Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
zvXPSu3dK5.exe

Overview

General Information

Sample name:zvXPSu3dK5.exe
renamed because original name is a hash value
Original sample name:ce9371e8ef7c084640e3fcf59bfb4bd5439bea0a4649cd971a3517205574c7f0.exe
Analysis ID:1573862
MD5:b2e52a44834f06fba71aa8848714bf97
SHA1:524d5653ebd1fb343f7cd8190536b25cec4082ff
SHA256:ce9371e8ef7c084640e3fcf59bfb4bd5439bea0a4649cd971a3517205574c7f0
Tags:envnuev1124-duckdns-orgexeuser-JAMESWT_MHT
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • zvXPSu3dK5.exe (PID: 3524 cmdline: "C:\Users\user\Desktop\zvXPSu3dK5.exe" MD5: B2E52A44834F06FBA71AA8848714BF97)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"External_config_on_Pastebin": "null", "Server": "envnuev1124.duckdns.org", "Ports": "3013", "Version": "| CRACKED BY https://t.me/xworm_v2", "Autorun": "false", "Install_Folder": "cE5YcGRiQ2tZRmVnWFhWT1B5STFUNm9mVXhZbUtHMVc=", "Install_File": "u+IClhfNDH2v5/ITCehCWdlfT6x5HInctrFCAdC2ui1bgbclbh7z5M1BzH6qyKiyJENTQKeUFk+bfc/Qfv2QNolb9eoE6CtkgauKPpSWN6Y=", "AES_key": "pNXpdbCkYFegXXVOPyI1T6ofUxYmKG1W", "Mutex": "GtOED+Ry5OzQroqL8VTF7kRnABQjPDBSBK77Mx2Io0FIGol6em/XVswHzSV7DyFzu101/QhKQkOKD/GUYNEvv+k3v0LQX/jm6TNz1x7pm04w7sBMwlNmEC5EAlxfzI8zfcJTJtNDsOnrx13rhbpoRburdAlVGXVOnttBPIZDGIYZcb5X2LAVSXGOli1dFbfTyQQVC3uhvKwcW9wBL+wh6y7N8vuxV6b/yPPWxM6jdMtytgFIvl7cHXL3Aj452vWbQWYbx7yS+X5LPv/tJbg+pJ/b5//xTDDch+tUsrft8nh4R+MmwXIj2r5gHpmDtQ77cg6dDyGRV5yYQeSts5v413IToDTLFFGtPTfIsJnvUTZBqehoscm+d6M56X4Ir1apO2Nvs0Edf+d38xnDKBWXTmN3L3GAnvzAk3yRxXwU6UmEXfwodryGDe4J2wxs60USpB82EEGfS2VtKbB2irCbls7l/H9lnKdLgg9UR1BS5JUnzUvGvxhx4x0riFwcsqWP7cGXLI7ZGNRBLIh1yATD4fTJ9dTf5I8MTwOBQI/4LXELLecXjJxQPo0UVlMm6Re48Ac9Y4ewngAazpYw1dC1Ci+W5/54nyCe6BlhiXdvdqgs6RdloskDyE1FyA7YWxmdWOCID1NPL0cR7Ud2yVyr5GRPeXH99RwpU2/6v43R1nc=", "Certificate": "false", "ServerSignature": "false", "BDOS": "false", "Startup_Delay": "3", "Group": "null"}
SourceRuleDescriptionAuthorStrings
zvXPSu3dK5.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    zvXPSu3dK5.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      zvXPSu3dK5.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xc58c:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xf438:$a2: Stub.exe
      • 0xf4c8:$a2: Stub.exe
      • 0x8fe2:$a3: get_ActivatePong
      • 0xc7a4:$a4: vmware
      • 0xc61c:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x9ee9:$a6: get_SslClient
      zvXPSu3dK5.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xc61e:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xc41e:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        Process Memory Space: zvXPSu3dK5.exe PID: 3524JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: zvXPSu3dK5.exe PID: 3524INDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0xb5c9:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          SourceRuleDescriptionAuthorStrings
          0.0.zvXPSu3dK5.exe.550000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.0.zvXPSu3dK5.exe.550000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.zvXPSu3dK5.exe.550000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0xc58c:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0xf438:$a2: Stub.exe
              • 0xf4c8:$a2: Stub.exe
              • 0x8fe2:$a3: get_ActivatePong
              • 0xc7a4:$a4: vmware
              • 0xc61c:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0x9ee9:$a6: get_SslClient
              0.0.zvXPSu3dK5.exe.550000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0xc61e:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: zvXPSu3dK5.exeAvira: detected
              Source: envnuev1124.duckdns.orgAvira URL Cloud: Label: malware
              Source: zvXPSu3dK5.exeMalware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "envnuev1124.duckdns.org", "Ports": "3013", "Version": "| CRACKED BY https://t.me/xworm_v2", "Autorun": "false", "Install_Folder": "cE5YcGRiQ2tZRmVnWFhWT1B5STFUNm9mVXhZbUtHMVc=", "Install_File": "u+IClhfNDH2v5/ITCehCWdlfT6x5HInctrFCAdC2ui1bgbclbh7z5M1BzH6qyKiyJENTQKeUFk+bfc/Qfv2QNolb9eoE6CtkgauKPpSWN6Y=", "AES_key": "pNXpdbCkYFegXXVOPyI1T6ofUxYmKG1W", "Mutex": "GtOED+Ry5OzQroqL8VTF7kRnABQjPDBSBK77Mx2Io0FIGol6em/XVswHzSV7DyFzu101/QhKQkOKD/GUYNEvv+k3v0LQX/jm6TNz1x7pm04w7sBMwlNmEC5EAlxfzI8zfcJTJtNDsOnrx13rhbpoRburdAlVGXVOnttBPIZDGIYZcb5X2LAVSXGOli1dFbfTyQQVC3uhvKwcW9wBL+wh6y7N8vuxV6b/yPPWxM6jdMtytgFIvl7cHXL3Aj452vWbQWYbx7yS+X5LPv/tJbg+pJ/b5//xTDDch+tUsrft8nh4R+MmwXIj2r5gHpmDtQ77cg6dDyGRV5yYQeSts5v413IToDTLFFGtPTfIsJnvUTZBqehoscm+d6M56X4Ir1apO2Nvs0Edf+d38xnDKBWXTmN3L3GAnvzAk3yRxXwU6UmEXfwodryGDe4J2wxs60USpB82EEGfS2VtKbB2irCbls7l/H9lnKdLgg9UR1BS5JUnzUvGvxhx4x0riFwcsqWP7cGXLI7ZGNRBLIh1yATD4fTJ9dTf5I8MTwOBQI/4LXELLecXjJxQPo0UVlMm6Re48Ac9Y4ewngAazpYw1dC1Ci+W5/54nyCe6BlhiXdvdqgs6RdloskDyE1FyA7YWxmdWOCID1NPL0cR7Ud2yVyr5GRPeXH99RwpU2/6v43R1nc=", "Certificate": "false", "ServerSignature": "false", "BDOS": "false", "Startup_Delay": "3", "Group": "null"}
              Source: zvXPSu3dK5.exeReversingLabs: Detection: 78%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: zvXPSu3dK5.exeJoe Sandbox ML: detected
              Source: zvXPSu3dK5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: zvXPSu3dK5.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Malware configuration extractorURLs: envnuev1124.duckdns.org
