Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
850.exe

Overview

General Information

Sample name:850.exe
Analysis ID:1571223
MD5:bbcb59d0329221e6ab409c0aceaef72a
SHA1:317a9e5220efc1438df0957a7199377b8fc400d1
SHA256:31f50eda5a542daad800246c8c8824650f1523bde4c3e944acda96c10fe3b0f7
Tags:AsyncRATexeuser-lontze7
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
.NET source code contains potential unpacker
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • 850.exe (PID: 6920 cmdline: "C:\Users\user\Desktop\850.exe" MD5: BBCB59D0329221E6AB409C0ACEAEF72A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "65.21.198.54", "Port": "850", "Version": "A 13", "MutexName": "AsyncMutex_5552454", "Autorun": "false", "Group": "true"}
SourceRuleDescriptionAuthorStrings
850.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    850.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      850.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xd998:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0x10e38:$a2: Stub.exe
      • 0x10ec8:$a2: Stub.exe
      • 0x9dac:$a3: get_ActivatePong
      • 0xdbb0:$a4: vmware
      • 0xda28:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0xaedc:$a6: get_SslClient
      850.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xda2a:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xd82a:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        Process Memory Space: 850.exe PID: 6920JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: 850.exe PID: 6920INDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0x1cf68:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          SourceRuleDescriptionAuthorStrings
          0.0.850.exe.bc0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.0.850.exe.bc0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.850.exe.bc0000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0xd998:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0x10e38:$a2: Stub.exe
              • 0x10ec8:$a2: Stub.exe
              • 0x9dac:$a3: get_ActivatePong
              • 0xdbb0:$a4: vmware
              • 0xda28:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0xaedc:$a6: get_SslClient
              0.0.850.exe.bc0000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0xda2a:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 850.exeAvira: detected
              Source: 00000000.00000002.3739841417.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "65.21.198.54", "Port": "850", "Version": "A 13", "MutexName": "AsyncMutex_5552454", "Autorun": "false", "Group": "true"}
              Source: 850.exeReversingLabs: Detection: 76%
              Source: 850.exeVirustotal: Detection: 79%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 850.exeJoe Sandbox ML: detected
              Source: 850.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 850.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Yara matchFile source: 850.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.850.exe.bc0000.0.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.7:49702 -> 65.21.198.54:850
              Source: Joe Sandbox ViewASN Name: CP-ASDE CP-ASDE
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54
              Source: unknownTCP traffic detected without corresponding DNS query: 65.21.198.54

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 850.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.850.exe.bc0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 850.exe PID: 6920, type: MEMORYSTR

              System Summary

              barindex
              Source: 850.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 850.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0.0.850.exe.bc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.0.850.exe.bc0000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: 850.exe PID: 6920, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: C:\Users\user\Desktop\850.exeCode function: 0_2_0150E3280_2_0150E328
              Source: 850.exe, 00000000.00000000.1286757447.0000000000BD4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs 850.exe
              Source: 850.exe, 00000000.00000002.3740948439.0000000005929000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 850.exe
              Source: 850.exeBinary or memory string: OriginalFilenameStub.exe" vs 850.exe
