Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe

Overview

General Information

Sample name:1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
Analysis ID:1572736
MD5:54af7dde5c98e20089ae4a5dc295cb32
SHA1:d7affca6008365f9e8c48ed22847f98d97781738
SHA256:c66fdb0e04d7bee6ac4513956d1cf5f9fc21e27cad0d32bbc7906ff4440ed2e9
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
Yara detected DcRat
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Server": "dcrsf.duckdns.org", "Ports": "5999", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "DXHnpqvTVbV4bhEh6LUz5f6sS1braVIP", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "MIICMDCCAZmgAwIBAgIVAIhNlmebb6nSe6ECHjMpYKJ1i7gvMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTIxMDEyODA1MzU1N1oXDTMxMTEwNzA1MzU1N1owEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALz18kcXxyYRNtzNciIOitqVEEKYOOJZOGjSaWOLKz3M/Df8QpKzt86Y+GK3639BYF/OzJ6i8PyJcI4jCe+L56ytnlJDfAYTzg7df+pvpE6bSgYYgBSEMcKBPrpx6bV5z/V8FOCVqlt9xfM47rHzIs6kOkc0Xu0TqFGxVfi3Koj/AgMBAAGjMjAwMB0GA1UdDgQWBBQOZShjgdZ92lUVGT5AalbF4rcBrDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBABuRWEmIgb/BjPElBrcq4LuUTHLBWgnJN3yXXtFA+Nl/+mYto5FZMUmzz3mbjKRHuzo79jdei4h1vSO9+2gTFWw1mY8HoeEoyL0YExBQMCoUPjpLJEuAydiWBMXXBmv0zPzE3W7zhG6DRe8pXQkZ2yu8c9G4KxXS1ITmSrlJqBQ6", "ServerSignature": "bOH4+nkkOuFt62yM3B3NrX5jCy5PJU3D72L179e0uKevKDfMJUljcwbS8epgem8pE2v7bumGCks5hNJ6yaqqRhVVc/7YrRk3B1yFueVgPNQJL+NYnbEAIIc94f2NV1IzZ0YUw9+iDwAWiK8vp8Zvjop2yuTCnm+vvjUom3TYAoU=", "BDOS": "null", "External_config_on_Pastebin": "false"}
SourceRuleDescriptionAuthorStrings
1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x65fb:$a1: havecamera
    • 0x9aec:$a2: timeout 3 > NUL
    • 0x9b0c:$a3: START "" "
    • 0x9997:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
    • 0x9a4c:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
    1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
    • 0x9a4c:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
    • 0x9997:$s2: L2Mgc2NodGFza3MgL2
    • 0x9916:$s3: QW1zaVNjYW5CdWZmZXI
    • 0x9964:$s4: VmlydHVhbFByb3RlY3Q
    1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
    • 0x9cce:$q1: Select * from Win32_CacheMemory
    • 0x9d0e:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
    • 0x9d5c:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
    • 0x9daa:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
    1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
    • 0xa146:$s1: DcRatBy
    SourceRuleDescriptionAuthorStrings
    dump.pcapWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x4b7:$b2: DcRat By qwqdanchun1
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x63fb:$a1: havecamera
      • 0x98ec:$a2: timeout 3 > NUL
      • 0x990c:$a3: START "" "
      • 0x9797:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
      • 0x984c:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
      00000000.00000002.3278618622.000000001B490000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0xb05cc:$b2: DcRat By qwqdanchun1
      00000000.00000002.3277175130.0000000000E24000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x132a8:$b2: DcRat By qwqdanchun1
      • 0x4dfcc:$b2: DcRat By qwqdanchun1
      • 0x80c60:$b2: DcRat By qwqdanchun1
      00000000.00000002.3277462109.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DcRat_2Yara detected DcRatJoe Security
        Click to see the 6 entries
        SourceRuleDescriptionAuthorStrings
        0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpackWindows_Trojan_DCRat_1aeea1acunknownunknown
          • 0x65fb:$a1: havecamera
          • 0x9aec:$a2: timeout 3 > NUL
          • 0x9b0c:$a3: START "" "
          • 0x9997:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
          • 0x9a4c:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
          0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpackINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
          • 0x9a4c:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
          • 0x9997:$s2: L2Mgc2NodGFza3MgL2
          • 0x9916:$s3: QW1zaVNjYW5CdWZmZXI
          • 0x9964:$s4: VmlydHVhbFByb3RlY3Q
          0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
          • 0x9cce:$q1: Select * from Win32_CacheMemory
          • 0x9d0e:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
          • 0x9d5c:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
          • 0x9daa:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
          0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
          • 0xa146:$s1: DcRatBy
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-10T20:16:03.387892+010020348471Domain Observed Used for C2 Detected45.135.232.385999192.168.2.549704TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-10T20:16:03.387892+010028424781Malware Command and Control Activity Detected45.135.232.385999192.168.2.549704TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-10T20:16:03.387892+010028480481Domain Observed Used for C2 Detected45.135.232.385999192.168.2.549704TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeAvira: detected
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeMalware Configuration Extractor: AsyncRAT {"Server": "dcrsf.duckdns.org", "Ports": "5999", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "DXHnpqvTVbV4bhEh6LUz5f6sS1braVIP", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "bOH4+nkkOuFt62yM3B3NrX5jCy5PJU3D72L179e0uKevKDfMJUljcwbS8epgem8pE2v7bumGCks5hNJ6yaqqRhVVc/7YrRk3B1yFueVgPNQJL+NYnbEAIIc94f2NV1IzZ0YUw9+iDwAWiK8vp8Zvjop2yuTCnm+vvjUom3TYAoU=", "BDOS": "null", "External_config_on_Pastebin": "false"}