              Source: unknownDNS query: name: envnuev1124.duckdns.org
              Source: Yara matchFile source: zvXPSu3dK5.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.zvXPSu3dK5.exe.550000.0.unpack, type: UNPACKEDPE
              Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
              Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
              Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: envnuev1124.duckdns.org
              Source: zvXPSu3dK5.exe, 00000000.00000002.4632419326.00000000028A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://t.me/xworm_v2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: zvXPSu3dK5.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.zvXPSu3dK5.exe.550000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zvXPSu3dK5.exe PID: 3524, type: MEMORYSTR
              Source: zvXPSu3dK5.exe, LimeLogger.cs.Net Code: KeyboardLayout

              System Summary

              barindex
              Source: zvXPSu3dK5.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: zvXPSu3dK5.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0.0.zvXPSu3dK5.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.0.zvXPSu3dK5.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: zvXPSu3dK5.exe PID: 3524, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: zvXPSu3dK5.exe, 00000000.00000000.2187491148.0000000000562000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs zvXPSu3dK5.exe
              Source: zvXPSu3dK5.exeBinary or memory string: OriginalFilenameStub.exe" vs zvXPSu3dK5.exe
              Source: zvXPSu3dK5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: zvXPSu3dK5.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: zvXPSu3dK5.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0.0.zvXPSu3dK5.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.0.zvXPSu3dK5.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: zvXPSu3dK5.exe PID: 3524, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: zvXPSu3dK5.exe, Settings.csBase64 encoded string: 'JKU8JxGpHRZRuzjAxuPqlr/bgoKjjNDMVWjKm4s6ayBgpl3W9N3cfKmi/B+DWXKJz1AXDph1pynMRE2nP9F9Dg==', 'W6l2oqDdWTUJ/M0XW1kBIfO/el9Tg/xyTUchP4eRiGnt4Qp2s2Plj5FisGAjUopkJGWOQq8xLKHa8XHBnu8zDg0Ms0slsViKDqz2Iw+9Rr0=', 'tuQhJgJZ3dthwzwCl1ddIn0p5X/XxJjgXSMecrScbC+n97OHvSiqyVpcczAue0KtgAtj7j3w4Yv6UVmZ05Oa0AHPE4JI8EM49U6+vbYApEfOYVHn518laO9Vx43ojxo+', 'u+IClhfNDH2v5/ITCehCWdlfT6x5HInctrFCAdC2ui1bgbclbh7z5M1BzH6qyKiyJENTQKeUFk+bfc/Qfv2QNolb9eoE6CtkgauKPpSWN6Y=', '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', 'RticzVCFQ4Hcu1Xo8XH2F1fJRxtCNfzpwM7NxLsmQvmeMjbxoMmmQnK4fiyWbWs4cOK5nU4MjMn768HX/dpAoZQZAsi4tXOPUEErsWFDvRU/U5od2n5IBw5GdsVuoNMTGl+vqdGHOXFSVIb4UfPkVQjqmBSQl9h4s8NCPYdLoPKtvrk/v7di4obZWgvJWBa5ShPP41e
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@4/1
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeMutant created: NULL
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
              Source: zvXPSu3dK5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: zvXPSu3dK5.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: zvXPSu3dK5.exeReversingLabs: Detection: 78%
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeSection loaded: schannel.dllJump to behavior
              Source: zvXPSu3dK5.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: zvXPSu3dK5.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: zvXPSu3dK5.exe, Packet.cs.Net Code: Plugins System.AppDomain.Load(byte[])

              Boot Survival

              barindex
              Source: Yara matchFile source: zvXPSu3dK5.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.zvXPSu3dK5.exe.550000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zvXPSu3dK5.exe PID: 3524, type: MEMORYSTR
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: zvXPSu3dK5.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.zvXPSu3dK5.exe.550000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zvXPSu3dK5.exe PID: 3524, type: MEMORYSTR
              Source: zvXPSu3dK5.exeBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeMemory allocated: 2680000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeWindow / User API: threadDelayed 9718Jump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exe TID: 1964Thread sleep count: 261 > 30Jump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exe TID: 1964Thread sleep time: -261000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exe TID: 1964Thread sleep count: 9718 > 30Jump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exe TID: 1964Thread sleep time: -9718000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: zvXPSu3dK5.exeBinary or memory string: vmware
              Source: zvXPSu3dK5.exe, 00000000.00000002.4633145670.0000000004D86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^T
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeQueries volume information: C:\Users\user\Desktop\zvXPSu3dK5.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\zvXPSu3dK5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: zvXPSu3dK5.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.zvXPSu3dK5.exe.550000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zvXPSu3dK5.exe PID: 3524, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              2
