Windows
Analysis Report
4wECQoBvYC.exe
Overview
General Information
Sample name: | 4wECQoBvYC.exerenamed because original name is a hash value |
Original sample name: | 472cd96b1b5771243c40c10cd034324e.exe |
Analysis ID: | 1571962 |
MD5: | 472cd96b1b5771243c40c10cd034324e |
SHA1: | e6544fd71357a36bf5bad454a2662ef3af7a4e03 |
SHA256: | 24c3329fc783efce51593d5e4274008fcff8d86f8df9fd8a47ca0af8df1e031d |
Tags: | exeRATRemcosRATuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 4wECQoBvYC.exe (PID: 6172 cmdline:
"C:\Users\ user\Deskt op\4wECQoB vYC.exe" MD5: 472CD96B1B5771243C40C10CD034324E) - 4wECQoBvYC.exe (PID: 6580 cmdline:
"C:\Users\ user\Deskt op\4wECQoB vYC.exe" MD5: 472CD96B1B5771243C40C10CD034324E) - wscript.exe (PID: 1864 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Loc al\Temp\uk iglbypimmp hepyxgwyog kqxgydyyk. vbs" MD5: FF00E0480075B095948000BDC66E81F0)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
{"Host:Port:Password": ["formationslistcomplet2.sexidude.com:30201:0"], "Assigned name": "sol4", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "kkdhhcnbvyrmqyodgffgfdds-SO2AWR", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "registros.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Capturas de pantalla", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "registro", "Keylog file max size": ""}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 19 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 36 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Michael Haag: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-09T22:42:09.541641+0100 | 2032776 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 181.131.217.244 | 30201 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-09T22:42:10.906189+0100 | 2032777 | 1 | Malware Command and Control Activity Detected | 181.131.217.244 | 30201 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-09T22:42:12.762647+0100 | 2803304 | 3 | Unknown Traffic | 192.168.2.5 | 49707 | 178.237.33.50 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_004084F3 | |
Source: | Code function: | 0_2_00408E76 | |
Source: | Code function: | 0_2_00408636 | |
Source: | Code function: | 0_2_004086CE | |
Source: | Code function: | 0_2_004087AE | |
Source: | Code function: | 2_2_000F293A | |
Source: | Code function: | 2_2_004084F3 | |
Source: | Code function: | 2_2_00408636 | |
Source: | Code function: | 2_2_004086CE | |
Source: | Code function: | 2_2_004087AE | |
Source: | Code function: | 2_2_00408E76 |
Source: | Binary or memory string: |
Exploits |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Privilege Escalation |
---|
Source: | Code function: | 2_2_000C6764 |
Source: | Static PE information: |
Source: | Code function: | 2_2_000CB335 | |
Source: | Code function: | 2_2_000DB42F | |
Source: | Code function: | 2_2_000CB53A | |
Source: | Code function: | 2_2_0010D5E9 | |
Source: | Code function: | 2_2_000C89A9 | |
Source: | Code function: | 2_2_000C7A8C | |
Source: | Code function: | 2_2_000C6AC2 | |
Source: | Code function: | 2_2_000D8C69 | |
Source: | Code function: | 2_2_000C8DA7 |
Source: | Code function: | 2_2_000C6F06 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 2_2_000DA51B |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | Code function: | 2_2_000C99E4 |
Source: | Windows user hook set: | Jump to behavior |
Source: | Code function: | 2_2_000D59C6 |
Source: | Code function: | 2_2_000D59C6 |
Source: | Code function: | 2_2_000D59C6 |
Source: | Code function: | 2_2_000C9B10 |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Spam, unwanted Advertisements and Ransom Demands |
---|
Source: | Code function: | 2_2_000DBB77 |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | File dump: | Jump to dropped file |
Source: | Process Stats: |
Source: | Code function: | 2_2_000D58B9 |
Source: | Code function: | 0_2_004BF370 | |
Source: | Code function: | 0_2_004C4DBB | |
Source: | Code function: | 2_2_000DD071 | |
Source: | Code function: | 2_2_000FD098 | |
Source: | Code function: | 2_2_001120D2 | |
Source: | Code function: | 2_2_000F7150 | |
Source: | Code function: | 2_2_000F61AA | |
Source: | Code function: | 2_2_000E6254 | |
Source: | Code function: | 2_2_000F1377 | |
Source: | Code function: | 2_2_000F651C | |
Source: | Code function: | 2_2_000DE5DF | |
Source: | Code function: | 2_2_0010C739 | |
Source: | Code function: | 2_2_000E67CB | |
Source: | Code function: | 2_2_000F67C6 | |
Source: | Code function: | 2_2_000FC9DD | |
Source: | Code function: | 2_2_000F2A49 | |
Source: | Code function: | 2_2_000F6A8D | |
Source: | Code function: | 2_2_000FCC0C | |
Source: | Code function: | 2_2_000F4D22 | |
Source: | Code function: | 2_2_000F6D48 | |
Source: | Code function: | 2_2_00100E20 | |
Source: | Code function: | 2_2_000FCE3B | |
Source: | Code function: | 2_2_000E6E73 | |
Source: | Code function: | 2_2_00112F00 | |
Source: | Code function: | 2_2_000D2F45 | |
Source: | Code function: | 2_2_000E6FAD | |
Source: | Code function: | 2_2_004BF370 | |
Source: | Code function: | 2_2_004C4DBB |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 0_2_00401896 |
Source: | Code function: | 0_2_004090DF | |
Source: | Code function: | 2_2_000D6AB7 | |
Source: | Code function: | 2_2_004090DF |
Source: | Code function: | 2_2_000CE219 |
Source: | Code function: | 0_2_0040631D |
Source: | Code function: | 2_2_000DA63F |
Source: | Code function: | 2_2_000D9BC4 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 2_2_000DBCE3 |
Source: | Static PE information: |
Source: | Code function: | 0_2_0048D086 | |
Source: | Code function: | 0_2_004BC112 | |
Source: | Code function: | 0_2_004BD313 | |
Source: | Code function: | 0_2_004BC684 | |
Source: | Code function: | 0_2_004BC6AC | |
Source: | Code function: | 0_2_0048CFE6 | |
Source: | Code function: | 2_2_001167FE | |
Source: | Code function: | 2_2_0011B9E6 | |
Source: | Code function: | 2_2_0011CCDD | |
Source: | Code function: | 2_2_0011CD3D | |
Source: | Code function: | 2_2_0011CD39 | |
Source: | Code function: | 2_2_0011CD3D | |
Source: | Code function: | 2_2_00115EC2 | |
Source: | Code function: | 2_2_000F4009 | |
Source: | Code function: | 2_2_0048D086 | |
Source: | Code function: | 2_2_004BC112 | |
Source: | Code function: | 2_2_004BD313 | |
Source: | Code function: | 2_2_004BC684 | |
Source: | Code function: | 2_2_004BC6AC | |
Source: | Code function: | 2_2_0046AEB6 | |
Source: | Code function: | 2_2_0048CFE6 | |
Source: | Code function: | 2_2_0046B085 | |
Source: | Code function: | 2_2_0046B0D3 | |
Source: | Code function: | 2_2_0046B085 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | Code function: | 2_2_000C6128 |
Source: | File created: | Jump to dropped file |
Source: | Code function: | 2_2_000D9BC4 |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File deleted: | Jump to behavior |