              Source: 850.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 850.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 850.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0.0.850.exe.bc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.0.850.exe.bc0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: 850.exe PID: 6920, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 850.exe, kfzEcsqnbPQk.csBase64 encoded string: 'Ywh6U9qkjx6Igc50M0jq7mCp9YdS2+tErnz3TBprAM/E0LZx1RjeeLwKMBMSIWTM2jODABl5q0EawqA4UXhPMg==', 'LMqlOIdy0lT5vXKb/LByp02UrAf791yfcXm1S8p4mu1rsH1QLqXUR4GLUFvzkDvfnMlZB1654Jvbf1uvae8qLg==', 'pE3eIOm2LFhxkKn7axUb9gNIzs1lLZLQEZu6Llneg0JBkLktf1oe0QlUmeeLJMG5+ZvIur/p+W8Wx9k6sL6PzQ==', 'JhS10/4XyoYM5zsZHsfughEczac6KjCdW3sv0DX4NNCaKSdsaZdh9zy9qK3GTFwExVfhaCKv4wjkX3RD7fK4VA==', 'Qxtb3t29aWPI9yCMcMcs7FWNfHXR0+CIr8eKXdMJx5t9HjqX/1XXF3dePQDl1fqmyTmwE11CvQbRtaxVoOARoCfEseKJooiDuq03rZ/uvUg=', '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', 'pz/ogAaRcWOtGNi20ZaWWMw3e97soaq/cIHLCuz+pexDz7HYAP5dt6yydvuNGXNKgfPxlWLqYuxHs+LY9GE/LhWaNvK04CuCP1+sWdUJWyPTu5cuTBN67Sp1s8VCrfGKplYHBXMr+oCI8vAOGZg4getDTKxSYcSmCPnPWFm
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@0/1
              Source: C:\Users\user\Desktop\850.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_5552454
              Source: C:\Users\user\Desktop\850.exeMutant created: NULL
              Source: 850.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 850.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\850.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 850.exeReversingLabs: Detection: 76%
              Source: 850.exeVirustotal: Detection: 79%
              Source: C:\Users\user\Desktop\850.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\850.exeSection loaded: schannel.dllJump to behavior
              Source: 850.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: 850.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: 850.exe, yTXDgdzKkUZEy.cs.Net Code: zZEnjKEUPGrPh System.AppDomain.Load(byte[])
              Source: 850.exe, sJzixzjPUkf.csHigh entropy of concatenated method names: 'IfExTTjnktaX', 'MozAIbYaGW', 'SVsWodqLZneal', 'oIUANkEUIesYI', 'PuvDQwjHBTjnz', 'kzvhUTSjSSX', 'IQnjbAXBKPH', 'XaLeNchVQTI', 'cGXsmtmllnwPOZ', 'NtfFBQDmlfM'

              Boot Survival

              barindex
              Source: Yara matchFile source: 850.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.850.exe.bc0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 850.exe PID: 6920, type: MEMORYSTR
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\850.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 850.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.850.exe.bc0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 850.exe PID: 6920, type: MEMORYSTR
              Source: 850.exeBinary or memory string: SBIEDLL.DLLM\B(BC1|[13])[A-ZA-HJ-NP-Z0-9]{26,45}\B
              Source: C:\Users\user\Desktop\850.exeMemory allocated: 1500000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\850.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\850.exeMemory allocated: 4ED0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\850.exeWindow / User API: threadDelayed 3790Jump to behavior
              Source: C:\Users\user\Desktop\850.exeWindow / User API: threadDelayed 6198Jump to behavior
              Source: C:\Users\user\Desktop\850.exe TID: 1648Thread sleep count: 3790 > 30Jump to behavior
              Source: C:\Users\user\Desktop\850.exe TID: 1648Thread sleep time: -3790000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\850.exe TID: 1648Thread sleep count: 6198 > 30Jump to behavior
              Source: C:\Users\user\Desktop\850.exe TID: 1648Thread sleep time: -6198000s >= -30000sJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\850.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: 850.exeBinary or memory string: vmware
              Source: 850.exe, 00000000.00000002.3739345563.0000000001292000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\850.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\850.exeProcess Stats: CPU usage > 42% for more than 60s