              Virtualization/Sandbox Evasion
              1
              Input Capture
              11
              Security Software Discovery
              Remote Services1
              Input Capture
              1
              Non-Application Layer Protocol
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory2
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media21
              Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Software Packing
              Security Account Manager1
              Application Window Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              NTDS13
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Obfuscated Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              zvXPSu3dK5.exe79%ReversingLabsByteCode-MSIL.Trojan.AsyncRATMarte
              zvXPSu3dK5.exe100%AviraTR/Dropper.Gen
              zvXPSu3dK5.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              envnuev1124.duckdns.org100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              envnuev1124.duckdns.org
              192.169.69.26
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                envnuev1124.duckdns.orgtrue
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://t.me/xworm_v2zvXPSu3dK5.exe, 00000000.00000002.4632419326.00000000028A1000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  192.169.69.26
                  envnuev1124.duckdns.orgUnited States
                  23033WOWUStrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1573862
                  Start date and time:2024-12-12 17:05:21 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 17s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:4
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:zvXPSu3dK5.exe
                  renamed because original name is a hash value
                  Original Sample Name:ce9371e8ef7c084640e3fcf59bfb4bd5439bea0a4649cd971a3517205574c7f0.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@1/0@4/1
                  EGA Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 22
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 20.231.128.65, 40.126.53.19, 40.126.53.18, 40.126.53.7, 20.190.181.1, 20.190.181.3, 20.231.128.67, 40.126.53.9, 13.107.246.63, 4.245.163.56
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                  • Execution Graph export aborted for target zvXPSu3dK5.exe, PID 3524 because it is empty
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • VT rate limit hit for: zvXPSu3dK5.exe
                  TimeTypeDescription
                  11:07:05API Interceptor7895397x Sleep call for process: zvXPSu3dK5.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  192.169.69.26f5ATZ1i5CU.exeGet hashmaliciousRedLine, XWormBrowse
                  • duclog23.duckdns.org:37552/
                  SX8OLQP63C.exeGet hashmaliciousVjW0rm, AsyncRAT, RATDispenserBrowse
                  • yuya0415.duckdns.org:1928/Vre
                  confirmaci#U00f3n y correcci#U00f3n de la direcci#U00f3n de entrega.vbsGet hashmaliciousUnknownBrowse
                  • servidorarquivos.duckdns.org/e/e
                  oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
                  • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
                  oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
                  • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
                  http://yvtplhuqem.duckdns.org/ja/Get hashmaliciousUnknownBrowse
                  • yvtplhuqem.duckdns.org/ja/
                  http://fqqqffcydg.duckdns.org/en/Get hashmaliciousUnknownBrowse
                  • fqqqffcydg.duckdns.org/en/
                  http://yugdzvsqnf.duckdns.org/en/Get hashmaliciousUnknownBrowse
                  • yugdzvsqnf.duckdns.org/en/
                  &nuevo_pedido#..vbsGet hashmaliciousUnknownBrowse
                  • servidorarquivos.duckdns.org/e/e
                  transferencia_Hsbc.xlsxGet hashmaliciousUnknownBrowse
                  • servidorarquivos.duckdns.org/e/e
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  WOWUS173398584769f9c5bcf28a71f77fba1335e77fe6b4cc4f05afc05fdd9f5830429be0bc9fb5758.dat-decoded.exeGet hashmaliciousRemcosBrowse
                  • 192.169.69.26
                  nicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                  • 192.169.69.26
                  1733858044e64c59622ab494dda2ff98fce76991f7e15e513d6a3620e7f58ad7cc67d3889c571.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                  • 192.169.69.26
                  f5ATZ1i5CU.exeGet hashmaliciousRedLine, XWormBrowse
                  • 192.169.69.26
                  P0J8k3LhVV.exeGet hashmaliciousNanocoreBrowse
                  • 192.169.69.26
                  173349055645d097cf36f6a7cc8cd8874001209539b453cb16f6acd61c0d845ab62e19e89d339.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                  • 192.169.69.26
                  173349048648c854fdb460c6c7c5fd91e325ea882961d8aa5918c705b053bb8e9350ae27c8877.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                  • 192.169.69.26
                  17334905521d597933f8aaddb97573b46d117b288a865f8a218fac0e15588edac3edcab35b588.dat-decoded.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                  • 192.169.69.26
