Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe

Overview

General Information

Sample name:173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe
Analysis ID:1570019
MD5:ea40e46310163064f9f33ff2fb152364
SHA1:6f5e20a87fd4b534e112928aff8d655559f6758b
SHA256:f9c4ce97de10b00f02f0edc2417e510fdb774243a7a41426ac918c618bb3abac
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Yara detected DcRat
.NET source code references suspicious native API functions
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Server": "87.120.116.179", "Ports": "1500", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "wpaFxIcglMLADiogibPnifaeFDBMwMuF", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "BeuIAVEwZRflCChxbBouOkU4PHb82EjrnChy5tY9ZLUF9209+gb1OdfbM3LYzyzrwVJ2FuUrNib1mzMhYhPzzV5qj4NZWUFFWChE+8RScndJABLhzP86T9S8dw2xlnrMCojFUlu4HV4DwsBjHso4WQ/rQSHfAWYDO1D1ALcsJK4=", "BDOS": "null", "External_config_on_Pastebin": "false"}
SourceRuleDescriptionAuthorStrings
173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x65f7:$a1: havecamera
    • 0x9ac0:$a2: timeout 3 > NUL
    • 0x9ae0:$a3: START "" "
    • 0x996b:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
    • 0x9a20:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
    173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
    • 0x9a20:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
    • 0x996b:$s2: L2Mgc2NodGFza3MgL2
    • 0x98ea:$s3: QW1zaVNjYW5CdWZmZXI
    • 0x9938:$s4: VmlydHVhbFByb3RlY3Q
    173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
    • 0x9ca2:$q1: Select * from Win32_CacheMemory
    • 0x9ce2:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
    • 0x9d30:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
    • 0x9d7e:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
    173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
    • 0xa11a:$s1: DcRatBy
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x63f7:$a1: havecamera
      • 0x98c0:$a2: timeout 3 > NUL
      • 0x98e0:$a3: START "" "
      • 0x976b:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
      • 0x9820:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
      00000000.00000002.3273764026.0000000000C62000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x4e4ac:$b2: DcRat By qwqdanchun1
      00000000.00000002.3274113126.00000000029C1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x55a8:$b1: DcRatByqwqdanchun
      • 0x29e2e4:$b2: DcRat By qwqdanchun1
      Process Memory Space: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe PID: 1020JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpackWindows_Trojan_DCRat_1aeea1acunknownunknown
          • 0x65f7:$a1: havecamera
          • 0x9ac0:$a2: timeout 3 > NUL
          • 0x9ae0:$a3: START "" "
          • 0x996b:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
          • 0x9a20:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
          0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpackINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
          • 0x9a20:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
          • 0x996b:$s2: L2Mgc2NodGFza3MgL2
          • 0x98ea:$s3: QW1zaVNjYW5CdWZmZXI
          • 0x9938:$s4: VmlydHVhbFByb3RlY3Q
          0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
          • 0x9ca2:$q1: Select * from Win32_CacheMemory
          • 0x9ce2:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
          • 0x9d30:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
          • 0x9d7e:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
          0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
          • 0xa11a:$s1: DcRatBy
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeAvira: detected
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeMalware Configuration Extractor: AsyncRAT {"Server": "87.120.116.179", "Ports": "1500", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "wpaFxIcglMLADiogibPnifaeFDBMwMuF", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "MIICMDCCAZmgAwIBAgIVAIGBz6Y+7gj2nikjFjRUrU+W1e6pMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTIzMTIwMTE4NTMxOVoXDTM0MDkwOTE4NTMxOVowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJ7RkCU5e5ZZGOVZ75AKjw+32BE4r7Gh+NDIHidnET15r/o8cPJFvS5gpG4+iibf2Z0nRFnEuoTMJw07xCT/SG57sbHxxQWqLy+MzOO9Ja6xoYoZtHX2eKqlB8q/A+zgAA/ncmt7XysT58Qj/RJ8VVdvTNW2XqUpu67cC4U/VowjAgMBAAGjMjAwMB0GA1UdDgQWBBQGF84dbwRGs8dcAxJjYPEQ0vFz8DAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAGElFBgck3Tl9JJ+akExL1Hf05KnfjNQqJh1Pb+sJI9mnuysEVbl9VfAwBmKCdvydwyWbc7opnIfL95l3s1WxqDM2iMqdHvKJAAqrdKbS+41ISGFkJYIApAxxE8iY2y0Nc9h4uS4wQ7EA95s0iYS3FU6a3fTiuBtdWqpIkSmIB3N", "ServerSignature": "BeuIAVEwZRflCChxbBouOkU4PHb82EjrnChy5tY9ZLUF9209+gb1OdfbM3LYzyzrwVJ2FuUrNib1mzMhYhPzzV5qj4NZWUFFWChE+8RScndJABLhzP86T9S8dw2xlnrMCojFUlu4HV4DwsBjHso4WQ/rQSHfAWYDO1D1ALcsJK4=", "BDOS": "null", "External_config_on_Pastebin": "false"}
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeReversingLabs: Detection: 84%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeJoe Sandbox ML: detected
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: global trafficTCP traffic: 192.168.2.5:49704 -> 87.120.116.179:1500
          Source: Joe Sandbox ViewASN Name: UNACS-AS-BG8000BurgasBG UNACS-AS-BG8000BurgasBG
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: unknownTCP traffic detected without corresponding DNS query: 87.120.116.179
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, 00000000.00000002.3274113126.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe PID: 1020, type: MEMORYSTR