              Source: C:\Users\user\Desktop\850.exeProcess token adjusted: DebugJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\850.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\850.exeQueries volume information: C:\Users\user\Desktop\850.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\850.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\850.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\850.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\850.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: 850.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.850.exe.bc0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 850.exe PID: 6920, type: MEMORYSTR

              Stealing of Sensitive Information

              barindex
              Source: 850.exe, 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: FalseQ\AppData\Roaming\Exodus\exodus.conf.json
              Source: 850.exe, 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: FalseQ\AppData\Roaming\Exodus\exodus.conf.json
              Source: 850.exe, 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: FalseQ\AppData\Roaming\Exodus\exodus.conf.json
              Source: 850.exe, 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AtomicI\AppData\Roaming\binance\Preferences
              Source: 850.exe, 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: InstalledK\AppData\Roaming\Ledger Live\app.json
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              121
              Virtualization/Sandbox Evasion
              OS Credential Dumping21
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory121
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Data from Local System
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
              Obfuscated Files or Information
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Software Packing
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets13
              System Information Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              850.exe76%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
              850.exe79%VirustotalBrowse
              850.exe100%AviraTR/Dropper.Gen
              850.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              65.21.198.54
              unknownUnited States
              199592CP-ASDEtrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1571223
              Start date and time:2024-12-09 07:11:44 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 18s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:8
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:850.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@1/0@0/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 12
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              TimeTypeDescription
              02:34:17API Interceptor7635210x Sleep call for process: 850.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CP-ASDEtDLozbx48F.exeGet hashmaliciousGurcu StealerBrowse
              • 65.21.49.163
              botx.spc.elfGet hashmaliciousMiraiBrowse
              • 65.21.172.4
              Finish_Agreement_DocuSign.pdfGet hashmaliciousUnknownBrowse
              • 65.21.29.43
              RasTls.dllGet hashmaliciousUnknownBrowse
              • 65.20.90.139
              RasTls.dllGet hashmaliciousUnknownBrowse
              • 65.20.90.139
              RFQ.scr.exeGet hashmaliciousDiscord Token StealerBrowse
              • 65.21.66.211
              hiss.arm7.elfGet hashmaliciousUnknownBrowse
              • 65.20.118.153
              Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
              • 65.21.172.133
              Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
              • 65.21.98.72
              0438.pdf.exeGet hashmaliciousUnknownBrowse
              • 65.21.245.7
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):5.496538881675499
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:850.exe
              File size:71'168 bytes
              MD5:bbcb59d0329221e6ab409c0aceaef72a
              SHA1:317a9e5220efc1438df0957a7199377b8fc400d1
              SHA256:31f50eda5a542daad800246c8c8824650f1523bde4c3e944acda96c10fe3b0f7
              SHA512:2ec6686cf4d46d68f7c4e10240b1f7dec3d4c78c62c5fd1358ac8dc001555e62fbf851897a47fb5681763b2ad7e75a435143f7e6bd67468f8fa30015a245e8ff
              SSDEEP:1536:goTwK0N6HQ/sKxDwtc/l39PvlbcdPVUdvLcMBYWSVtAONx:goTwK0N6HQ/Bxsq9NHlbcd9avLcMqvrz
              TLSH:A863D8007FF99015F2FEAF706DF665510BB9F5A76A12E50E2D8411C90922F819E02BBF
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Rg.f.............................)... ...@....@.. ....................................`................................