                  17334905555b1bb5616b6229d3e91468cd944baaeea0d1c904cc91a0fe89b683d653c3710f732.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                  • 192.169.69.26
                  17334792691d3587abc182d697c2a82dd4ad88afaea9fc5290ea9e42c7eec649b5ab319fda603.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                  • 192.169.69.26
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):5.393189675410835
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:zvXPSu3dK5.exe
                  File size:64'512 bytes
                  MD5:b2e52a44834f06fba71aa8848714bf97
                  SHA1:524d5653ebd1fb343f7cd8190536b25cec4082ff
                  SHA256:ce9371e8ef7c084640e3fcf59bfb4bd5439bea0a4649cd971a3517205574c7f0
                  SHA512:ff535bcbeee84f06a00b1d1636d80e4cd02d05b107fbbfe4ad6be855454d713553c5b985f4b99d87ef0d7f56d598affe1f4550ecd1a74f97aa4c5a3e2255cdc1
                  SSDEEP:1536:KmImx6tX2kNff4sKu+UYFDGXw5bfAPAHPrPlTGZx:Km9x6tmkN7Ku+UYFDGXw5bffdix
                  TLSH:DE53E7013BF98029F3BE8F7469F6658506FAF5AB2D11C55D1CC544CE0A22B829E41BFB
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8.]V................................. ... ....@.. .......................`............`................................
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x410ebe
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x565DF738 [Tue Dec 1 19:38:32 2015 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x10e680x53.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x7ff.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xeec40xf00049ebc4c95611dc04214116977e5804b8False0.4557291666666667data5.43003976071433IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0x120000x7ff0x80033cdbc5c50f34a35b4f0e61582ac7f11False0.41650390625data4.884866150337139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x140000xc0x2004e8998a682eb7ba8de67035194ed11c9False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0x120a00x2ccdata0.43575418994413406
                  RT_MANIFEST0x1236c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 12, 2024 17:06:33.461023092 CET497213013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:06:33.580878019 CET301349721192.169.69.26192.168.2.5
                  Dec 12, 2024 17:06:33.580964088 CET497213013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:06:33.592609882 CET497213013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:06:33.712318897 CET301349721192.169.69.26192.168.2.5
                  Dec 12, 2024 17:06:43.902324915 CET301349721192.169.69.26192.168.2.5
                  Dec 12, 2024 17:06:43.902412891 CET497213013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:06:49.089649916 CET497213013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:06:49.090538979 CET497593013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:06:49.209480047 CET301349721192.169.69.26192.168.2.5
                  Dec 12, 2024 17:06:49.210262060 CET301349759192.169.69.26192.168.2.5
                  Dec 12, 2024 17:06:49.210383892 CET497593013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:06:49.210768938 CET497593013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:06:49.330570936 CET301349759192.169.69.26192.168.2.5
                  Dec 12, 2024 17:06:59.556165934 CET301349759192.169.69.26192.168.2.5
                  Dec 12, 2024 17:06:59.556701899 CET497593013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:04.572427034 CET497593013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:04.573566914 CET497943013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:04.692882061 CET301349759192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:04.693386078 CET301349794192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:04.693486929 CET497943013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:04.693840027 CET497943013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:04.814544916 CET301349794192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:15.011074066 CET301349794192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:15.011149883 CET497943013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:20.026906967 CET497943013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:20.027594090 CET498323013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:20.146723032 CET301349794192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:20.147397041 CET301349832192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:20.147511005 CET498323013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:20.147907019 CET498323013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:20.268129110 CET301349832192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:30.494868994 CET301349832192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:30.494968891 CET498323013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:35.510045052 CET498323013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:35.759157896 CET301349832192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:35.867681980 CET498713013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:35.987494946 CET301349871192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:35.987741947 CET498713013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:35.988254070 CET498713013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:36.108194113 CET301349871192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:46.312889099 CET301349871192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:46.313075066 CET498713013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:51.601905107 CET498713013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:51.602814913 CET499083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:51.722105980 CET301349871192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:51.722940922 CET301349908192.169.69.26192.168.2.5