Source: | Code function: | 2_2_000DBCE3 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Code function: | 2_2_000CE54F |
Source: | Code function: | 2_2_000D98C2 |
Source: | Window found: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | API coverage: |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Code function: | 2_2_000CB335 | |
Source: | Code function: | 2_2_000DB42F | |
Source: | Code function: | 2_2_000CB53A | |
Source: | Code function: | 2_2_0010D5E9 | |
Source: | Code function: | 2_2_000C89A9 | |
Source: | Code function: | 2_2_000C7A8C | |
Source: | Code function: | 2_2_000C6AC2 | |
Source: | Code function: | 2_2_000D8C69 | |
Source: | Code function: | 2_2_000C8DA7 |
Source: | Code function: | 2_2_000C6F06 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_2-59743 |
Source: | Code function: | 2_2_000FA65D |
Source: | Code function: | 2_2_000DBCE3 |
Source: | Code function: | 2_2_00102554 |
Source: | Code function: | 2_2_0010E92E |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 2_2_000F4168 | |
Source: | Code function: | 2_2_000FA65D | |
Source: | Code function: | 2_2_000F3B44 | |
Source: | Code function: | 2_2_000F3CD7 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: | Jump to behavior |
Source: | Code function: | 2_2_000D0F36 |
Source: | Code function: | 2_2_000D8754 |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_0040906B |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 2_2_000F3E0A |
Source: | Code function: | 2_2_000CE679 | |
Source: | Code function: | 2_2_001110BA | |
Source: | Code function: | 2_2_001070AE | |
Source: | Code function: | 2_2_001111E3 | |
Source: | Code function: | 2_2_001112EA | |
Source: | Code function: | 2_2_001113B7 | |
Source: | Code function: | 2_2_00107597 | |
Source: | Code function: | 2_2_00110A7F | |
Source: | Code function: | 2_2_00110CF7 | |
Source: | Code function: | 2_2_00110D42 | |
Source: | Code function: | 2_2_00110DDD | |
Source: | Code function: | 2_2_00110E6A |
Source: | Code function: | 0_2_004BE9CD |
Source: | Code function: | 2_2_000DA7A2 |
Source: | Code function: | 2_2_0010800F |
Source: | Code function: | 0_2_004999D0 |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 2_2_000CB21B |
Source: | Code function: | 2_2_000CB335 | |
Source: | Code function: | 2_2_000CB335 |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 2_2_000C5042 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 11 Scripting | Valid Accounts | 1 Native API | 11 Scripting | 1 DLL Side-Loading | 1 Disable or Modify Tools | 1 OS Credential Dumping | 2 System Time Discovery | Remote Services | 11 Archive Collected Data | 12 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 12 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 Bypass User Account Control | 1 Deobfuscate/Decode Files or Information | 211 Input Capture | 1 Account Discovery | Remote Desktop Protocol | 211 Input Capture | 2 Encrypted Channel | Exfiltration Over Bluetooth | 1 Defacement |
Email Addresses | DNS Server | Domain Accounts | 2 Service Execution | 1 Windows Service | 1 Access Token Manipulation | 2 Obfuscated Files or Information | 2 Credentials In Files | 1 System Service Discovery | SMB/Windows Admin Shares | 3 Clipboard Data | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | 1 Registry Run Keys / Startup Folder | 1 Windows Service | 1 DLL Side-Loading | NTDS | 3 File and Directory Discovery | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | 122 Process Injection | 1 Bypass User Account Control | LSA Secrets | 24 System Information Discovery | SSH | Keylogging | 12 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | 1 Registry Run Keys / Startup Folder | 1 File Deletion | Cached Domain Credentials | 21 Security Software Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Masquerading | DCSync | 1 Virtualization/Sandbox Evasion | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 Virtualization/Sandbox Evasion | Proc Filesystem | 2 Process Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 Access Token Manipulation | /etc/passwd and /etc/shadow | 1 Application Window Discovery | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
IP Addresses | Compromise Infrastructure | Supply Chain Compromise | PowerShell | Cron | Cron | 122 Process Injection | Network Sniffing | 1 System Owner/User Discovery | Shared Webroot | Local Data Staging | File Transfer Protocols | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | External Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | ReversingLabs | Win32.Trojan.Dresmon |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
formationslistcomplet2.sexidude.com | 181.131.217.244 | true | false | high | |
geoplugin.net | 178.237.33.50 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
181.131.217.244 | formationslistcomplet2.sexidude.com | Colombia | 13489 | EPMTelecomunicacionesSAESPCO | false | |
178.237.33.50 | geoplugin.net | Netherlands | 8455 | ATOM86-ASATOM86NL | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1571962 |
Start date and time: | 2024-12-09 22:41:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 20s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 4wECQoBvYC.exerenamed because original name is a hash value |
Original Sample Name: | 472cd96b1b5771243c40c10cd034324e.exe |
Detection: | MAL |
Classification: | mal100.rans.troj.spyw.expl.evad.winEXE@5/4@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: 4wECQoBvYC.exe
Time | Type | Description |
---|---|---|
16:42:40 | API Interceptor | |
22:42:13 | Autostart | |
22:42:21 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
181.131.217.244 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
178.237.33.50 | Get hash | malicious | Remcos | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos, PureLog Stealer | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
formationslistcomplet2.sexidude.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT, DcRat | Browse |
| ||
Get hash | malicious | AsyncRAT, DcRat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
geoplugin.net | Get hash | malicious | Remcos | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos, PureLog Stealer | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
EPMTelecomunicacionesSAESPCO | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
ATOM86-ASATOM86NL | Get hash | malicious | Remcos | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos, PureLog Stealer | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
|
Process: | C:\Users\user\Desktop\4wECQoBvYC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 488 |
Entropy (8bit): | 3.338316661577143 |
Encrypted: | false |
SSDEEP: | 12:6l9NOlMecml9NcbWFe5Ul9NwMQcl9NwEAbWFe5Ul9Ne6cl9NgbW+:6vNKxcmvNoWqUvNwMQcvNwNWqUvNWvNw |
MD5: | EF1EF533085B93F52C99FAA4F96ED3C5 |
SHA1: | 00995B2944CFAE2AA71F1DD95C30FFF51BDE29A3 |
SHA-256: | 99D5BFE198CD277CFAE118C24F886F860EE00738551652B469CEAD4033197EB6 |