              Icon Hash:00928e8e8686b000
              Entrypoint:0x4129be
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x66D86752 [Wed Sep 4 13:57:38 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x129640x57.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x7ff.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x109c40x10a00eb60ca49bf5e9bbb67b5559c0a2b9daaFalse0.48265683740601506data5.5317449441437825IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x140000x7ff0x80084ea5c50756e42389ede56e284c936a1False0.4169921875data4.887541126326967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x160000xc0x200f15f3321ec5a6830049f05613ae4100aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0x140a00x2ccdata0.43575418994413406
              RT_MANIFEST0x1436c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
              DLLImport
              mscoree.dll_CorExeMain
              TimestampSource PortDest PortSource IPDest IP
              Dec 9, 2024 07:12:48.554074049 CET49702850192.168.2.765.21.198.54
              Dec 9, 2024 07:12:48.673346043 CET8504970265.21.198.54192.168.2.7
              Dec 9, 2024 07:12:48.673445940 CET49702850192.168.2.765.21.198.54
              Dec 9, 2024 07:12:48.685082912 CET49702850192.168.2.765.21.198.54
              Dec 9, 2024 07:12:48.804383039 CET8504970265.21.198.54192.168.2.7
              Dec 9, 2024 07:13:10.575392962 CET8504970265.21.198.54192.168.2.7
              Dec 9, 2024 07:13:10.575539112 CET49702850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:15.817523956 CET49702850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:15.817831039 CET49769850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:15.936817884 CET8504970265.21.198.54192.168.2.7
              Dec 9, 2024 07:13:15.937021017 CET8504976965.21.198.54192.168.2.7
              Dec 9, 2024 07:13:15.937098026 CET49769850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:15.937422037 CET49769850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:16.056682110 CET8504976965.21.198.54192.168.2.7
              Dec 9, 2024 07:13:37.841666937 CET8504976965.21.198.54192.168.2.7
              Dec 9, 2024 07:13:37.841798067 CET49769850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:42.909854889 CET49769850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:42.910156012 CET49832850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:43.029130936 CET8504976965.21.198.54192.168.2.7
              Dec 9, 2024 07:13:43.029381990 CET8504983265.21.198.54192.168.2.7
              Dec 9, 2024 07:13:43.029443026 CET49832850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:43.030072927 CET49832850192.168.2.765.21.198.54
              Dec 9, 2024 07:13:43.149692059 CET8504983265.21.198.54192.168.2.7
              Dec 9, 2024 07:14:04.920241117 CET8504983265.21.198.54192.168.2.7
              Dec 9, 2024 07:14:04.920301914 CET49832850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:09.925344944 CET49832850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:09.926141977 CET49897850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:10.044668913 CET8504983265.21.198.54192.168.2.7
              Dec 9, 2024 07:14:10.045344114 CET8504989765.21.198.54192.168.2.7
              Dec 9, 2024 07:14:10.045702934 CET49897850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:10.046278954 CET49897850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:10.165715933 CET8504989765.21.198.54192.168.2.7
              Dec 9, 2024 07:14:31.967644930 CET8504989765.21.198.54192.168.2.7
              Dec 9, 2024 07:14:31.971045017 CET49897850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:36.972353935 CET49897850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:36.972820044 CET49959850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:37.091645956 CET8504989765.21.198.54192.168.2.7
              Dec 9, 2024 07:14:37.092124939 CET8504995965.21.198.54192.168.2.7
              Dec 9, 2024 07:14:37.092195988 CET49959850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:37.092528105 CET49959850192.168.2.765.21.198.54