          System Summary

          barindex
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3273764026.0000000000C62000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3274113126.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: Process Memory Space: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe PID: 1020, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeCode function: 0_2_00007FF848F430E50_2_00007FF848F430E5
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, 00000000.00000000.2025039468.000000000070E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeBinary or memory string: OriginalFilenameClient.exe" vs 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3273764026.0000000000C62000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3274113126.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: Process Memory Space: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe PID: 1020, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, Settings.csBase64 encoded string: 'UKk/prLjaCEdV7txv+yGZrp0S5STXIa+zFqyOUrIhwyzlnwbavti7MCYjJFyHwoGEHmGl9B9pqBPmkuydYYucA==', 'gYA+r/KDoN84ARnBcOf8aAI3Q4u7UO9ndzXOq91IsrptyWaWN8zLNnqr2Aaovq9MGG0DFZWuH2vcYFfMIcwz7A==', 'go/ni6lRwY6pooXrQwAN06Viuxc6C0UCeuCkhNZQWER2UXJOkaUJ8doWphYVUh4AqkqHinXT322SmYN7jAdKOA==', 'UdVwZzv+kSKx0MU+lsFLufZGlckVZFDo/LFGA5F24YafJ6F/Duft+5T4Bc0CYN1Bas7Vnyo0BjUSWqmz4S0iYQ==', 'gpkk6lnzJsgMkB/xwv1p1GncZrZ8bQwPfi6EjzMIcyoUO64RhlIpvqA/pG2bOnfRQJiY/pBicGx6i200l3rWKA==', 'orZZ89yMyg/TLlsO9OPjjNyQN+bEEyfwlW2mCeG1G1SRYvFkypjjhER4VVUzcqn1Me1OnCly6Cn1mAM769og2g=='
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, NormalStartup.csBase64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA=='
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/1
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeMutant created: NULL
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeReversingLabs: Detection: 84%
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeSection loaded: schannel.dllJump to behavior
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeCode function: 0_2_00007FF848F43F18 push E95CC1ABh; ret 0_2_00007FF848F43F29
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeCode function: 0_2_00007FF848F400BD pushad ; iretd 0_2_00007FF848F400C1