SHA-512: | C5631851E8ED73336044549F7A07989D2A4AEEC95D9AE3FC6F8012AB153508D89423FFF6A72B3183ED128C9C978983CEF42A8657F99DE450E9FB54891B4542E6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\4wECQoBvYC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 963 |
Entropy (8bit): | 5.012684553542002 |
Encrypted: | false |
SSDEEP: | 12:tkluJnd66GkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkw7S:qluNdbauKyGX85jvXhNlT3/7CcVKWro |
MD5: | 63E9F54FEF35B0883D8C0860F2439D33 |
SHA1: | 0D967A12EDADB3087645596E3A31A6B63962AEE9 |
SHA-256: | 9BA9E5646C3B7AE142B3D3B202C18DBDF64348DED02151FEFDE725CE36FB1067 |
SHA-512: | 0560D4E5D0AD7E48BC96386A6ABB2799355119C0E9590D590B383D8F9CB33F0BF30AB9EA1B350DCE25081CC9D5FB8C18B66FCE3A08B7DFE7DABDD9B0D626FC31 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\4wECQoBvYC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 472 |
Entropy (8bit): | 3.5107221010612366 |
Encrypted: | false |
SSDEEP: | 12:xQ4lA2++ugypjBQMPURoFEOw4Q3DxFEOw49Hz/0aimi:7a2+SD/Ow4QT4Ow49Aait |
MD5: | FE625459219AA77126B7B2EDF44A165E |
SHA1: | 270E12ED960A2E1E767183B6832C4F3259299090 |
SHA-256: | C0B8168638F19DC83B83DD1C66CA5F39CC2B65D4F705418FB643F3228B597F48 |
SHA-512: | B8F082E1D9B7677945D87DF5AA6666D6C27EC57A2D5E245F2232193945BAF52B923B3390E1C0C18132C85BCE094C221D997B58901630E48C8FA40754E6EFEBBC |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\4wECQoBvYC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 979567347 |
Entropy (8bit): | 0.0665821266031963 |
Encrypted: | false |
SSDEEP: | |
MD5: | A2F65E3E0026D92BC192BBBB7A5F9ABB |
SHA1: | FE436C6917BEBFBBD1B5F83C3C3314024C4949CB |
SHA-256: | C399A6F27A2C4E0D39BF2AB8B22E1372B2DB28C54BAE81BDADF21D9D4312D4D6 |
SHA-512: | D39D876A88EA94B21F09B07927CFC38E664D489F55D23836AE83856AA84C2EB8439074D628243407E98A564C4DC23868B5295CC28C3CFEB13797DDF8F95486A6 |
Malicious: | true |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.596232553765719 |
TrID: |
|
File name: | 4wECQoBvYC.exe |
File size: | 4'087'808 bytes |
MD5: | 472cd96b1b5771243c40c10cd034324e |
SHA1: | e6544fd71357a36bf5bad454a2662ef3af7a4e03 |
SHA256: | 24c3329fc783efce51593d5e4274008fcff8d86f8df9fd8a47ca0af8df1e031d |
SHA512: | 3ed7fbffc297595e71193c26e3d6468f943dd94f13fbdd65358c4e47c89ab35f50c294894f6e798e05491de9518d8281864752659f84f33fea589099ed466a1f |
SSDEEP: | 49152:SqXI6JHV5G/XEeLTSB/PzpvxGDNMzZxiOkwSF3Gsw/D+ZuWjH6CiolZ:St6JHS/KnzpvxGpM9xUX3rPjR |
TLSH: | A416E164B38782F5CA93207498D5ABAD659963F44F3746C3B3952D2F1B793C10A3B388 |
File Content Preview: | MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$............j...j...j...b...j...f...j...f..8j...b...j..MI...j...b...j...b...j..mI...j...j...h...}...j...}..^j...f...j..{a...j...f...j. |
Icon Hash: | 1f3371716373338f |
Entrypoint: | 0x4bda53 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x4B2A6D78 [Thu Dec 17 17:42:16 2009 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 9d6d3b6b8f33f014f5a7c8d694c9773f |
Instruction |
---|
push 00000060h |
push 0050EEA0h |
call 00007F1998FBE17Eh |
mov edi, 00000094h |
mov eax, edi |
call 00007F1998FBD51Ah |
mov dword ptr [ebp-18h], esp |
mov esi, esp |
mov dword ptr [esi], edi |
push esi |
call dword ptr [004E136Ch] |
mov ecx, dword ptr [esi+10h] |
mov dword ptr [006E55E0h], ecx |
mov eax, dword ptr [esi+04h] |
mov dword ptr [006E55ECh], eax |
mov edx, dword ptr [esi+08h] |
mov dword ptr [006E55F0h], edx |
mov esi, dword ptr [esi+0Ch] |
and esi, 00007FFFh |
mov dword ptr [006E55E4h], esi |
cmp ecx, 02h |
call 00007F1998F5E910h |
add byte ptr [eax], 00000000h |
mov dword ptr [006E55E4h], esi |
shl eax, 08h |
add eax, edx |
mov dword ptr [006E55E8h], eax |
xor esi, esi |
push esi |
mov edi, dword ptr [004E1388h] |
call edi |
cmp word ptr [eax], 5A4Dh |
jne 00007F1998FBE931h |
mov ecx, dword ptr [eax+3Ch] |
add ecx, eax |
cmp dword ptr [ecx], 00004550h |
jne 00007F1998FBE924h |
movzx eax, word ptr [ecx+18h] |
cmp eax, 0000010Bh |
je 00007F1998FBE931h |
cmp eax, 0000020Bh |
je 00007F1998FBE917h |
mov dword ptr [ebp-1Ch], esi |
jmp 00007F1998FBE939h |
cmp dword ptr [ecx+00000084h], 0Eh |
jbe 00007F1998FBE904h |
xor eax, eax |
cmp dword ptr [ecx+000000F8h], esi |
jmp 00007F1998FBE920h |
cmp dword ptr [ecx+74h], 0Eh |
jbe 00007F1998FBE8F4h |
xor eax, eax |
cmp dword ptr [ecx+000000E8h], esi |
setne al |
mov dword ptr [ebp-1Ch], eax |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x12813c | 0x104 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x2e7000 | 0x116c18 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x111290 | 0x48 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xdf044 | 0xe0000 | 3190b08eda668a97a7c1703364eeb9f9 | False | 0.49050467354910715 | data | 6.632563800200495 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xe1000 | 0x49870 | 0x4a000 | 1da98542fc0d8b5b2b6e7680e262c44b | False | 0.29902937605574326 | data | 5.497521367739488 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x12b000 | 0x1bbe94 | 0x1a4000 | b1b83c4f64d47d06ab7b984326ffaa1a | False | 0.9792858305431548 | data | 7.9838719215032015 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x2e7000 | 0x116c18 | 0x117000 | 0cee996523a166b5f9cb7c14ed898703 | False | 0.5741644965277778 | data | 7.249997532227287 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x2e74a8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128 | English | United States | 0.5236486486486487 |
RT_ICON | 0x2e75d0 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 512 | English | United States | 0.48118279569892475 |
RT_ICON | 0x2e78b8 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 1152 | English | United States | 0.3951219512195122 |
RT_ICON | 0x2e7f20 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | English | United States | 0.43713872832369943 |
RT_ICON | 0x2e8488 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | English | United States | 0.6398916967509025 |
RT_ICON | 0x2e8d30 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | English | United States | 0.5298507462686567 |
RT_ICON | 0x2e9bd8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.5682624113475178 |
RT_ICON | 0x2ea040 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.4872950819672131 |
RT_ICON | 0x2ea9c8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.39704502814258913 |
RT_ICON | 0x2eba70 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.34813278008298754 |
RT_ICON | 0x2ee018 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.2675366084081247 |
RT_ICON | 0x2f2240 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 21600 | English | United States | 0.2926524953789279 |
RT_ICON | 0x2f76c8 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 38016 | English | United States | 0.2580933361362203 |
RT_GROUP_ICON | 0x300b70 | 0xbc | data | English | United States | 0.6329787234042553 |
RT_DLGINCLUDE | 0x300c2c | 0x78436 | PC bitmap, Windows 3.x format, 62172 x 2 x 36, image size 492645, cbSize 492598, bits offset 54 | 0.761982387261012 | ||