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeReversingLabs: Detection: 84%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeJoe Sandbox ML: detected
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 45.135.232.38:5999 -> 192.168.2.5:49704
          Source: Network trafficSuricata IDS: 2034847 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT) : 45.135.232.38:5999 -> 192.168.2.5:49704
          Source: Network trafficSuricata IDS: 2848048 - Severity 1 - ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT) : 45.135.232.38:5999 -> 192.168.2.5:49704
          Source: Malware configuration extractorURLs: dcrsf.duckdns.org
          Source: unknownDNS query: name: dcrsf.duckdns.org
          Source: global trafficTCP traffic: 192.168.2.5:49704 -> 45.135.232.38:5999
          Source: Joe Sandbox ViewIP Address: 45.135.232.38 45.135.232.38
          Source: Joe Sandbox ViewASN Name: ASBAXETNRU ASBAXETNRU
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: dcrsf.duckdns.org
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3278618622.000000001B565000.00000004.00000020.00020000.00000000.sdmp, 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277175130.0000000000DC5000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277175130.0000000000E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enO=
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277462109.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277462109.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe PID: 4580, type: MEMORYSTR

          System Summary

          barindex
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3278618622.000000001B490000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3277175130.0000000000E24000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3277462109.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3277462109.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: Process Memory Space: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe PID: 4580, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeCode function: 0_2_00007FF848E783460_2_00007FF848E78346
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeCode function: 0_2_00007FF848E790F20_2_00007FF848E790F2
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeCode function: 0_2_00007FF848E730E20_2_00007FF848E730E2
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000000.2017137647.00000000007FE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeBinary or memory string: OriginalFilenameClient.exe" vs 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3278618622.000000001B490000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3277175130.0000000000E24000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3277462109.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3277462109.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: Process Memory Space: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe PID: 4580, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, Settings.csBase64 encoded string: 'xzR3cVVpgDycUQgY0as1vV57BHZFANfxtwXNElQNvlNX0kK0iU9IL3xQN2+XEpgKh0TW25v9/F5USJCldzWYSA==', 'Ojc7Uxt2W9ahvmpUFawD24kx1VS0h+nhY8bjPOB74xxMwZoFHQ3qPxNUSZHMhVGKCZwfi/ba73ygTvx56fc1fvKtMiaNGQyrEom49Jb/gZU=', 'n2yz6bXpDdFiWqy6BE4hAkYIiKu+t6elqgn/FXQfxee6+tfIjYGZpnvjENpvBx+vP2XiMQShK3QWLkByknWLpw==', 'Rl6k7a/cZa932SDiKo0g7lhLy45TcBgUyHiG7W44kBrxyE4ev1psl8qcb0Q8RlqcbKQgc1JoK7iq0HrF2r4FHz6wHmNom7WDgrTtbGRYuQs=', 'hZpw8az99+WrFwt1LWQtAkf/TyPWOxU0Gpv8OI6i84MfH0Awk9MK0retDp0F2ospB0hMB0VI9W0EHHIOdYXlFQ==', 'ZoN1FqpLDJ75VZHA+cYpo4pCXT3WlklTJz6yCOJ/TxNWPm6wBDQVRLk+XnZBsTo/Q2NRriAm1VXY7oq9qVvzUw==', 'O9B+96TM8gs9KNmuvCjeC94+uD0js550+ThdE7o8nggf4A1GwQz8NVBYSuTWVUWBqMsfSEeiWG7z77juJCcFvw=='
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, NormalStartup.csBase64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA=='
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/1
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeMutant created: NULL
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeReversingLabs: Detection: 84%
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: cryptnet.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: devenum.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeSection loaded: msdmo.dllJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeCode function: 0_2_00007FF848E700BD pushad ; iretd 0_2_00007FF848E700C1

          Boot Survival

          barindex
          Source: Yara matchFile source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe PID: 4580, type: MEMORYSTR
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe PID: 4580, type: MEMORYSTR
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeMemory allocated: D30000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeMemory allocated: 1ABC0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeWindow / User API: threadDelayed 778Jump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeWindow / User API: threadDelayed 9086Jump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe TID: 4028Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe TID: 1400Thread sleep time: -16602069666338586s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe TID: 3816Thread sleep count: 778 > 30Jump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe TID: 3816Thread sleep count: 9086 > 30Jump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277175130.0000000000E24000.00000004.00000020.00020000.00000000.sdmp, 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3279079004.000000001B718000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3279079004.000000001B718000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWc
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, AntiProcess.csReference to suspicious API methods: OpenProcess(1u, bInheritHandle: false, processId)
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, Amsi.csReference to suspicious API methods: Win32.VirtualAllocEx(procAddress, (UIntPtr)(ulong)patch.Length, 64u, out var _)
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277462109.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277462109.0000000002C3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277462109.0000000002C3B000.00000004.00000800.00020000.00000000.sdmp, 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277462109.0000000002C36000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: Yara matchFile source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe.7f0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe PID: 4580, type: MEMORYSTR
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3278929516.000000001B6AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3278929516.000000001B6AB000.00000004.00000020.00020000.00000000.sdmp, 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3278888765.000000001B680000.00000004.00000020.00020000.00000000.sdmp, 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277175130.0000000000E24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
          Source: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe
          Source: C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000000.00000002.3277462109.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3277462109.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe PID: 4580, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000000.00000002.3277462109.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3277462109.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe PID: 4580, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          Scheduled Task/Job
          1
          Process Injection
          1
          Disable or Modify Tools
          OS Credential Dumping1
          Query Registry
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Scheduled Task/Job
          1
          DLL Side-Loading
          1
          Scheduled Task/Job
          31
          Virtualization/Sandbox Evasion
          LSASS Memory121
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          Native API
          Logon Script (Windows)1
          DLL Side-Loading
          1
          Process Injection
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
          Obfuscated Files or Information
          NTDS31
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput Capture21
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials13
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe84%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
          1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe100%AviraHEUR/AGEN.1307404
          1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          dcrsf.duckdns.org0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          bg.microsoft.map.fastly.net
          199.232.210.172
          truefalse
            high
            dcrsf.duckdns.org
            45.135.232.38
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              dcrsf.duckdns.orgtrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277462109.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe, 00000000.00000002.3277462109.0000000002C41000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.135.232.38
                dcrsf.duckdns.orgRussian Federation
                49392ASBAXETNRUtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1572736
                Start date and time:2024-12-10 20:15:06 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 3m 59s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:4
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@1/2@1/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 5
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded IPs from analysis (whitelisted): 23.193.114.26, 23.193.114.18, 52.149.20.212, 13.107.246.63
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • VT rate limit hit for: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
                TimeTypeDescription
                14:16:05API Interceptor1x Sleep call for process: 1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                45.135.232.381732748284fd56a2da13edf4ae4b865c44fa6834581d27eb2edbfe3fc50ef131cb95db5639506.dat-decoded.exeGet hashmaliciousRemcosBrowse
                  17315457645970cbc5e5c3aae0a844eb233aad28ea87b3b8a58910e225655f6d041f399ede930.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                    17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                      1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                        sostener.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                          172698102496c864a187aff64295ab0b70d4e0148fc884b8fdef49a9c604553959f0c4197e421.dat-decoded.exeGet hashmaliciousRemcosBrowse
                            1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                              decode_3c3a2e81bb9b9ea689c7c8d6aa9e24c0af55f3915e14295a64263688c83f4ab7.exeGet hashmaliciousRemcosBrowse
                                sostener.vbsGet hashmaliciousRemcosBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  bg.microsoft.map.fastly.netDHL__734825514204.exeGet hashmaliciousFormBookBrowse
                                  • 199.232.214.172