                  Dec 12, 2024 17:07:51.723041058 CET499083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:51.731596947 CET499083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:07:51.852888107 CET301349908192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:02.085725069 CET301349908192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:02.085787058 CET499083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:07.434802055 CET499083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:07.435751915 CET499423013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:07.555120945 CET301349908192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:07.555566072 CET301349942192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:07.555671930 CET499423013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:07.577013016 CET499423013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:07.696947098 CET301349942192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:17.831150055 CET301349942192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:17.834358931 CET499423013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:22.838210106 CET499423013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:22.839018106 CET499773013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:22.959570885 CET301349942192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:22.959589005 CET301349977192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:22.959696054 CET499773013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:22.960043907 CET499773013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:23.080761909 CET301349977192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:33.233784914 CET301349977192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:33.233942986 CET499773013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:38.244354963 CET499773013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:38.364197969 CET301349977192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:38.558929920 CET500083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:38.679619074 CET301350008192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:38.679707050 CET500083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:38.680064917 CET500083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:38.800030947 CET301350008192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:49.046509027 CET301350008192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:49.049918890 CET500083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:54.072566032 CET500083013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:54.073594093 CET500093013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:54.192723989 CET301350008192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:54.195164919 CET301350009192.169.69.26192.168.2.5
                  Dec 12, 2024 17:08:54.195255995 CET500093013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:54.195621967 CET500093013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:08:54.317715883 CET301350009192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:04.516196966 CET301350009192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:04.516325951 CET500093013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:09.525799990 CET500093013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:09.526679993 CET500103013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:09.645684004 CET301350009192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:09.646507978 CET301350010192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:09.646567106 CET500103013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:09.647036076 CET500103013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:09.766701937 CET301350010192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:19.946086884 CET301350010192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:19.946142912 CET500103013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:24.947344065 CET500103013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:24.948165894 CET500123013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:25.067090988 CET301350010192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:25.067965031 CET301350012192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:25.068078041 CET500123013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:25.068754911 CET500123013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:25.188785076 CET301350012192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:35.402837038 CET301350012192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:35.404768944 