              Dec 9, 2024 07:14:37.211831093 CET8504995965.21.198.54192.168.2.7
              Dec 9, 2024 07:14:58.983865023 CET8504995965.21.198.54192.168.2.7
              Dec 9, 2024 07:14:58.983933926 CET49959850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:03.995475054 CET49959850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:03.995939970 CET49980850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:04.114810944 CET8504995965.21.198.54192.168.2.7
              Dec 9, 2024 07:15:04.115151882 CET8504998065.21.198.54192.168.2.7
              Dec 9, 2024 07:15:04.115236044 CET49980850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:04.122294903 CET49980850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:04.241888046 CET8504998065.21.198.54192.168.2.7
              Dec 9, 2024 07:15:26.031671047 CET8504998065.21.198.54192.168.2.7
              Dec 9, 2024 07:15:26.031791925 CET49980850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:31.035170078 CET49980850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:31.035547972 CET49981850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:31.154561996 CET8504998065.21.198.54192.168.2.7
              Dec 9, 2024 07:15:31.154783010 CET8504998165.21.198.54192.168.2.7
              Dec 9, 2024 07:15:31.154882908 CET49981850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:31.155360937 CET49981850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:31.274811029 CET8504998165.21.198.54192.168.2.7
              Dec 9, 2024 07:15:53.047343969 CET8504998165.21.198.54192.168.2.7
              Dec 9, 2024 07:15:53.047713995 CET49981850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:58.051016092 CET49981850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:58.051698923 CET49982850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:58.170202971 CET8504998165.21.198.54192.168.2.7
              Dec 9, 2024 07:15:58.170938015 CET8504998265.21.198.54192.168.2.7
              Dec 9, 2024 07:15:58.171057940 CET49982850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:58.171720982 CET49982850192.168.2.765.21.198.54
              Dec 9, 2024 07:15:58.290925026 CET8504998265.21.198.54192.168.2.7
              Dec 9, 2024 07:16:20.063688993 CET8504998265.21.198.54192.168.2.7
              Dec 9, 2024 07:16:20.063747883 CET49982850192.168.2.765.21.198.54
              Dec 9, 2024 07:16:25.067095995 CET49982850192.168.2.765.21.198.54
              Dec 9, 2024 07:16:25.067096949 CET49983850192.168.2.765.21.198.54
              Dec 9, 2024 07:16:25.186506987 CET8504998265.21.198.54192.168.2.7
              Dec 9, 2024 07:16:25.186526060 CET8504998365.21.198.54192.168.2.7
              Dec 9, 2024 07:16:25.186815023 CET49983850192.168.2.765.21.198.54
              Dec 9, 2024 07:16:25.189241886 CET49983850192.168.2.765.21.198.54
              Dec 9, 2024 07:16:25.308514118 CET8504998365.21.198.54192.168.2.7
              Dec 9, 2024 07:16:47.080790997 CET8504998365.21.198.54192.168.2.7
              Dec 9, 2024 07:16:47.089345932 CET49983850192.168.2.765.21.198.54

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:01:12:43
              Start date:09/12/2024
              Path:C:\Users\user\Desktop\850.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\850.exe"
              Imagebase:0xbc0000
              File size:71'168 bytes
              MD5 hash:BBCB59D0329221E6AB409C0ACEAEF72A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.1286737440.0000000000BC2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:8.3%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:60
                Total number of Limit Nodes:6