                                  FG Or#U00e7amento JAN 2025.pdfGet hashmaliciousUnknownBrowse
                                  • 199.232.214.172
                                  Stonhard Response Required 10 Dec, 2024- 0PH8-NYFV0C-ZDU7.msgGet hashmaliciousUnknownBrowse
                                  • 199.232.214.172
                                  https://intelligentrepairsolutions-my.sharepoint.com/:b:/g/personal/a_zell_irs-group_com/ETrGN6yXppBBt5Jzbj4zKhgBq4v6Oyb7O70AESL4N06CfQ?e=4%3aChQOAq&at=9Get hashmaliciousUnknownBrowse
                                  • 199.232.210.172
                                  https://listafrica.org/Receipt.htmlGet hashmaliciousWinSearchAbuseBrowse
                                  • 199.232.210.172
                                  ExternalREMITTANCE ACH SCHEDULED 1210241424bec0c449d38092c0dbd844252d73 (24.0 KB).msgGet hashmaliciousUnknownBrowse
                                  • 199.232.214.172
                                  Ziraat Bankasi Swift Mesaji.dqy.dllGet hashmaliciousAsyncRAT, VenomRATBrowse
                                  • 199.232.214.172
                                  Price Quotation-01.dqy.dllGet hashmaliciousSnake KeyloggerBrowse
                                  • 199.232.214.172
                                  New Order Enquiry.jsGet hashmaliciousAgentTeslaBrowse
                                  • 199.232.214.172
                                  E-dekont.exeGet hashmaliciousMassLogger RATBrowse
                                  • 199.232.210.172
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ASBAXETNRUJosho.spc.elfGet hashmaliciousUnknownBrowse
                                  • 212.192.27.99
                                  payload.elfGet hashmaliciousUnknownBrowse
                                  • 212.192.15.59
                                  hax.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 91.193.216.228
                                  nscmips.elfGet hashmaliciousUnknownBrowse
                                  • 212.192.12.119
                                  ET5.exeGet hashmaliciousUnknownBrowse
                                  • 45.8.159.106
                                  apilibx64.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 45.130.145.152
                                  venomderek.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 45.130.145.152
                                  botnet.sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                  • 212.196.108.28
                                  mips.elfGet hashmaliciousUnknownBrowse
                                  • 212.192.15.158
                                  ppc.elfGet hashmaliciousUnknownBrowse
                                  • 212.192.15.158
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                  Category:dropped
                                  Size (bytes):71954
                                  Entropy (8bit):7.996617769952133
                                  Encrypted:true
                                  SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                  MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                  SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                  SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                  SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                  Process:C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):328
                                  Entropy (8bit):3.144086598890895
                                  Encrypted:false
                                  SSDEEP:6:kKaaL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:BiDnLNkPlE99SNxAhUe/3
                                  MD5:B251F79C5942E6DFA5AD6BBF8DF9B703
                                  SHA1:F710D85FC7B1BF92765B752EC317B927F63B50D8
                                  SHA-256:1D2CBEE4ADF7A4C606AF5FC974F2EB78810440EDD001AD3251B5414D103F43A1
                                  SHA-512:3D2939491C55741F13316922CDC55CD1C7146DD85AB78C92EBDCABE3BECFD61D4EAC8BFFD143CFFBDD2C1975D9AF5DC0F41A5AA47A88E781903909BA902CA53D
                                  Malicious:false
                                  Reputation:low
                                  Preview:p...... ...........7K..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):5.6204762789751666
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
                                  File size:48'640 bytes
                                  MD5:54af7dde5c98e20089ae4a5dc295cb32
                                  SHA1:d7affca6008365f9e8c48ed22847f98d97781738
                                  SHA256:c66fdb0e04d7bee6ac4513956d1cf5f9fc21e27cad0d32bbc7906ff4440ed2e9
                                  SHA512:c2fa8350cdaa1ba19da3bea5c6ef2a90b6cce3f6a9618483cebaf83c4ed47a1dd90aa5a4708ee31fe35a13ef991aa4d66fa3858497bda3d61a8ba1d5c9a52352
                                  SSDEEP:768:xGq+s3pUtDILNCCa+Di+0jd3gLqRp8AoPiIiYbrge4k6kNaioVFIJ5vEgK/JLZVS:8q+AGtQO+GaPAKBbUkN8C5nkJLZVclN
                                  TLSH:B5237E0037E9C136E2FD4BB4A8F2924582B9D66B6903DB596CC411EA1F13BC597036FE
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x40cbbe
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x60930A0B [Wed May 5 21:11:39 2021 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xcb680x53.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000xdf7.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xabc40xac00d1321a55bfb633435ca6ed2a56b2550eFalse0.5023846293604651data5.646251060684921IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xe0000xdf70xe002083376922615c09cdda9acfd9305376False0.4017857142857143data5.110607648061562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x100000xc0x20082148d01c3935cf90ef81a3dd1fad607False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0xe0a00x2d4data0.4350828729281768