          Boot Survival

          barindex
          Source: Yara matchFile source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe PID: 1020, type: MEMORYSTR
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe PID: 1020, type: MEMORYSTR
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeMemory allocated: 2700000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeMemory allocated: 1A9C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe TID: 1248Thread sleep time: -65000s >= -30000sJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, 00000000.00000002.3275260006.000000001B443000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeProcess token adjusted: DebugJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, AntiProcess.csReference to suspicious API methods: OpenProcess(1u, bInheritHandle: false, processId)
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, Amsi.csReference to suspicious API methods: Win32.VirtualAllocEx(procAddress, (UIntPtr)(ulong)patch.Length, 64u, out var _)
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: Yara matchFile source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe PID: 1020, type: MEMORYSTR
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
          Source: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe PID: 1020, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe PID: 1020, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          2
          Virtualization/Sandbox Evasion
          OS Credential Dumping111
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Native API
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory2
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          DLL Side-Loading
          Security Account Manager13
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
          Obfuscated Files or Information
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe84%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
          173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe100%AviraHEUR/AGEN.1307404
          173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe, 00000000.00000002.3274113126.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            87.120.116.179
            unknownBulgaria
            25206UNACS-AS-BG8000BurgasBGtrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1570019
            Start date and time:2024-12-06 14:14:15 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 3m 50s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:4
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@1/0@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 3
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • VT rate limit hit for: 173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            87.120.116.179173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeGet hashmaliciousXWormBrowse
              1733477410ba2e5b8e1739578ed6933c4e69d66a81049f523c11599f36b2f5da870a31538a881.dat-decoded.exeGet hashmaliciousXWormBrowse
                17334774117b7343420a7b9efab7c5b1abd0627c7af1c91f9947163684497ce841bf5f9198533.dat-decoded.exeGet hashmaliciousXWormBrowse
                  17334769266ba75a70859e94894e9fae5c33bba300e2b004c1166d236dc1ab2c8ff5669916631.dat-decoded.exeGet hashmaliciousXWormBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    UNACS-AS-BG8000BurgasBG173347741090e23c9ebd2c4b604c71623763cbce99aec650e3f9e27d35f4f3dcf6f1064415652.dat-decoded.exeGet hashmaliciousXWormBrowse
                    • 87.120.116.179
                    1733477410ba2e5b8e1739578ed6933c4e69d66a81049f523c11599f36b2f5da870a31538a881.dat-decoded.exeGet hashmaliciousXWormBrowse
                    • 87.120.116.179
                    17334774117b7343420a7b9efab7c5b1abd0627c7af1c91f9947163684497ce841bf5f9198533.dat-decoded.exeGet hashmaliciousXWormBrowse
                    • 87.120.116.179
                    17334769266ba75a70859e94894e9fae5c33bba300e2b004c1166d236dc1ab2c8ff5669916631.dat-decoded.exeGet hashmaliciousXWormBrowse
                    • 87.120.116.179
                    yIla7SeJ6r.docGet hashmaliciousXenoRATBrowse
                    • 87.120.120.27
                    gjot5vxpIC.exeGet hashmaliciousXenoRATBrowse
                    • 87.120.120.27
                    file.exeGet hashmaliciousAmadey, AsyncRAT, Stealc, VidarBrowse
                    • 87.120.125.31
                    po4877383.exeGet hashmaliciousRedLineBrowse
                    • 87.120.120.86
                    e824975.htmlGet hashmaliciousUnknownBrowse
                    • 87.120.114.172
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):5.616671765821841
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    • Win32 Executable (generic) a (10002005/4) 49.75%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Windows Screen Saver (13104/52) 0.07%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    File name:173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe
                    File size:48'640 bytes
                    MD5:ea40e46310163064f9f33ff2fb152364
                    SHA1:6f5e20a87fd4b534e112928aff8d655559f6758b
                    SHA256:f9c4ce97de10b00f02f0edc2417e510fdb774243a7a41426ac918c618bb3abac
                    SHA512:59d090807eb27afdab1aa8ca0d831efa0917cab9ad38ed662bb29c50bfc826877ea2453ef917656af74334edb911d27fa1a0ee9feb4d6739c573c185710bee7c
                    SSDEEP:768:dOEuILWCKi+DiBtelDSN+iV08YbygeKNWap+vEgK/J9lZVc6KN:dOtmBtKDs4zb1fNWRnkJ3ZVclN
                    TLSH:9D235C4037E88136E2FD4BB8ADF2A54186B9D2676903C6596CC814EA1F13BC596036FE
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x40cb8e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x60930A0B [Wed May 5 21:11:39 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xcb3c0x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000xdf7.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xab940xac00855a9fc8bff2f2b21410de51229f1930False0.5017033066860465data5.64159433302446IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xe0000xdf70xe002083376922615c09cdda9acfd9305376False0.4017857142857143data5.110607648061562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x100000xc0x200d2892f5e6b6d9366633263ebc642dea3False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0xe0a00x2d4data0.4350828729281768