                execution_graph 15109 1507f60 15110 1507fa6 GetCurrentProcess 15109->15110 15112 1507ff1 15110->15112 15113 1507ff8 GetCurrentThread 15110->15113 15112->15113 15114 1508035 GetCurrentProcess 15113->15114 15115 150802e 15113->15115 15116 150806b 15114->15116 15115->15114 15121 1508130 15116->15121 15126 1508140 15116->15126 15117 1508093 GetCurrentThreadId 15118 15080c4 15117->15118 15122 150810a 15121->15122 15123 150813a 15121->15123 15122->15117 15129 1507cac 15123->15129 15127 1507cac DuplicateHandle 15126->15127 15128 150816e 15127->15128 15128->15117 15130 15081a8 DuplicateHandle 15129->15130 15131 150816e 15130->15131 15131->15117 15132 1502b28 15133 1502b37 15132->15133 15136 1502b42 15133->15136 15137 1506e58 15133->15137 15141 1506e48 15133->15141 15138 1506e67 15137->15138 15145 15065dc 15138->15145 15142 1506e67 15141->15142 15143 15065dc KiUserCallbackDispatcher 15142->15143 15144 1506e88 15143->15144 15144->15136 15146 15065e7 15145->15146 15149 1507d98 15146->15149 15148 150880e 15148->15148 15150 1507da3 15149->15150 15151 1509334 15150->15151 15153 150abc0 15150->15153 15151->15148 15154 150abe1 15153->15154 15155 150ac05 15154->15155 15157 150ad70 15154->15157 15155->15151 15158 150ad7d 15157->15158 15159 150adb6 15158->15159 15161 1508fcc 15158->15161 15159->15155 15162 1508fd7 15161->15162 15164 150ae28 15162->15164 15165 1509000 15162->15165 15164->15164 15166 150900b 15165->15166 15169 1509010 15166->15169 15168 150ae97 15168->15164 15170 150901b 15169->15170 15175 150bce4 15170->15175 15172 150c418 15172->15168 15173 150abc0 KiUserCallbackDispatcher 15173->15172 15174 150c1f0 15174->15172 15174->15173 15176 150bcef 15175->15176 15177 150d5fa 15176->15177 15179 150d648 15176->15179 15177->15174 15180 150d651 15179->15180 15181 150d6a6 KiUserCallbackDispatcher 15180->15181 15182 150d6d0 15180->15182 15181->15182 15182->15177 15183 1502ca8 15184 1502cec SetWindowsHookExW 15183->15184 15186 1502d32 15184->15186
                Memory Dump Source
                • Source File: 00000000.00000002.3739605145.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1500000_850.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c47bd89d259f1253061b8a70656b81d278bbc0865354f4ad01795accae92c310
                • Instruction ID: e3730c2414aa7f424d0e37fdf9031d99f831908d0f66995f6b4b431a698ccc90
                • Opcode Fuzzy Hash: c47bd89d259f1253061b8a70656b81d278bbc0865354f4ad01795accae92c310
                • Instruction Fuzzy Hash: 62526F31A0061ACFDB16CF98C881AAEB7B2FF44304F558899D915AF291E771FD85CB50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 197 1507f5a-1507fef GetCurrentProcess 202 1507ff1-1507ff7 197->202 203 1507ff8-150802c GetCurrentThread 197->203 202->203 204 1508035-1508069 GetCurrentProcess 203->204 205 150802e-1508034 203->205 207 1508072-150808a 204->207 208 150806b-1508071 204->208 205->204 219 150808d call 1508140 207->219 220 150808d call 1508130 207->220 208->207 211 1508093-15080c2 GetCurrentThreadId 212 15080c4-15080ca 211->212 213 15080cb-150812d 211->213 212->213 219->211 220->211
                APIs
                • GetCurrentProcess.KERNEL32 ref: 01507FDE
                • GetCurrentThread.KERNEL32 ref: 0150801B
                • GetCurrentProcess.KERNEL32 ref: 01508058
                • GetCurrentThreadId.KERNEL32 ref: 015080B1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3739605145.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1500000_850.jbxd
                Similarity
                • API ID: Current$ProcessThread
                • String ID: 5Wv
                • API String ID: 2063062207-2348436390
                • Opcode ID: 8f56b498fd33ba3b26f729656c4a4e0e1052af4f277fa2ca20507435bf87c525
                • Instruction ID: f74be1c587de303b1b0521fb73021bdae74ed108597ed09f96b54f363fcc03ff
                • Opcode Fuzzy Hash: 8f56b498fd33ba3b26f729656c4a4e0e1052af4f277fa2ca20507435bf87c525
                • Instruction Fuzzy Hash: 155143B0901309CFDB14DFAAD949BAEBBF1FF48314F208419E019A72A0DB356945CF66

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 221 1507f60-1507fef GetCurrentProcess 225 1507ff1-1507ff7 221->225 226 1507ff8-150802c GetCurrentThread 221->226 225->226 227 1508035-1508069 GetCurrentProcess 226->227 228 150802e-1508034 226->228 230 1508072-150808a 227->230 231 150806b-1508071 227->231 228->227 242 150808d call 1508140 230->242 243 150808d call 1508130 230->243 231->230 234 1508093-15080c2 GetCurrentThreadId 235 15080c4-15080ca 234->235 236 15080cb-150812d 234->236 235->236 242->234 243->234