                                  RT_MANIFEST0xe3740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-12-10T20:16:03.387892+01002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)145.135.232.385999192.168.2.549704TCP
                                  2024-12-10T20:16:03.387892+01002034847ET MALWARE Observed Malicious SSL Cert (AsyncRAT)145.135.232.385999192.168.2.549704TCP
                                  2024-12-10T20:16:03.387892+01002848048ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT)145.135.232.385999192.168.2.549704TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 10, 2024 20:16:01.802001953 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:01.922418118 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:01.922518969 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:01.943928957 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:02.067188025 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:03.256216049 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:03.266293049 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:03.387892008 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:03.706769943 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:03.759587049 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:06.827230930 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:06.953440905 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:06.953500986 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:07.073065042 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:15.411967039 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:15.462788105 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:15.615587950 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:15.665858984 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:17.996289968 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:18.116497993 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:18.116588116 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:18.237580061 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:18.601259947 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:18.650227070 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:18.790946960 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:18.800122976 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:18.919531107 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:18.919594049 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:19.039717913 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:29.166645050 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:29.288120031 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:29.288168907 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:29.407548904 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:29.767936945 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:29.822137117 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:29.959809065 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:29.961548090 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:30.080857038 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:30.080926895 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:30.201452971 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:40.338366985 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:40.458393097 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:40.458451986 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:40.578392982 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:40.939496040 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:40.994005919 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:41.131176949 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:41.132734060 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:41.257961988 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:41.258048058 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:41.384761095 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:45.412847042 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:45.462733984 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:45.604840040 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:45.650233984 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:51.510117054 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:51.629745007 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:51.629852057 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:51.749413013 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:52.111699104 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:52.165877104 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:52.303086042 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:52.304716110 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:52.425376892 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:16:52.425467014 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:16:52.545461893 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:02.681998968 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:02.802885056 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:02.802946091 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:02.924954891 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:03.322424889 