                    RT_MANIFEST0xe3740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 6, 2024 14:15:08.715178013 CET497041500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:08.835129976 CET15004970487.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:08.835247993 CET497041500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:08.856750965 CET497041500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:08.976443052 CET15004970487.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:10.986429930 CET15004970487.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:10.986510038 CET497041500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:16.025044918 CET497041500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:16.029709101 CET497051500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:16.144978046 CET15004970487.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:16.149573088 CET15004970587.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:16.149671078 CET497051500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:16.150186062 CET497051500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:16.269970894 CET15004970587.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:18.295732975 CET15004970587.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:18.295856953 CET497051500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:23.309282064 CET497051500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:23.310065031 CET497061500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:23.429577112 CET15004970587.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:23.430192947 CET15004970687.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:23.430310965 CET497061500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:23.430741072 CET497061500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:23.550492048 CET15004970687.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:25.561389923 CET15004970687.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:25.561480045 CET497061500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:30.576113939 CET497061500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:30.576585054 CET497171500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:30.695954084 CET15004970687.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:30.696307898 CET15004971787.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:30.696386099 CET497171500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:30.701807022 CET497171500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:30.821656942 CET15004971787.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:32.826926947 CET15004971787.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:32.827115059 CET497171500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:37.840423107 CET497171500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:37.840828896 CET497381500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:37.960316896 CET15004971787.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:37.960616112 CET15004973887.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:37.960736036 CET497381500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:37.965111017 CET497381500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:38.085037947 CET15004973887.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:40.112360954 CET15004973887.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:40.112462044 CET497381500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:45.121716976 CET497381500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:45.122123957 CET497541500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:45.241482019 CET15004973887.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:45.241879940 CET15004975487.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:45.241971970 CET497541500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:45.243891001 CET497541500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:45.363610983 CET15004975487.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:47.395306110 CET15004975487.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:47.395385027 CET497541500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:52.402925014 CET497541500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:52.403410912 CET497701500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:52.524281979 CET15004975487.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:52.524761915 CET15004977087.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:52.524897099 CET497701500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:52.525357962 CET497701500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:52.644990921 CET15004977087.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:54.666462898 CET15004977087.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:54.666676044 CET497701500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:59.668471098 CET497701500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:59.668840885 CET497911500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:59.788295984 CET15004977087.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:59.788562059 CET15004979187.120.116.179192.168.2.5
                    Dec 6, 2024 14:15:59.788655996 CET497911500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:59.789105892 CET497911500192.168.2.587.120.116.179