                APIs
                • GetCurrentProcess.KERNEL32 ref: 01507FDE
                • GetCurrentThread.KERNEL32 ref: 0150801B
                • GetCurrentProcess.KERNEL32 ref: 01508058
                • GetCurrentThreadId.KERNEL32 ref: 015080B1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3739605145.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1500000_850.jbxd
                Similarity
                • API ID: Current$ProcessThread
                • String ID: 5Wv
                • API String ID: 2063062207-2348436390
                • Opcode ID: 65972bad4819c2a8ded0cf25e3291a5f732f84ba2b2c1c7c4298468c78030a50
                • Instruction ID: 1f8422b0a5083939ece3c37136e4ebb8ccf2b9e94bc610d8a0b45fa2ea048c88
                • Opcode Fuzzy Hash: 65972bad4819c2a8ded0cf25e3291a5f732f84ba2b2c1c7c4298468c78030a50
                • Instruction Fuzzy Hash: 665142B0901309CFDB14DFAAD549BAEBBF1BF88314F208419E019A72A0DB356945CF66

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 277 1507cac-150823c DuplicateHandle 279 1508245-1508262 277->279 280 150823e-1508244 277->280 280->279
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0150816E,?,?,?,?,?), ref: 0150822F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3739605145.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1500000_850.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID: 5Wv
                • API String ID: 3793708945-2348436390
                • Opcode ID: 01fca03dd46a2b08c69424e579babce4da093022ef63dbb848a8464a53582f7a
                • Instruction ID: d882fc720b359efdddd344b9af4ad156ca48ffc3bcfb1b7d7b3365f98b848993
                • Opcode Fuzzy Hash: 01fca03dd46a2b08c69424e579babce4da093022ef63dbb848a8464a53582f7a
                • Instruction Fuzzy Hash: 6021F2B5D003099FDB10CF9AD884AEEBBF4FB48310F14841AE918A7350D375A941CFA4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 283 15081a0-150823c DuplicateHandle 284 1508245-1508262 283->284 285 150823e-1508244 283->285 285->284
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0150816E,?,?,?,?,?), ref: 0150822F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3739605145.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1500000_850.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID: 5Wv
                • API String ID: 3793708945-2348436390
                • Opcode ID: 0542883c5c710395cc671470055eb5b26e54f471afa3ecb284c16e7521f576a2
                • Instruction ID: 77cde26bf1d8205bdb4b4f9d7c69b69831a1eaffef44d2e19a18339268e35bda
                • Opcode Fuzzy Hash: 0542883c5c710395cc671470055eb5b26e54f471afa3ecb284c16e7521f576a2
                • Instruction Fuzzy Hash: A421E3B5D003099FDB10CF9AD985ADEBBF5FB08320F14841AE918A7350D778A955CFA4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 288 1502ca3-1502cf2 291 1502cf4 288->291 292 1502cfe-1502d30 SetWindowsHookExW 288->292 295 1502cfc 291->295 293 1502d32-1502d38 292->293 294 1502d39-1502d5e 292->294 293->294 295->292
                APIs
                • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 01502D23
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3739605145.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1500000_850.jbxd
                Similarity
                • API ID: HookWindows
                • String ID: 5Wv
                • API String ID: 2559412058-2348436390
                • Opcode ID: 8dfd35d03604a8f5ed5dee925c19146193ebce5fbb3a73383f41183793793de7
                • Instruction ID: 02d93094e6fd4fa21d5ab0632759f3e56f4ba500ebdc9f24558287f61e0f6e5b
                • Opcode Fuzzy Hash: 8dfd35d03604a8f5ed5dee925c19146193ebce5fbb3a73383f41183793793de7
                • Instruction Fuzzy Hash: 97213575D002099FDB24DF9AC844BEEBBF5FB88310F108429D419A7290CB75A941CFA4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 299 1502ca8-1502cf2 301 1502cf4 299->301 302 1502cfe-1502d30 SetWindowsHookExW 299->302 305 1502cfc 301->305 303 1502d32-1502d38 302->303 304 1502d39-1502d5e 302->304 303->304 305->302
                APIs
                • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 01502D23