CET500123013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:40.416140079 CET500123013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:40.536032915 CET301350012192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:40.754005909 CET500133013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:40.875909090 CET301350013192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:40.875996113 CET500133013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:40.876436949 CET500133013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:40.996189117 CET301350013192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:51.244710922 CET301350013192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:51.246356964 CET500133013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:56.260489941 CET500133013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:56.261811018 CET500143013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:56.383454084 CET301350013192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:56.383474112 CET301350014192.169.69.26192.168.2.5
                  Dec 12, 2024 17:09:56.383570910 CET500143013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:56.384140015 CET500143013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:09:56.506118059 CET301350014192.169.69.26192.168.2.5
                  Dec 12, 2024 17:10:06.716358900 CET301350014192.169.69.26192.168.2.5
                  Dec 12, 2024 17:10:06.721414089 CET500143013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:11.728753090 CET500143013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:11.729891062 CET500173013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:11.963479996 CET301350014192.169.69.26192.168.2.5
                  Dec 12, 2024 17:10:11.963499069 CET301350017192.169.69.26192.168.2.5
                  Dec 12, 2024 17:10:11.963587999 CET500173013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:11.963974953 CET500173013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:12.223294020 CET301350017192.169.69.26192.168.2.5
                  Dec 12, 2024 17:10:22.290518999 CET301350017192.169.69.26192.168.2.5
                  Dec 12, 2024 17:10:22.290581942 CET500173013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:27.322416067 CET500173013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:27.323280096 CET500183013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:27.445158005 CET301350017192.169.69.26192.168.2.5
                  Dec 12, 2024 17:10:27.446154118 CET301350018192.169.69.26192.168.2.5
                  Dec 12, 2024 17:10:27.446274042 CET500183013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:27.446594000 CET500183013192.168.2.5192.169.69.26
                  Dec 12, 2024 17:10:27.566528082 CET301350018192.169.69.26192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 12, 2024 17:06:33.140758991 CET5173753192.168.2.51.1.1.1
                  Dec 12, 2024 17:06:33.458113909 CET53517371.1.1.1192.168.2.5
                  Dec 12, 2024 17:07:35.510627985 CET6491853192.168.2.51.1.1.1
                  Dec 12, 2024 17:07:35.866729021 CET53649181.1.1.1192.168.2.5
                  Dec 12, 2024 17:08:38.245151043 CET5129653192.168.2.51.1.1.1
                  Dec 12, 2024 17:08:38.557914019 CET53512961.1.1.1192.168.2.5
                  Dec 12, 2024 17:09:40.416907072 CET5673353192.168.2.51.1.1.1
                  Dec 12, 2024 17:09:40.752660990 CET53567331.1.1.1192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Dec 12, 2024 17:06:33.140758991 CET192.168.2.51.1.1.10x18e1Standard query (0)envnuev1124.duckdns.orgA (IP address)IN (0x0001)false
                  Dec 12, 2024 17:07:35.510627985 CET192.168.2.51.1.1.10x48f0Standard query (0)envnuev1124.duckdns.orgA (IP address)IN (0x0001)false
                  Dec 12, 2024 17:08:38.245151043 CET192.168.2.51.1.1.10xbc65Standard query (0)envnuev1124.duckdns.orgA (IP address)IN (0x0001)false
                  Dec 12, 2024 17:09:40.416907072 CET192.168.2.51.1.1.10x1eaeStandard query (0)envnuev1124.duckdns.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Dec 12, 2024 17:06:33.458113909 CET1.1.1.1192.168.2.50x18e1No error (0)envnuev1124.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                  Dec 12, 2024 17:07:35.866729021 CET1.1.1.1192.168.2.50x48f0No error (0)envnuev1124.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                  Dec 12, 2024 17:08:38.557914019 CET1.1.1.1192.168.2.50xbc65No error (0)envnuev1124.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                  Dec 12, 2024 17:09:40.752660990 CET1.1.1.1192.168.2.50x1eaeNo error (0)envnuev1124.duckdns.org192.169.69.26A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:11:06:27
                  Start date:12/12/2024
                  Path:C:\Users\user\Desktop\zvXPSu3dK5.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\zvXPSu3dK5.exe"
                  Imagebase:0x550000
                  File size:64'512 bytes
                  MD5 hash:B2E52A44834F06FBA71AA8848714BF97
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.2187461490.0000000000552000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:false

                  Reset < >
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID: a]q$ a]q$,$xaq$#Dp^$3Dp^$\q
                    • API String ID: 0-1751023379