                    Dec 6, 2024 14:15:59.908884048 CET15004979187.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:01.940740108 CET15004979187.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:01.940885067 CET497911500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:06.950032949 CET497911500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:06.950517893 CET498081500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:07.069863081 CET15004979187.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:07.070238113 CET15004980887.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:07.070348024 CET498081500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:07.070821047 CET498081500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:07.190522909 CET15004980887.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:09.222117901 CET15004980887.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:09.225589991 CET498081500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:14.231092930 CET498081500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:14.231623888 CET498241500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:14.350863934 CET15004980887.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:14.351391077 CET15004982487.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:14.351496935 CET498241500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:14.351847887 CET498241500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:14.471544981 CET15004982487.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:16.499623060 CET15004982487.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:16.499720097 CET498241500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:21.512329102 CET498241500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:21.512777090 CET498451500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:21.632061958 CET15004982487.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:21.632551908 CET15004984587.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:21.632646084 CET498451500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:21.633090973 CET498451500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:21.753206968 CET15004984587.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:23.784455061 CET15004984587.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:23.784524918 CET498451500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:28.794080019 CET498451500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:28.794547081 CET498611500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:28.914011002 CET15004984587.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:28.914272070 CET15004986187.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:28.914359093 CET498611500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:28.914836884 CET498611500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:29.034607887 CET15004986187.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:31.052269936 CET15004986187.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:31.052411079 CET498611500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:36.059340000 CET498611500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:36.059834003 CET498771500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:36.179275990 CET15004986187.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:36.179620028 CET15004987787.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:36.179749012 CET498771500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:36.180074930 CET498771500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:36.299757004 CET15004987787.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:38.347346067 CET15004987787.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:38.347497940 CET498771500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:43.356386900 CET498771500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:43.356767893 CET498981500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:43.476129055 CET15004987787.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:43.476452112 CET15004989887.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:43.476579905 CET498981500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:43.477005005 CET498981500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:43.596685886 CET15004989887.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:45.610059023 CET15004989887.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:45.610200882 CET498981500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:50.621819973 CET498981500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:50.622208118 CET499141500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:50.741753101 CET15004989887.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:50.741904020 CET15004991487.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:50.742053032 CET499141500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:50.742546082 CET499141500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:50.862282038 CET15004991487.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:52.878922939 CET15004991487.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:52.879049063 CET499141500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:57.887226105 CET499141500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:57.887609005 CET499301500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:58.007325888 CET15004991487.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:58.007484913 CET15004993087.120.116.179192.168.2.5
                    Dec 6, 2024 14:16:58.007560968 CET499301500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:58.008033037 CET499301500192.168.2.587.120.116.179
                    Dec 6, 2024 14:16:58.127768993 CET15004993087.120.116.179192.168.2.5
                    Dec 6, 2024 14:17:00.125433922 CET15004993087.120.116.179192.168.2.5
                    Dec 6, 2024 14:17:00.125585079 CET499301500192.168.2.587.120.116.179
                    Dec 6, 2024 14:17:05.137403965 CET499301500192.168.2.587.120.116.179
                    Dec 6, 2024 14:17:05.137805939 CET499471500192.168.2.587.120.116.179
                    Dec 6, 2024 14:17:05.258318901 CET15004993087.120.116.179192.168.2.5
                    Dec 6, 2024 14:17:05.258661985 CET15004994787.120.116.179192.168.2.5
                    Dec 6, 2024 14:17:05.258774042 CET499471500192.168.2.587.120.116.179
                    Dec 6, 2024 14:17:05.259234905 CET499471500192.168.2.587.120.116.179
                    Dec 6, 2024 14:17:05.378891945 CET15004994787.120.116.179192.168.2.5
                    Dec 6, 2024 14:17:07.394742966 CET15004994787.120.116.179192.168.2.5
                    Dec 6, 2024 14:17:07.394857883 CET499471500192.168.2.587.120.116.179