RT_ANIICON | 0x379064 | 0xcd26 | PC bitmap, Windows 3.x format, 7428 x 2 x 48, image size 52883, cbSize 52518, bits offset 54 | 0.4269964583571347 | ||
RT_ANIICON | 0x385d8c | 0x8fb3 | PC bitmap, Windows 3.x format, 4840 x 2 x 53, image size 37717, cbSize 36787, bits offset 54 | 0.3975045532389159 | ||
RT_ANIICON | 0x38ed40 | 0xa9c1 | PC bitmap, Windows 3.x format, 6224 x 2 x 46, image size 44274, cbSize 43457, bits offset 54 | 0.3912143037945555 | ||
RT_ANIICON | 0x399704 | 0x349ad | PC bitmap, Windows 3.x format, 27386 x 2 x 44, image size 216267, cbSize 215469, bits offset 54 | 0.4752609424093489 | ||
RT_ANIICON | 0x3ce0b4 | 0x2fb63 | PC bitmap, Windows 3.x format, 25264 x 2 x 45, image size 196298, cbSize 195427, bits offset 54 | 0.4726317243779007 |
DLL | Import |
---|---|
KERNEL32.DLL | MoveFileA, GetFullPathNameA, GetCurrentDirectoryA, GetDriveTypeA, CreateDirectoryA, SetStdHandle, DeleteFileA, SetFilePointer, FlushFileBuffers, HeapReAlloc, GetSystemTimeAsFileTime, GetDateFormatA, GetTimeFormatA, GetStartupInfoA, HeapAlloc, HeapFree, RtlUnwind, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, IsBadWritePtr, SetHandleCount, InterlockedExchange, VirtualQuery, LCMapStringA, LCMapStringW, UnhandledExceptionFilter, FreeEnvironmentStringsA, GetEnvironmentStrings, RaiseException, IsBadReadPtr, OutputDebugStringA, GetStdHandle, ExpandEnvironmentStringsA, WriteFile, ReadFile, GetTempFileNameA, TlsAlloc, TlsSetValue, TlsFree, TlsGetValue, GetSystemInfo, GetTempPathA, ExitProcess, FindFirstFileA, FindClose, CreateFileA, GetWindowsDirectoryA, SetCurrentDirectoryA, CopyFileA, GetFileAttributesA, GetFileType, CloseHandle, TerminateProcess, GetModuleFileNameA, SetEnvironmentVariableA, IsValidCodePage, GetCPInfo, Sleep, GetCurrentProcessId, GetEnvironmentVariableA, GetThreadLocale, GetLocaleInfoA, IsValidLocale, GetUserDefaultLCID, GetACP, HeapSize, GlobalFree, GlobalAlloc, GlobalUnlock, GlobalLock, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetLocaleInfoW, DeleteCriticalSection, GetCommandLineA, SetErrorMode, GetVersionExA, FreeLibrary, LoadLibraryA, GetCurrentThreadId, SetLastError, RemoveDirectoryA, MoveFileExA, GetModuleHandleA, GetProcAddress, GetCurrentProcess, WideCharToMultiByte, SystemTimeToFileTime, FileTimeToLocalFileTime, lstrcmpA, lstrcpyW, LocalAlloc, FileTimeToSystemTime, GetTickCount, GetSystemDirectoryA, MultiByteToWideChar, GetLastError, FormatMessageA, LocalFree, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetUnhandledExceptionFilter, GetTimeZoneInformation, VirtualProtect, EnumSystemLocalesA, GetStringTypeA, GetStringTypeW, SetEndOfFile, IsBadCodePtr, GetOEMCP, CompareStringA, CompareStringW, QueryPerformanceCounter |
ADVAPI32.dll | DeleteService, RegCreateKeyA, FreeSid, CheckTokenMembership, AllocateAndInitializeSid, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, CreateServiceA, RegCloseKey, RegDeleteKeyA, OpenSCManagerA, OpenServiceA, CloseServiceHandle, QueryServiceStatus, RegOpenKeyExA, ControlService, StartServiceA, RegQueryValueExA, RegSetValueExA |
COMCTL32.dll | ImageList_Add, ImageList_BeginDrag, ImageList_Create, ImageList_ReplaceIcon, ImageList_SetDragCursorImage, ImageList_DragLeave, ImageList_DragEnter, ImageList_DragMove, ImageList_EndDrag, ImageList_Destroy, ImageList_GetImageCount, ImageList_Draw, ImageList_GetIconSize |
comdlg32.dll | PageSetupDlgA, PrintDlgA, ChooseFontA, ChooseColorA, GetSaveFileNameA, CommDlgExtendedError, GetOpenFileNameA |
CRYPT32.dll | CertGetNameStringA, CryptDecodeObject, CryptMsgClose, CertCloseStore, CertVerifyTimeValidity, CertFindCertificateInStore, CryptMsgGetParam, CryptQueryObject, CertFreeCertificateContext |
GDI32.dll | GetNearestPaletteIndex, CreatePalette, SetStretchBltMode, GetClipBox, ExtSelectClipRgn, ExtFloodFill, GetPixel, SetPixel, Polyline, PolyBezier, TextOutA, SetROP2, GetCharABCWidthsA, GetTextExtentExPointA, SetWindowOrgEx, SetViewportOrgEx, SetWindowExtEx, SetViewportExtEx, SetMapMode, GetBkColor, GetTextColor, Arc, CreatePatternBrush, Polygon, SetPolyFillMode, PolyPolygon, Rectangle, RoundRect, Ellipse, SetBrushOrgEx, MaskBlt, StretchBlt, StretchDIBits, RestoreDC, SaveDC, GetRgnBox, EqualRgn, PtInRegion, PatBlt, CreateICA, CreateDIBSection, GetDIBits, CreateDIBitmap, GetDIBColorTable, EnumFontFamiliesExA, GetEnhMetaFileA, CopyEnhMetaFileA, DeleteEnhMetaFile, SetAbortProc, StartDocA, EndDoc, StartPage, EndPage, CreateDCA, GetSystemPaletteEntries, CreateHatchBrush, MoveToEx, LineTo, ExtCreatePen, GetStockObject, CreateBitmap, CreateCompatibleBitmap, BitBlt, DeleteDC, CreateCompatibleDC, GetPaletteEntries, SetTextAlign, RectInRegion, CreateRectRgnIndirect, CombineRgn, SelectClipRgn, GetObjectA, CreateSolidBrush, CreatePen, SetBkMode, SetTextColor, SetBkColor, GetRegionData, ExtCreateRegion, OffsetRgn, ExcludeClipRect, CreateRectRgn, GetTextExtentPoint32A, SelectPalette, RealizePalette, GdiFlush, SelectObject, GetTextMetricsA, GetDeviceCaps, DeleteObject, Pie, CreateFontIndirectA |
ole32.dll | OleUninitialize, OleInitialize, RegisterDragDrop, CoLockObjectExternal, RevokeDragDrop, OleSetClipboard, OleIsCurrentClipboard, OleFlushClipboard, ReleaseStgMedium, OleGetClipboard, CoCreateInstance |
OLEAUT32.dll | SysAllocString, SysFreeString, SysStringLen |
SHELL32.dll | SHGetPathFromIDListA, SHGetMalloc, ShellExecuteExA, ExtractIconExA, ExtractIconA, DragQueryFileA, DragFinish, DragQueryPoint, DragAcceptFiles, SHGetSpecialFolderLocation |
USER32.dll | PostThreadMessageA, MessageBeep, SetTimer, KillTimer, ShowCursor, EnumDisplaySettingsA, ChangeDisplaySettingsA, SetClipboardData, RegisterClipboardFormatA, DrawStateA, DrawEdge, GetMenuStringA, DefMDIChildProcA, TranslateMDISysAccel, DefFrameProcA, GetMessagePos, MapWindowPoints, ChildWindowFromPoint, InsertMenuItemA, GetSubMenu, CreateMenu, AppendMenuA, InsertMenuA, RemoveMenu, CreatePopupMenu, SetMenuItemInfoA, UnionRect, GetWindowDC, ModifyMenuA, CheckMenuRadioItem, CheckMenuItem, GetMenuState, TranslateAcceleratorA, CreateAcceleratorTableA, DestroyAcceleratorTable, ValidateRect, GetMessageA, DrawIconEx, DrawFrameControl, GetWindowTextA, GetClassNameA, DestroyCursor, CreateIconIndirect, LoadImageA, DestroyIcon, GetIconInfo, LoadBitmapA, LoadIconA, LoadCursorA, MessageBoxA, DdeFreeStringHandle, BeginPaint, DrawIcon, EndPaint, SetMenu, PostMessageA, HideCaret, OpenClipboard, IsClipboardFormatAvailable, CloseClipboard, keybd_event, SetForegroundWindow, GetForegroundWindow, OffsetRect, DrawFocusRect, CopyRect, DrawTextA, CreateDialogIndirectParamA, RegisterClassA, UnregisterClassA, FlashWindow, SetWindowRgn, AdjustWindowRectEx, GetSystemMenu, EnableMenuItem, DrawMenuBar, GetDesktopWindow, IsIconic, GetDC, ReleaseDC, SendMessageA, PostQuitMessage, TranslateMessage, DispatchMessageA, PeekMessageA, DestroyMenu, IsZoomed, BringWindowToTop, GetDlgItem, CreateDialogParamA, InflateRect, GetUpdateRgn, GetSysColor, CreateWindowExA, SetWindowsHookExA, IsDialogMessageA, TrackPopupMenu, IsWindow, PtInRect, SetCursor, GetCapture, DestroyWindow, UnhookWindowsHookEx, UnregisterHotKey, RegisterHotKey, CallNextHookEx, GetActiveWindow, GetMenuItemCount, GetMenuItemInfoA, SystemParametersInfoA, GetMessageTime, GetWindow, DdeQueryStringA, DdeUninitialize, DdeFreeDataHandle, DdeGetData, DdeCreateDataHandle, DdeGetLastError, DdeInitializeA, DdeDisconnect, DdeClientTransaction, GetUpdateRect, DdeCreateStringHandleA, GetAsyncKeyState, GetSystemMetrics, GetKeyState, GetWindowRect, GetClientRect, FillRect, GetWindowLongA, SetWindowLongA, SetWindowPos, SetFocus, EnableWindow, ShowWindow, DdePostAdvise, DdeConnect, GetWindowTextLengthA, DdeNameService, SetCapture, ReleaseCapture, BeginDeferWindowPos, EndDeferWindowPos, InvalidateRect, SetWindowTextA, GetFocus, IsWindowEnabled, IsWindowVisible, CallWindowProcA, DefWindowProcA, DeferWindowPos, MoveWindow, ClientToScreen, ScreenToClient, UpdateWindow, RedrawWindow, SetParent, GetCursorPos, WindowFromPoint, GetParent, ScrollWindow, SetScrollInfo, GetScrollInfo, SetCursorPos |
WINTRUST.dll | WinVerifyTrust |
WSOCK32.dll | closesocket, inet_addr, ntohs, WSAGetLastError, recvfrom, sendto, htons, bind, ioctlsocket, setsockopt, inet_ntoa, socket, WSAStartup |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-09T22:42:09.541641+0100 | 2032776 | ET MALWARE Remcos 3.x Unencrypted Checkin | 1 | 192.168.2.5 | 49704 | 181.131.217.244 | 30201 | TCP |
2024-12-09T22:42:10.906189+0100 | 2032777 | ET MALWARE Remcos 3.x Unencrypted Server Response | 1 | 181.131.217.244 | 30201 | 192.168.2.5 | 49704 | TCP |
2024-12-09T22:42:12.762647+0100 | 2803304 | ETPRO MALWARE Common Downloader Header Pattern HCa | 3 | 192.168.2.5 | 49707 | 178.237.33.50 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 9, 2024 22:42:09.420866966 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:42:09.540417910 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:42:09.540543079 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:42:09.541640997 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:42:09.660990000 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:42:10.906188965 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:42:10.908030033 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:42:11.027600050 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:42:11.143222094 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:42:11.194607019 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:42:11.369736910 CET | 49707 | 80 | 192.168.2.5 | 178.237.33.50 |
Dec 9, 2024 22:42:11.489306927 CET | 80 | 49707 | 178.237.33.50 | 192.168.2.5 |
Dec 9, 2024 22:42:11.489402056 CET | 49707 | 80 | 192.168.2.5 | 178.237.33.50 |
Dec 9, 2024 22:42:11.489861965 CET | 49707 | 80 | 192.168.2.5 | 178.237.33.50 |
Dec 9, 2024 22:42:11.609793901 CET | 80 | 49707 | 178.237.33.50 | 192.168.2.5 |
Dec 9, 2024 22:42:12.762583017 CET | 80 | 49707 | 178.237.33.50 | 192.168.2.5 |
Dec 9, 2024 22:42:12.762646914 CET | 49707 | 80 | 192.168.2.5 | 178.237.33.50 |
Dec 9, 2024 22:42:12.811506033 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:42:12.930792093 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:42:13.791745901 CET | 80 | 49707 | 178.237.33.50 | 192.168.2.5 |
Dec 9, 2024 22:42:13.791812897 CET | 49707 | 80 | 192.168.2.5 | 178.237.33.50 |
Dec 9, 2024 22:42:14.266426086 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:42:14.267865896 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:42:14.387175083 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:42:44.068172932 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:42:44.069478989 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:42:44.189424038 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:43:14.086321115 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:43:14.088033915 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:43:14.207384109 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:43:44.114494085 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:43:44.123960972 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:43:44.243971109 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:43:59.466826916 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:43:59.710438013 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:43:59.819334030 CET | 30201 | 49704 | 181.131.217.244 | 192.168.2.5 |
Dec 9, 2024 22:43:59.819804907 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:44:00.086797953 CET | 49704 | 30201 | 192.168.2.5 | 181.131.217.244 |
Dec 9, 2024 22:44:00.087157011 CET | 49707 | 80 | 192.168.2.5 | 178.237.33.50 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 9, 2024 22:42:08.764693975 CET | 58890 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 9, 2024 22:42:09.412091017 CET | 53 | 58890 | 1.1.1.1 | 192.168.2.5 |
Dec 9, 2024 22:42:11.213816881 CET | 55486 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 9, 2024 22:42:11.353635073 CET | 53 | 55486 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 9, 2024 22:42:08.764693975 CET | 192.168.2.5 | 1.1.1.1 | 0x61d3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 9, 2024 22:42:11.213816881 CET | 192.168.2.5 | 1.1.1.1 | 0x13e6 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 9, 2024 22:42:09.412091017 CET | 1.1.1.1 | 192.168.2.5 | 0x61d3 | No error (0) | 181.131.217.244 | A (IP address) | IN (0x0001) | false | ||
Dec 9, 2024 22:42:11.353635073 CET | 1.1.1.1 | 192.168.2.5 | 0x13e6 | No error (0) | 178.237.33.50 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49707 | 178.237.33.50 | 80 | 6580 | C:\Users\user\Desktop\4wECQoBvYC.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 9, 2024 22:42:11.489861965 CET | 71 | OUT | |
Dec 9, 2024 22:42:12.762583017 CET | 1171 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 16:41:52 |
Start date: | 09/12/2024 |
Path: | C:\Users\user\Desktop\4wECQoBvYC.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 4'087'808 bytes |
MD5 hash: | 472CD96B1B5771243C40C10CD034324E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 16:42:07 |
Start date: | 09/12/2024 |
Path: | C:\Users\user\Desktop\4wECQoBvYC.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 4'087'808 bytes |
MD5 hash: | 472CD96B1B5771243C40C10CD034324E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 16:43:58 |
Start date: | 09/12/2024 |
Path: | C:\Windows\SysWOW64\wscript.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf0000 |
File size: | 147'456 bytes |
MD5 hash: | FF00E0480075B095948000BDC66E81F0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 0.1% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 4 |
Total number of Limit Nodes: | 0 |
Graph