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:03.368997097 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:03.540584087 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:03.551318884 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:03.675327063 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:03.675411940 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:03.802160978 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:13.857110023 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:13.982580900 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:13.982640982 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:14.106453896 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:14.466368914 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:14.525315046 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:14.657773972 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:14.663151026 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:14.785814047 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:14.785924911 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:14.907242060 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:15.417395115 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:15.462768078 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:15.606928110 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:15.650268078 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:25.046766996 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:25.172135115 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:25.172214031 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:25.295485973 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:25.654552937 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:25.697191000 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:25.846483946 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:25.848222971 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:26.019962072 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:26.020045042 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:26.147808075 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:36.197582960 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:36.330612898 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:36.330672979 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:36.495647907 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:36.812256098 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:36.853518963 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:37.004226923 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:37.006690979 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:37.130260944 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:37.130321980 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:37.256381035 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:45.417232990 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:45.462809086 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:45.609090090 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:45.650312901 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:47.369676113 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:47.489237070 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:47.489293098 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:47.611387968 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:48.028755903 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:48.072346926 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:48.220537901 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:48.222224951 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:48.422280073 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:48.422398090 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:48.543632984 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:58.541300058 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:58.660885096 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:58.660967112 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:58.782511950 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:59.141976118 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:59.181543112 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:59.333857059 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:59.335422039 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:59.454721928 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:17:59.454781055 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:17:59.576860905 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:18:04.728861094 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:18:04.856704950 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:18:04.856760025 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:18:04.976571083 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:18:05.338068008 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:18:05.384676933 CET497045999192.168.2.545.135.232.38
                                  Dec 10, 2024 20:18:05.530998945 CET59994970445.135.232.38192.168.2.5
                                  Dec 10, 2024 20:18:05.572170973 CET497045999192.168.2.545.135.232.38
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 10, 2024 20:16:01.456506968 CET5139953192.168.2.51.1.1.1
                                  Dec 10, 2024 20:16:01.796236992 CET53513991.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Dec 10, 2024 20:16:01.456506968 CET192.168.2.51.1.1.10x46dfStandard query (0)dcrsf.duckdns.orgA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Dec 10, 2024 20:16:01.796236992 CET1.1.1.1192.168.2.50x46dfNo error (0)dcrsf.duckdns.org45.135.232.38A (IP address)IN (0x0001)false