                    • Opcode ID: 5053ce56777234509e3928a2a0d2032f7755d49d7d98a2418e426fb4911a45fc
                    • Instruction ID: edc4b3e4a6f824c0f80760a2f1143fd707b7609623bc39da8dbe427dca3b5140
                    • Opcode Fuzzy Hash: 5053ce56777234509e3928a2a0d2032f7755d49d7d98a2418e426fb4911a45fc
                    • Instruction Fuzzy Hash: 4E02AE747006019FDB15EF28D494B6E77E2FF85314F208A6CE8069B3A5DBB49C86CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID: a]q$ a]q$xaq$#Dp^$3Dp^
                    • API String ID: 0-347205195
                    • Opcode ID: 66a56a1e54b11a3d9cb27b35f69b5870d9270ab4799d7f77ae7169e8a49e3829
                    • Instruction ID: b39b71716f936c568f3c2422c94ada841d6354336df45c4ca77b2c0a6422b56e
                    • Opcode Fuzzy Hash: 66a56a1e54b11a3d9cb27b35f69b5870d9270ab4799d7f77ae7169e8a49e3829
                    • Instruction Fuzzy Hash: 83619C747007008FD715EF28D894B6A77E2FB85714F20896CE9069F3A5DBB5EC468B90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID: (aq$Te]q$d6p
                    • API String ID: 0-967301506
                    • Opcode ID: db0b1b8583ca4405cc8c24b457005f706747019ec1579299042793a48c87034f
                    • Instruction ID: e8e1653c6ee3e1deedb2dca40cfd399576257f4b44c31f20300cc1ac2bb0ec3c
                    • Opcode Fuzzy Hash: db0b1b8583ca4405cc8c24b457005f706747019ec1579299042793a48c87034f
                    • Instruction Fuzzy Hash: 7C51A035B005148FD744EF69C454A6EBBF6EF89700F2181A9E806EB3A6CB35DD028B94
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID: Haq$dLcq
                    • API String ID: 0-1713614415
                    • Opcode ID: dd6f54ec26ba5e57722b59c24be9a687ece9d717fb6e68578f47de2db5922e3e
                    • Instruction ID: e5a11982037041c5df1adc48d98f47694667699481668485eee9adef544c58cf
                    • Opcode Fuzzy Hash: dd6f54ec26ba5e57722b59c24be9a687ece9d717fb6e68578f47de2db5922e3e
                    • Instruction Fuzzy Hash: C641C1717002048FDB14EF69D454AAEBBF6EF89304F2445AAE405EB3A2CB759D45CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID: LR]q
                    • API String ID: 0-3081347316
                    • Opcode ID: 1566415c0280ba44baf3a9ae456455e5f40519c87e0acc0bab73ebf6ab0b1b3b
                    • Instruction ID: 62268f1bcd4dbb9d6c4604f62aeafbc3cefe165822d92cee322d903b16b0f14d
                    • Opcode Fuzzy Hash: 1566415c0280ba44baf3a9ae456455e5f40519c87e0acc0bab73ebf6ab0b1b3b
                    • Instruction Fuzzy Hash: 6531DF70F002168FCB54AB788451A7E7BF2EFC9200B2480ADE50ADB361EE349D028791
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID: dLcq
                    • API String ID: 0-2236789282
                    • Opcode ID: 1b22c00f0568184c1eeaf2588913fda16ad0ac9e3cc09819f12910f4f8bfebb0
                    • Instruction ID: d1efc0b662dff58395613d28fb2d20a138e6238117c4751e7f85ed227ecd8c17
                    • Opcode Fuzzy Hash: 1b22c00f0568184c1eeaf2588913fda16ad0ac9e3cc09819f12910f4f8bfebb0
                    • Instruction Fuzzy Hash: 6C315C75A00205CFDB15EF69C458BAEBBF6EF48304F2485AAE401AB3A1CB759D45CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID: Haq
                    • API String ID: 0-725504367
                    • Opcode ID: 6a620689c0685b0378b87c89f6c199830df87bfe01f4f48d65c1f032b144813f
                    • Instruction ID: edbb329df90262298f4285077f544d315865d030cd15474d7cf6e417e08353b2
                    • Opcode Fuzzy Hash: 6a620689c0685b0378b87c89f6c199830df87bfe01f4f48d65c1f032b144813f
                    • Instruction Fuzzy Hash: 54F04C313492400FD345AF3D681046E7FE79FDA22031608FAD109CB393DD298C0683E5
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5ede2b6c744cf37dc3c09e16a62908dc7872ef86f87020ce9d21dbd2dd7f2b29
                    • Instruction ID: 41f226e0b353d638816c3188c70bffba89a52be1093ca1841c7f2f9d5560d091
                    • Opcode Fuzzy Hash: 5ede2b6c744cf37dc3c09e16a62908dc7872ef86f87020ce9d21dbd2dd7f2b29
                    • Instruction Fuzzy Hash: C311E4B05097814FE306EF29D861615FFB2EF86214719C2EAC448CB367D674A800C765
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b7ba6df172bf47b778af655e124875a244b56e62596b3ec148b818edc1d60369
                    • Instruction ID: 9431da7c4b0f7bd64f21e07dc157a8a8f0290cb0dbf60c9f5ecf71ebe8746afc
                    • Opcode Fuzzy Hash: b7ba6df172bf47b778af655e124875a244b56e62596b3ec148b818edc1d60369
                    • Instruction Fuzzy Hash: 844180B5A202289BDF04ABA8D81079D7BBBFBCD710F158069EC09B3784CB356C518B94
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a209f26250a95e94c47a4435ab64b9b0361a6c5519abf86e96e7f943487425f4
                    • Instruction ID: d8d578a901b4c2e975f04baa9a23228c2b3f3d977bdc398be4d72d7a510c5ddb
                    • Opcode Fuzzy Hash: a209f26250a95e94c47a4435ab64b9b0361a6c5519abf86e96e7f943487425f4
                    • Instruction Fuzzy Hash: A651D778501E42DFE706FF28F8499597763FB853053208AA8E4018B36DEBB5AD46CF91
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d9ea7d04e8aa8a36b473278c49337d57d17b2bcb9f665b7154a18543bf8c69d2
                    • Instruction ID: b2e84447b1f81a987d00e86271d2ac72d56caecc44f5b10941cd397288f4e852
                    • Opcode Fuzzy Hash: d9ea7d04e8aa8a36b473278c49337d57d17b2bcb9f665b7154a18543bf8c69d2