Function 004BDA53 Relevance: 1.5, APIs: 1, Instructions: 22COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004087AE Relevance: 44.2, APIs: 14, Strings: 11, Instructions: 467encryptiontimememoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00401896 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 66windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004084F3 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 106encryptionmemorystringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004086CE Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 65encryptionmemorystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00408636 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 57timestringencryptionCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040906B Relevance: 4.5, APIs: 3, Instructions: 46memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004BF370 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004073EA Relevance: 51.0, APIs: 17, Strings: 12, Instructions: 222registryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040A208 Relevance: 28.3, APIs: 5, Strings: 11, Instructions: 306serviceCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004C631B Relevance: 21.1, APIs: 8, Strings: 4, Instructions: 115fileCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040725C Relevance: 21.1, APIs: 5, Strings: 7, Instructions: 114serviceCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004082BE Relevance: 19.4, APIs: 9, Strings: 2, Instructions: 141encryptionmemorytimeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00409975 Relevance: 19.4, APIs: 5, Strings: 6, Instructions: 124serviceCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00439740 Relevance: 18.1, APIs: 12, Instructions: 134COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004C3E93 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 115COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004387D0 Relevance: 16.6, APIs: 11, Instructions: 84COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042B120 Relevance: 14.2, APIs: 3, Strings: 5, Instructions: 239windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004241D0 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 187windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040649F Relevance: 12.4, APIs: 3, Strings: 4, Instructions: 152memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00402D90 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 28serviceCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040902D Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 20libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004C5C2A Relevance: 7.7, APIs: 5, Instructions: 184COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004BF798 Relevance: 7.6, APIs: 5, Instructions: 150COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004C318C Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 37threadCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004CA431 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 29libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004C0F23 Relevance: 6.1, APIs: 4, Instructions: 145fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041A460 Relevance: 6.1, APIs: 4, Instructions: 58windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043C050 Relevance: 6.0, APIs: 4, Instructions: 28COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043C010 Relevance: 6.0, APIs: 4, Instructions: 23COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Execution Graph
Execution Coverage: | 3.4% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 5.6% |
Total number of Nodes: | 1472 |
Total number of Limit Nodes: | 52 |
Graph
Function 000DBCE3 Relevance: 115.6, APIs: 40, Strings: 26, Instructions: 140libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C99E4 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 65windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DA51B Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 68networkfileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CE54F Relevance: 8.8, APIs: 2, Strings: 3, Instructions: 88sleepCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DA7A2 Relevance: 3.0, APIs: 2, Instructions: 40COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CE679 Relevance: 1.5, APIs: 1, Instructions: 19COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CBF04 Relevance: 37.0, APIs: 6, Strings: 15, Instructions: 260registryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D3FD4 Relevance: 32.3, APIs: 5, Strings: 13, Instructions: 813sleepnetworkCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C428C Relevance: 19.4, APIs: 4, Strings: 7, Instructions: 147networkCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CA3F4 Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 158sleepCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C9E48 Relevance: 9.2, APIs: 6, Instructions: 163sleepCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C4468 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 92synchronizationnetworkCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C98A5 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 70threadCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C4915 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 60timethreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D26D2 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 37registryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CAFBA Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 20threadCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C4688 Relevance: 6.1, APIs: 4, Instructions: 121synchronizationthreadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DB58F Relevance: 6.1, APIs: 4, Instructions: 64fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D297A Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 23registryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C455B Relevance: 4.5, APIs: 3, Instructions: 28synchronizationnetworkCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D4B9B Relevance: 3.2, APIs: 2, Instructions: 163COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C41F1 Relevance: 3.0, APIs: 2, Instructions: 40networkCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DAC52 Relevance: 3.0, APIs: 2, Instructions: 25COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D3F9A Relevance: 3.0, APIs: 2, Instructions: 21networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C9517 Relevance: 1.6, APIs: 1, Instructions: 64COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C9A97 Relevance: 1.5, APIs: 1, Instructions: 46COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00106AFF Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C4262 Relevance: 1.5, APIs: 1, Instructions: 15networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004087AE Relevance: 44.2, APIs: 14, Strings: 11, Instructions: 467encryptiontimememoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C6F06 