                                  Dec 10, 2024 20:16:16.693447113 CET1.1.1.1192.168.2.50xb0daNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                  Dec 10, 2024 20:16:16.693447113 CET1.1.1.1192.168.2.50xb0daNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:14:15:57
                                  Start date:10/12/2024
                                  Path:C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d0019848271178.dat-decoded.exe"
                                  Imagebase:0x7f0000
                                  File size:48'640 bytes
                                  MD5 hash:54AF7DDE5C98E20089AE4A5DC295CB32
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000000.2017122021.00000000007F2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3278618622.000000001B490000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3277175130.0000000000E24000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.3277462109.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3277462109.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.3277462109.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3277462109.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:22.9%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:6
                                    Total number of Limit Nodes:0
                                    execution_graph 4499 7ff848e72d3d 4500 7ff848e72d4b VirtualProtect 4499->4500 4502 7ff848e72e2b 4500->4502 4495 7ff848e729e1 4496 7ff848e729eb LoadLibraryA 4495->4496 4498 7ff848e72ad2 4496->4498

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 30 7ff848e730e2-7ff848e73142 37 7ff848e73148-7ff848e731ed 30->37 38 7ff848e73381-7ff848e733c2 call 7ff848e71998 30->38 66 7ff848e732b3 37->66 67 7ff848e731f3-7ff848e732a0 37->67 46 7ff848e733d7-7ff848e733e0 38->46 47 7ff848e733c4-7ff848e733d5 38->47 50 7ff848e733e8-7ff848e73404 46->50 47->50 56 7ff848e73419-7ff848e7341e 50->56 57 7ff848e73406-7ff848e73417 50->57 60 7ff848e73425-7ff848e7348b call 7ff848e719a8 call 7ff848e719b8 56->60 57->60 80 7ff848e73512 60->80 81 7ff848e73491-7ff848e734dd 60->81 71 7ff848e732b8-7ff848e732df 66->71 67->66 107 7ff848e732a2-7ff848e732ad 67->107 90 7ff848e732e1-7ff848e732ef 71->90 84 7ff848e73517-7ff848e7353f 80->84 81->80 109 7ff848e734df-7ff848e7350b 81->109 113 7ff848e73541-7ff848e73558 call 7ff848e738d5 84->113 95 7ff848e73365-7ff848e7337c 90->95 96 7ff848e732f1-7ff848e7330b 90->96 103 7ff848e73559-7ff848e7356a 95->103 96->103 105 7ff848e73311-7ff848e7332c 96->105 114 7ff848e73570-7ff848e7365e call 7ff848e719c8 call 7ff848e719d8 103->114 115 7ff848e73891 103->115 112 7ff848e73334-7ff848e73345 105->112 107->71 111 7ff848e732af-7ff848e732b1 107->111 109->84 121 7ff848e7350d-7ff848e73510 109->121 111->90 122 7ff848e7334c-7ff848e7335e 112->122 123 7ff848e73347 112->123 113->103 114->66 142 7ff848e73664-7ff848e73690 114->142 118 7ff848e73898-7ff848e738a4 115->118 121->113 122->105 126 7ff848e73360 122->126 123->103 126->103 144 7ff848e73692-7ff848e73698 142->144 145 7ff848e7369a-7ff848e736a1 144->145 146 7ff848e736d0-7ff848e737a6 call 7ff848e72418 144->146 145->144 151 7ff848e736a3-7ff848e736c5 call 7ff848e71988 call 7ff848e70628 145->151 169 7ff848e737a7-7ff848e737b8 146->169 161 7ff848e736ca 151->161 161->146 172 7ff848e737ba-7ff848e73889 call 7ff848e72418 169->172 182 7ff848e7388f 172->182 182->118
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3279743510.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848e70000_1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d001984.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,
                                    • API String ID: 0-3772416878
                                    • Opcode ID: c7bf2eb49eee2524fc09061740d9b6e3a427ad8da9586257a9c2d6db6daf47c9
                                    • Instruction ID: dad090ca42377a8abdebc3dcdce95cbe83ed5364118194f6e776c1f10a1cc436
                                    • Opcode Fuzzy Hash: c7bf2eb49eee2524fc09061740d9b6e3a427ad8da9586257a9c2d6db6daf47c9
                                    • Instruction Fuzzy Hash: B132CD31A1C90A9FE798EB2CD0556B9B7E2FF98790F940579D01EC32C6DF38A8428745

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 338 7ff848e78346-7ff848e78353 339 7ff848e7835e-7ff848e78427 338->339 340 7ff848e78355-7ff848e7835d 338->340 344 7ff848e78429-7ff848e78432 339->344 345 7ff848e78493 339->345 340->339 344->345 346 7ff848e78434-7ff848e78440 344->346 347 7ff848e78495-7ff848e784ba 345->347 348 7ff848e78479-7ff848e78491 346->348 349 7ff848e78442-7ff848e78454 346->349 354 7ff848e784bc-7ff848e784c5 347->354 355 7ff848e78526 347->355 348->347 350 7ff848e78458-7ff848e7846b 349->350 351 7ff848e78456 349->351 350->350 353 7ff848e7846d-7ff848e78475 350->353 351->350 353->348 354->355 357 7ff848e784c7-7ff848e784d3 354->357 356 7ff848e78528-7ff848e785d0 355->356 368 7ff848e7863e 356->368 369 7ff848e785d2-7ff848e785dc 356->369 358 7ff848e7850c-7ff848e78524 357->358 359 7ff848e784d5-7ff848e784e7 357->359 358->356 361 7ff848e784eb-7ff848e784fe 359->361 362 7ff848e784e9 359->362 361->361 364 7ff848e78500-7ff848e78508 361->364 362->361 364->358 370 7ff848e78640-7ff848e78669 368->370 369->368 371 7ff848e785de-7ff848e785eb 369->371 378 7ff848e7866b-7ff848e78676 370->378 379 7ff848e786d3 370->379 372 7ff848e785ed-7ff848e785ff 371->372 373 7ff848e78624-7ff848e7863c 371->373 375 7ff848e78603-7ff848e78616 372->375 376 7ff848e78601 372->376 373->370 375->375 377 7ff848e78618-7ff848e78620 375->377 376->375 377->373 378->379 380 7ff848e78678-7ff848e78686 378->380 381 7ff848e786d5-7ff848e78766 379->381 382 7ff848e786bf-7ff848e786d1 380->382 383 7ff848e78688-7ff848e7869a 380->383 389 7ff848e7876c-7ff848e7877b 381->389 382->381 385 7ff848e7869e-7ff848e786b1 383->385 386 7ff848e7869c 383->386 385->385 387 7ff848e786b3-7ff848e786bb 385->387 386->385 387->382 390 7ff848e7877d 389->390 391 7ff848e78783-7ff848e787e8 call 7ff848e78804 389->391 390->391 398 7ff848e787ef-7ff848e78803 391->398 399 7ff848e787ea 391->399 399->398
