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2162075970.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff848e70000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e7ae440c4c5377e72e882105f59515791f058b7e1e1aa3ebbe3a9dbbdb85f4f9
                                            • Instruction ID: dccd332c3e545692d2c91ddce8d542a954cf5d895f027708f9417ad22c4a8e58
                                            • Opcode Fuzzy Hash: e7ae440c4c5377e72e882105f59515791f058b7e1e1aa3ebbe3a9dbbdb85f4f9
                                            • Instruction Fuzzy Hash: B331B170E0891D8FDBA4FBA8C455BADB7B1FF59351F5040A9E00DE2292DF34A981CB44