Relevance: 34.1, APIs: 10, Strings: 9, Instructions: 849filesleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C5042 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 280pipesleepfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D0F36 Relevance: 30.0, APIs: 7, Strings: 10, Instructions: 238threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CB335 Relevance: 24.6, APIs: 8, Strings: 6, Instructions: 145fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CB53A Relevance: 21.1, APIs: 7, Strings: 5, Instructions: 130fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D59C6 Relevance: 18.1, APIs: 12, Instructions: 80clipboardmemoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CE219 Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 212processCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DB42F Relevance: 13.6, APIs: 9, Instructions: 105fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D2F45 Relevance: 10.9, APIs: 4, Strings: 2, Instructions: 391registrylibraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CB21B Relevance: 10.5, APIs: 2, Strings: 4, Instructions: 48fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C89A9 Relevance: 9.3, APIs: 6, Instructions: 288fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D9BC4 Relevance: 9.0, APIs: 6, Instructions: 39serviceCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004084F3 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 106encryptionmemorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D58B9 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 97libraryloadershutdownCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 001111E3 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 86COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004086CE Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 65encryptionmemorystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408636 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 57timestringencryptionCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C7A8C Relevance: 7.7, APIs: 5, Instructions: 183fileCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C6128 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 222filenetworkCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C8DA7 Relevance: 6.2, APIs: 4, Instructions: 206fileCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00110E6A Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00107597 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 37COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D8C69 Relevance: 3.2, APIs: 2, Instructions: 245fileCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C6AC2 Relevance: 3.1, APIs: 2, Instructions: 86fileCOMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 001110BA Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 001112EA Relevance: 1.5, APIs: 1, Instructions: 46COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000F3CD7 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0010E92E Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D7F9F Relevance: 51.1, APIs: 28, Strings: 1, Instructions: 324windowmemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004073EA Relevance: 51.0, APIs: 17, Strings: 12, Instructions: 222registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D7245 Relevance: 47.5, APIs: 22, Strings: 5, Instructions: 290libraryloaderthreadCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CC28E Relevance: 38.8, APIs: 6, Strings: 16, Instructions: 282registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D12B5 Relevance: 38.7, APIs: 17, Strings: 5, Instructions: 189synchronizationsleepfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DA1BB Relevance: 38.7, APIs: 12, Strings: 10, Instructions: 180synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C1BE8 Relevance: 35.2, APIs: 16, Strings: 4, Instructions: 156fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C64E0 Relevance: 35.1, APIs: 12, Strings: 8, Instructions: 62libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040A208 Relevance: 28.3, APIs: 5, Strings: 11, Instructions: 306serviceCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CBC67 Relevance: 28.2, APIs: 12, Strings: 4, Instructions: 203fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DB1BB Relevance: 28.1, APIs: 15, Strings: 1, Instructions: 139stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0010E20E Relevance: 25.9, APIs: 17, Instructions: 419COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D3E37 Relevance: 24.6, APIs: 9, Strings: 5, Instructions: 109libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000DB824 Relevance: 23.0, APIs: 6, Strings: 7, Instructions: 214registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DCA9E Relevance: 22.8, APIs: 12, Strings: 1, Instructions: 73windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00104F3D Relevance: 22.8, APIs: 15, Instructions: 296COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C631B Relevance: 21.1, APIs: 8, Strings: 4, Instructions: 115fileCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040725C Relevance: 21.1, APIs: 5, Strings: 7, Instructions: 114serviceCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C7DEF Relevance: 19.6, APIs: 8, Strings: 3, Instructions: 325fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004082BE Relevance: 19.4, APIs: 9, Strings: 2, Instructions: 141encryptionmemorytimeCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409975 Relevance: 19.4, APIs: 5, Strings: 6, Instructions: 124serviceCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D9C85 Relevance: 19.3, APIs: 10, Strings: 1, Instructions: 66serviceCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0010F3E1 Relevance: 18.4, APIs: 12, Instructions: 376COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C47EB Relevance: 18.1, APIs: 12, Instructions: 66synchronizationCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D1C81 Relevance: 18.0, APIs: 9, Strings: 1, Instructions: 479sleepfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00114982 Relevance: 17.8, APIs: 9, Strings: 1, Instructions: 272COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004C3E93 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 115COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C4E52 Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 155windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00106DCB Relevance: 15.1, APIs: 10, Instructions: 54COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042B120 Relevance: 14.2, APIs: 3, Strings: 5, Instructions: 239windowCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D9128 Relevance: 14.2, APIs: 6, Strings: 2, Instructions: 174sleeptimeCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00115139 Relevance: 14.2, APIs: 1, Strings: 7, Instructions: 154COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D65FC Relevance: 14.1, APIs: 3, Strings: 5, Instructions: 103sleepfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DC96F Relevance: 14.0, APIs: 7, Strings: 1, Instructions: 47windowstringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00112B2A Relevance: 13.8, APIs: 9, Instructions: 268COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001043F9 Relevance: 12.5, APIs: 6, Strings: 1, Instructions: 266COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004241D0 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 187windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D6E27 Relevance: 12.4, APIs: 4, Strings: 3, Instructions: 107filesynchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C6BE9 Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 97fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00107E3A Relevance: 10.9, APIs: 7, Instructions: 370timeCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0010F806 Relevance: 10.7, APIs: 7, Instructions: 204COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0010A0C3 Relevance: 10.7, APIs: 7, Instructions: 152fileCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00401896 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 66windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CB2A8 Relevance: 10.5, APIs: 2, Strings: 4, Instructions: 48fileCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DBEB0 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 47memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000F95FC Relevance: 9.3, APIs: 6, Instructions: 284COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00106159 Relevance: 9.1, APIs: 3, Strings: 2, Instructions: 389COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D9DEC Relevance: 9.1, APIs: 6, Instructions: 66serviceCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D9C20 Relevance: 9.0, APIs: 6, Instructions: 44serviceCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D9D22 Relevance: 9.0, APIs: 6, Instructions: 44serviceCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D9D87 Relevance: 9.0, APIs: 6, Instructions: 44serviceCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DCA1F Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 54registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C69BA Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42processCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 001025D9 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 38libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C4AB1 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 35synchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D9F32 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 30sleepCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00402D90 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 28serviceCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040902D Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 20libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D0B19 Relevance: 7.7, APIs: 5, Instructions: 198memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004C5C2A Relevance: 7.7, APIs: 5, Instructions: 184COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004BF798 Relevance: 7.6, APIs: 5, Instructions: 150COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000C3DE7 Relevance: 7.6, APIs: 1, Strings: 4, Instructions: 135sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C196B Relevance: 7.6, APIs: 5, Instructions: 72COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CFBEF Relevance: 7.6, APIs: 5, Instructions: 71COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0010E13B Relevance: 7.6, APIs: 5, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CFED2 Relevance: 7.6, APIs: 5, Instructions: 59COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 001032E7 Relevance: 7.5, APIs: 5, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000D29AA Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 173registryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CA611 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 64threadCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C4B29 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 47synchronizationCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D2774 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 38registryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004C318C Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 37threadCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004CA431 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 29libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C1430 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 7libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C14D5 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 7libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004C0F23 Relevance: 6.1, APIs: 4, Instructions: 145fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00101A81 Relevance: 6.1, APIs: 4, Instructions: 133COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000CB806 Relevance: 6.1, APIs: 2, Strings: 2, Instructions: 103sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C9C4B Relevance: 6.1, APIs: 2, Strings: 2, Instructions: 71sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00102CD2 Relevance: 6.1, APIs: 4, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00102D51 Relevance: 6.1, APIs: 4, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041A460 Relevance: 6.1, APIs: 4, Instructions: 58windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00107210 Relevance: 6.1, APIs: 4, Instructions: 52libraryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DB61A Relevance: 6.0, APIs: 4, Instructions: 50fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D850C Relevance: 6.0, APIs: 4, Instructions: 49COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000DB37D Relevance: 6.0, APIs: 4, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043C050 Relevance: 6.0, APIs: 4, Instructions: 28COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C010 Relevance: 6.0, APIs: 4, Instructions: 23COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000C3A10 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 92sleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 001108DE Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 88COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CAD56 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 32keyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000CADB0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 24keyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000D1699 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13synchronizationCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|