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3279743510.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848e70000_1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d001984.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3a3bc99b728ed0cd6ccbb787d5bc8dc7005b1bf66e27f1b08794f1cf8dacac7a
                                    • Instruction ID: 9db6bd977039a98b48205d291f65cbac6e7f930a9a899806375a5bd46a2b9c6c
                                    • Opcode Fuzzy Hash: 3a3bc99b728ed0cd6ccbb787d5bc8dc7005b1bf66e27f1b08794f1cf8dacac7a
                                    • Instruction Fuzzy Hash: B8F1B23090CA8D8FEBA8EF28C8557E937D1FF64350F04426AE85DC7295DB7499418B86

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 400 7ff848e790f2-7ff848e790ff 401 7ff848e7910a-7ff848e791d7 400->401 402 7ff848e79101-7ff848e79109 400->402 406 7ff848e791d9-7ff848e791e2 401->406 407 7ff848e79243 401->407 402->401 406->407 409 7ff848e791e4-7ff848e791f0 406->409 408 7ff848e79245-7ff848e7926a 407->408 415 7ff848e7926c-7ff848e79275 408->415 416 7ff848e792d6 408->416 410 7ff848e79229-7ff848e79241 409->410 411 7ff848e791f2-7ff848e79204 409->411 410->408 413 7ff848e79208-7ff848e7921b 411->413 414 7ff848e79206 411->414 413->413 417 7ff848e7921d-7ff848e79225 413->417 414->413 415->416 418 7ff848e79277-7ff848e79283 415->418 419 7ff848e792d8-7ff848e792fd 416->419 417->410 420 7ff848e792bc-7ff848e792d4 418->420 421 7ff848e79285-7ff848e79297 418->421 425 7ff848e792ff-7ff848e79309 419->425 426 7ff848e7936b 419->426 420->419 422 7ff848e7929b-7ff848e792ae 421->422 423 7ff848e79299 421->423 422->422 427 7ff848e792b0-7ff848e792b8 422->427 423->422 425->426 428 7ff848e7930b-7ff848e79318 425->428 429 7ff848e7936d-7ff848e7939b 426->429 427->420 430 7ff848e7931a-7ff848e7932c 428->430 431 7ff848e79351-7ff848e79369 428->431 436 7ff848e7939d-7ff848e793a8 429->436 437 7ff848e7940b 429->437 432 7ff848e7932e 430->432 433 7ff848e79330-7ff848e79343 430->433 431->429 432->433 433->433 435 7ff848e79345-7ff848e7934d 433->435 435->431 436->437 439 7ff848e793aa-7ff848e793b8 436->439 438 7ff848e7940d-7ff848e794e5 437->438 449 7ff848e794eb-7ff848e794fa 438->449 440 7ff848e793ba-7ff848e793cc 439->440 441 7ff848e793f1-7ff848e79409 439->441 443 7ff848e793ce 440->443 444 7ff848e793d0-7ff848e793e3 440->444 441->438 443->444 444->444 445 7ff848e793e5-7ff848e793ed 444->445 445->441 450 7ff848e794fc 449->450 451 7ff848e79502-7ff848e79564 call 7ff848e79580 449->451 450->451 458 7ff848e7956b-7ff848e7957f 451->458 459 7ff848e79566 451->459 459->458
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3279743510.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848e70000_1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d001984.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 012ce350776342a61bf32c1937ffd6749e442ebb6eeb2a9e711d2a5641706756
                                    • Instruction ID: ed57347b27dfe614816576b49a05ad2272562fa5b9fd031d77e8a894f62927bf
                                    • Opcode Fuzzy Hash: 012ce350776342a61bf32c1937ffd6749e442ebb6eeb2a9e711d2a5641706756
                                    • Instruction Fuzzy Hash: 27E1C13090CA8D8FEBA9EF28D8557E977E1FF54350F04426EE84DC7295DB78A8418B81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 183 7ff848e729e1-7ff848e72ad0 LoadLibraryA 189 7ff848e72ad8-7ff848e72b31 call 7ff848e72b32 183->189 190 7ff848e72ad2 183->190 190->189
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3279743510.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848e70000_1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d001984.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 3135a243f20f0d94c6e61806f1a8b2e6441c4f303f7fa2e6e3ce0b092a720fd7
                                    • Instruction ID: 80bb06370499c35c02b7de7d2fc2ff24a3681dc9a6f897c060c48f1a8e362e0f
                                    • Opcode Fuzzy Hash: 3135a243f20f0d94c6e61806f1a8b2e6441c4f303f7fa2e6e3ce0b092a720fd7
                                    • Instruction Fuzzy Hash: AB416A70908A4C8FDB98EF58D845BEDBBF1FB99310F04426AD00ED7292DB75A845CB81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 196 7ff848e72d3d-7ff848e72d49 197 7ff848e72d4b-7ff848e72d53 196->197 198 7ff848e72d54-7ff848e72d63 196->198 197->198 199 7ff848e72d6e-7ff848e72e29 VirtualProtect 198->199 200 7ff848e72d65-7ff848e72d6d 198->200 205 7ff848e72e2b 199->205 206 7ff848e72e31-7ff848e72e59 199->206 200->199 205->206
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3279743510.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848e70000_1733858044dd572d66bc3a8dabfe408fb29ad3eddb6c690affcab2d50d59673d001984.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: b4ec7af0f2ed740bc98e7d227df1c92b7ed888fa15938ae0d153165ed536736b
                                    • Instruction ID: fee99acce37759d8634cecdbf76265667e2f1a0985864ac0e17884406952c58e
                                    • Opcode Fuzzy Hash: b4ec7af0f2ed740bc98e7d227df1c92b7ed888fa15938ae0d153165ed536736b
                                    • Instruction Fuzzy Hash: EE41E63190DB885FDB1A9B689C466ED7FE0EF96321F0442AFD089C3193DB746406C796