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3739605145.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1500000_850.jbxd
                Similarity
                • API ID: HookWindows
                • String ID: 5Wv
                • API String ID: 2559412058-2348436390
                • Opcode ID: 0794407857e291bfe0790fd59027150c100e960d9b09893980105bec1dd5c40c
                • Instruction ID: 5ffaf0aa965c71800d7d21ab23afc462941830a02c61740289279ba1e406222e
                • Opcode Fuzzy Hash: 0794407857e291bfe0790fd59027150c100e960d9b09893980105bec1dd5c40c
                • Instruction Fuzzy Hash: C7212475D002099FDB24DFAAD844BEEFBF5FB88310F10842AD419A7290CB74A945CFA4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 309 150d648-150d6a4 313 150d6f2-150d70b 309->313 314 150d6a6-150d6ce KiUserCallbackDispatcher 309->314 315 150d6d0-150d6d6 314->315 316 150d6d7-150d6eb 314->316 315->316 316->313
                APIs
                • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0150D6BD
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3739605145.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1500000_850.jbxd
                Similarity
                • API ID: CallbackDispatcherUser
                • String ID: 5Wv
                • API String ID: 2492992576-2348436390
                • Opcode ID: 7f27130aed2b0cf58c87b515e03b3d60685cda5154319f6c9955b0bfc9586df4
                • Instruction ID: cf42a7295826f936db4ff513f3febc680271d777b79bbe2d460f8bbd4a22751b
                • Opcode Fuzzy Hash: 7f27130aed2b0cf58c87b515e03b3d60685cda5154319f6c9955b0bfc9586df4
                • Instruction Fuzzy Hash: 2111AC75805389DEDB21DF9AC8057EEBFF4EB08314F14801AD599B7281CB399604CFA6
                Memory Dump Source
                • Source File: 00000000.00000002.3739028638.00000000011AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11ad000_850.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d5ed296e628be1c4e117ac3937758af34ea24e9ef6666a0bb2f9be7a5877daec
                • Instruction ID: c2be53fc832886bdcf679f775478e3682eb1d2538f64f6c664559ced58c09881
                • Opcode Fuzzy Hash: d5ed296e628be1c4e117ac3937758af34ea24e9ef6666a0bb2f9be7a5877daec
                • Instruction Fuzzy Hash: D9213679504600DFDF19DF54E9C0B26BF71FB88324F60C569E9490AA56C336D406CBA2
                Memory Dump Source
                • Source File: 00000000.00000002.3739101512.00000000011BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011BD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11bd000_850.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b557cd171572db7a957ea6455376238010055459dd7066f4385235d1a9cb54c3
                • Instruction ID: 303d9266b52226b33dc90ec5daa8d382d6e905a2bcf4882b4398e43ace645ae2
                • Opcode Fuzzy Hash: b557cd171572db7a957ea6455376238010055459dd7066f4385235d1a9cb54c3
                • Instruction Fuzzy Hash: 5921F2B56042049FDF0DDF54E9C4B66BBA5EB88328F24C56DD8094B296C33AD846CA62
                Memory Dump Source
                • Source File: 00000000.00000002.3739028638.00000000011AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011AD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11ad000_850.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                • Instruction ID: c0535c3b683604bc329f84d05550ceb01c0b663b1385638483bd4104ae9de4eb
                • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                • Instruction Fuzzy Hash: 6F11DFBA504240CFCF06CF58D5C0B16BF72FB84324F2485A9D9494B657C336D456CBA2
                Memory Dump Source
                • Source File: 00000000.00000002.3739101512.00000000011BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011BD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11bd000_850.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                • Instruction ID: 6b18dbfe12654b8db7acb440af744d35fbde6e0d2476b8e858b29b5bc28db0f0
                • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                • Instruction Fuzzy Hash: A411D075504240CFDB0ACF54D9C4B55BFB1FB44328F24C6ADD8494B256C33AD44ACB51