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:08:15:05
                    Start date:06/12/2024
                    Path:C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c1298500.dat-decoded.exe"
                    Imagebase:0x700000
                    File size:48'640 bytes
                    MD5 hash:EA40E46310163064F9F33FF2FB152364
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000000.2025019884.0000000000702000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3273764026.0000000000C62000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3274113126.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:24%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:6
                      Total number of Limit Nodes:0
                      execution_graph 1586 7ff848f42d3d 1587 7ff848f42d4b VirtualProtect 1586->1587 1589 7ff848f42e2b 1587->1589 1590 7ff848f429e1 1591 7ff848f429eb LoadLibraryA 1590->1591 1593 7ff848f42ad2 1591->1593

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 102 7ff848f430e5-7ff848f43142 108 7ff848f43148-7ff848f431ed 102->108 109 7ff848f43381-7ff848f433c2 call 7ff848f41998 102->109 137 7ff848f432b3 108->137 138 7ff848f431f3-7ff848f432a0 108->138 117 7ff848f433d7-7ff848f433e0 109->117 118 7ff848f433c4-7ff848f433d5 109->118 121 7ff848f433e8-7ff848f43404 117->121 118->121 127 7ff848f43419-7ff848f4341e 121->127 128 7ff848f43406-7ff848f43417 121->128 131 7ff848f43425-7ff848f4348b call 7ff848f419a8 call 7ff848f419b8 127->131 128->131 151 7ff848f43512 131->151 152 7ff848f43491-7ff848f434dd 131->152 142 7ff848f432b8-7ff848f432df 137->142 138->137 178 7ff848f432a2-7ff848f432ad 138->178 159 7ff848f432e1-7ff848f432ef 142->159 156 7ff848f43517-7ff848f4353f 151->156 152->151 180 7ff848f434df-7ff848f4350b 152->180 184 7ff848f43541-7ff848f43558 call 7ff848f438d5 156->184 166 7ff848f432f1-7ff848f4330b 159->166 167 7ff848f43365-7ff848f4337c 159->167 174 7ff848f43559-7ff848f4356a 166->174 176 7ff848f43311-7ff848f4332c 166->176 167->174 185 7ff848f43891 174->185 186 7ff848f43570-7ff848f4365e call 7ff848f419c8 call 7ff848f419d8 174->186 183 7ff848f43334-7ff848f43345 176->183 178->142 182 7ff848f432af-7ff848f432b1 178->182 180->156 192 7ff848f4350d-7ff848f43510 180->192 182->159 193 7ff848f4334c-7ff848f4335e 183->193 194 7ff848f43347 183->194 184->174 189 7ff848f43898-7ff848f438a4 185->189 186->137 213 7ff848f43664-7ff848f4367e 186->213 192->184 193->176 197 7ff848f43360 193->197 194->174 197->174 214 7ff848f43684-7ff848f43690 213->214 215 7ff848f43692-7ff848f43698 214->215 216 7ff848f4369a-7ff848f436a1 215->216 217 7ff848f436d0-7ff848f437a6 call 7ff848f42418 215->217 216->215 222 7ff848f436a3-7ff848f436ca call 7ff848f41988 call 7ff848f40628 216->222 240 7ff848f437a7-7ff848f437b8 217->240 222->217 243 7ff848f437ba-7ff848f4388f call 7ff848f42418 240->243 243->189
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3275790682.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848f40000_173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,
                      • API String ID: 0-3772416878
                      • Opcode ID: 12a60f96bba71904d71bdc744a7e1b7a20689954cec8baf4902556c62febc038
                      • Instruction ID: 82c39dea4259fd81a25fed6daf16ff06a96388be4e2c18e6981308e2d99475b2
                      • Opcode Fuzzy Hash: 12a60f96bba71904d71bdc744a7e1b7a20689954cec8baf4902556c62febc038
                      • Instruction Fuzzy Hash: 0D32C031A1D90A8FE798FB2C94556B9B7E2FFA8790F50057AD00ED32C6DF28AC418745

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 254 7ff848f429e1-7ff848f42ad0 LoadLibraryA 260 7ff848f42ad8-7ff848f42b31 call 7ff848f42b32 254->260 261 7ff848f42ad2 254->261 261->260
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.3275790682.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848f40000_173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 64d1baa544a3c42b26e9e2675646358ce0c681f84caed3cfffaf00bdf0480396
                      • Instruction ID: 1a57f69f3a0f5eb385a54d11ab9547dd5272b64fa53a562c24042017bc540ea1
                      • Opcode Fuzzy Hash: 64d1baa544a3c42b26e9e2675646358ce0c681f84caed3cfffaf00bdf0480396
                      • Instruction Fuzzy Hash: AA413A30908A5C8FDB98EF98D859BE9BBF1FB99310F10416AD04DD7292CB75A845CB81

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 267 7ff848f42d3d-7ff848f42d49 268 7ff848f42d4b-7ff848f42d53 267->268 269 7ff848f42d54-7ff848f42d63 267->269 268->269 270 7ff848f42d6e-7ff848f42e29 VirtualProtect 269->270 271 7ff848f42d65-7ff848f42d6d 269->271 276 7ff848f42e2b 270->276 277 7ff848f42e31-7ff848f42e59 270->277 271->270 276->277
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.3275790682.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7ff848f40000_173349054689897a42ce4a1face346760a1e1ea6ee459f1c43651627f7c7690c5adf7c.jbxd
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: b65eb13b3b2cd5bcfd62e547033a234e9f87fd35a35fb6dcede20bf914289911
                      • Instruction ID: 719840899a3370efd193875b54b1599b472a627079d982204fe445cfe67cf0a4
                      • Opcode Fuzzy Hash: b65eb13b3b2cd5bcfd62e547033a234e9f87fd35a35fb6dcede20bf914289911
                      • Instruction Fuzzy Hash: 6B41063190D7884FDB199BA89C466AD7FF0EF96321F0442AFD089D3293CB786406C796