                    • Instruction Fuzzy Hash: 9B41C3B5F002099FCB04EFBD85946AEBBF6EF89300F218569D44AD7345DB349D428B90
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 793370dc3490fbb9d8d6ac491df786a57f1bc74c60cee22ed52623295e4d1fd5
                    • Instruction ID: 1c037e10955ae05713e8be295b971cbee330bdf15b83d2a331d0b7261acbbced
                    • Opcode Fuzzy Hash: 793370dc3490fbb9d8d6ac491df786a57f1bc74c60cee22ed52623295e4d1fd5
                    • Instruction Fuzzy Hash: E8417E35700B06DFDB69BFBAD81833A3AA5FB44608724492DD447C7395EF24D942CBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dadee163341cbbd6d8e4263f23b37e70bae4765f3c08fa41d759a35ab0b610ac
                    • Instruction ID: 87af6cdf69c80ec79e14612f27c155b9dd355d78250a31c5a6f7e94e3a0547af
                    • Opcode Fuzzy Hash: dadee163341cbbd6d8e4263f23b37e70bae4765f3c08fa41d759a35ab0b610ac
                    • Instruction Fuzzy Hash: 8A318F34700702DFDB69BFB9A81823E76A5FF84608720482CD40BC7395EF20D846CBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632023950.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_a6d000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 05d9f8e68154add5e64f12ad838f14be5c10a14473b7171368c9c2b8bd844854
                    • Instruction ID: 8eedde2f6c65207a77eb3e47608a30991dd5945417bb3bf287df0fcaff7df597
                    • Opcode Fuzzy Hash: 05d9f8e68154add5e64f12ad838f14be5c10a14473b7171368c9c2b8bd844854
                    • Instruction Fuzzy Hash: 812145B1A04200DFDB01DF04D9C0B26BF75FB98358F34C569E90A0B656C336D816CBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9623bd7783d288070c2d219bda448d62162a227d5097950046555701a5b4069b
                    • Instruction ID: e1eec252613ccdb7d58eeeb07d36efedb34417eb8cc9de85e554def548371bb2
                    • Opcode Fuzzy Hash: 9623bd7783d288070c2d219bda448d62162a227d5097950046555701a5b4069b
                    • Instruction Fuzzy Hash: C311ADB4B006059FDB14EFB9D8056AE7BF6EF8920476048B9D40ADB356EA35D902CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632023950.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_a6d000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                    • Instruction ID: e8a1600f55d17d68f206ab3b2c88213b89feea19088c58de95afac9dc741ea2c
                    • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                    • Instruction Fuzzy Hash: 7711E676904240CFDF16CF14D5C4B16BF71FB94324F24C5A9D90A4B656C336D85ACBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2e8d6006863fcfc3e72b21a591d064f49828b492cb0a4efef21aa237bfed671f
                    • Instruction ID: cea663dbba568d2af30748a1e271b4761d3682b669d4c81e1a60762cc3d61d30
                    • Opcode Fuzzy Hash: 2e8d6006863fcfc3e72b21a591d064f49828b492cb0a4efef21aa237bfed671f
                    • Instruction Fuzzy Hash: BC118BB4B002059FCB54EBBDD80462A7BE6FF8920072048B9D40ACB355EA31DC02CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ba937cc0b8c1f8e307a20beab9e4e7737a94e4077678b6994b7149cd9a808d5f
                    • Instruction ID: 1ca04926ae201dcb822ebb0573a369dbe304e1d3022995b346ee8e0592cc8b0e
                    • Opcode Fuzzy Hash: ba937cc0b8c1f8e307a20beab9e4e7737a94e4077678b6994b7149cd9a808d5f
                    • Instruction Fuzzy Hash: 37017C38B01615CFDB18FB69D4507BE7BA5EF86704F2480ADE40AD7302DB78D9019B91
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0b9b440365ec2628ad0c5b2162179358bb345972459e8c84321a0feefc335042
                    • Instruction ID: 4ce8a8cd1febaebac4d507ef60487f5896ec6c5d034f1017257decf032df8614
                    • Opcode Fuzzy Hash: 0b9b440365ec2628ad0c5b2162179358bb345972459e8c84321a0feefc335042
                    • Instruction Fuzzy Hash: A80121348047488FD704FBACD8412BC7B30EB83308B0402A8D04A9738AEAB0590ACBA6
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a5853cab504f8b1a2ec5339e08dd5ae851c2b56d2ff5b71073dec549a3098c2c
                    • Instruction ID: 4e49b4e3573323bec4a80cf39a8d09036cf2a29fc8830f0483380ce65fcdf7f6
                    • Opcode Fuzzy Hash: a5853cab504f8b1a2ec5339e08dd5ae851c2b56d2ff5b71073dec549a3098c2c
                    • Instruction Fuzzy Hash: 1701F434800B0ACFDB04FFBCE84526D7B71FF82304B444668D40A97359EB705546CBA6
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cb56be8cae8444242176d18a0fd70cfcd9f89db2963ffe564c021f7ba6e0e7cd
                    • Instruction ID: 57229795149e90e3587a6c48f099748f98b77938682514c66e3fdfd5805eebe0
                    • Opcode Fuzzy Hash: cb56be8cae8444242176d18a0fd70cfcd9f89db2963ffe564c021f7ba6e0e7cd
                    • Instruction Fuzzy Hash: 7CC08C34114348CFD308BBA4E80C3383A10EB8330EF700108A04B8A2B6AE354486C232
                    Memory Dump Source
                    • Source File: 00000000.00000002.4632336438.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_26c0000_zvXPSu3dK5.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 07e0e2e92e3f192db65405ab093a9614091248f2a25356386620dafc5309e8b6
                    • Instruction ID: 70b928097e071f81e999a37c82d1c374a43e43de127bbff04730a7dcd4a75e32
                    • Opcode Fuzzy Hash: 07e0e2e92e3f192db65405ab093a9614091248f2a25356386620dafc5309e8b6
                    • Instruction Fuzzy Hash: 8BC01234114648CBD708AB64E8083383A10EB8230EFB00209A00B892A69E254486C622