Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CrSpoofer.exe

Overview

General Information

Sample name:CrSpoofer.exe
Analysis ID:1575584
MD5:2e87d4e593da9635c26553f5d5af389a
SHA1:64fad232e197d1bf0091db37e137ef722024b497
SHA256:561c94494c3cd0b918bdf5eb323682fad6596a0a54c4cdd85a99880b4028b3f8
Tags:AsyncRATexeuser-lontze7
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • CrSpoofer.exe (PID: 2104 cmdline: "C:\Users\user\Desktop\CrSpoofer.exe" MD5: 2E87D4E593DA9635C26553F5D5AF389A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "0.tcp.eu.ngrok.io", "Ports": "15174", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "XeSaBDVweaVCzikSzrqdWiRFXAruYM7t", "Mutex": "aNoM7pvDUvoo", "Certificate": "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", "ServerSignature": "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", "BDOS": "false", "External_config_on_Pastebin": "null"}
SourceRuleDescriptionAuthorStrings
CrSpoofer.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    CrSpoofer.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      CrSpoofer.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xa273:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0x4d704:$a2: Stub.exe
      • 0x4d794:$a2: Stub.exe
      • 0x6f3a:$a3: get_ActivatePong
      • 0xa48b:$a4: vmware
      • 0xa303:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x7cf5:$a6: get_SslClient
      CrSpoofer.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xa305:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xa105:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        Process Memory Space: CrSpoofer.exe PID: 2104JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: CrSpoofer.exe PID: 2104INDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0x1326a:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          SourceRuleDescriptionAuthorStrings
          2.0.CrSpoofer.exe.a50000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            2.0.CrSpoofer.exe.a50000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0xa273:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0x4d704:$a2: Stub.exe
            • 0x4d794:$a2: Stub.exe
            • 0x6f3a:$a3: get_ActivatePong
            • 0xa48b:$a4: vmware
            • 0xa303:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0x7cf5:$a6: get_SslClient
            2.0.CrSpoofer.exe.a50000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0xa305:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: CrSpoofer.exeAvira: detected
            Source: CrSpoofer.exeMalware Configuration Extractor: AsyncRAT {"Server": "0.tcp.eu.ngrok.io", "Ports": "15174", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "XeSaBDVweaVCzikSzrqdWiRFXAruYM7t", "Mutex": "aNoM7pvDUvoo", "Certificate": "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", "ServerSignature": "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", "BDOS": "false", "External_config_on_Pastebin": "null"}
            Source: CrSpoofer.exeReversingLabs: Detection: 84%
            Source: CrSpoofer.exeVirustotal: Detection: 79%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: CrSpoofer.exeJoe Sandbox ML: detected
            Source: CrSpoofer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: CrSpoofer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Malware configuration extractorURLs: 0.tcp.eu.ngrok.io
            Source: Yara matchFile source: CrSpoofer.exe, type: SAMPLE
            Source: global trafficTCP traffic: 192.168.2.5:49747 -> 3.78.28.71:15174
            Source: global trafficTCP traffic: 192.168.2.5:49912 -> 18.153.198.123:15174
            Source: Joe Sandbox ViewIP Address: 3.78.28.71 3.78.28.71
            Source: Joe Sandbox ViewIP Address: 18.153.198.123 18.153.198.123
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: 0.tcp.eu.ngrok.io

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: CrSpoofer.exe, type: SAMPLE
            Source: Yara matchFile source: 2.0.CrSpoofer.exe.a50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CrSpoofer.exe PID: 2104, type: MEMORYSTR

            System Summary

            barindex
            Source: CrSpoofer.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: CrSpoofer.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 2.0.CrSpoofer.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 2.0.CrSpoofer.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: CrSpoofer.exe PID: 2104, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: CrSpoofer.exe, 00000002.00000000.2298492071.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs CrSpoofer.exe
            Source: CrSpoofer.exeBinary or memory string: OriginalFilenameStub.exe" vs CrSpoofer.exe
            Source: CrSpoofer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: CrSpoofer.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: CrSpoofer.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 2.0.CrSpoofer.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 2.0.CrSpoofer.exe.a50000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: CrSpoofer.exe PID: 2104, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: CrSpoofer.exe, wKVPhtFtbPbiz.csBase64 encoded string: 'TTYmb+XHuWzSwG7wBjFXFLFb+g86kVcsWNMEswvHgHZFAyOXvm4dAQ4IxubbqwpiImZwVf/K2YFsDKikVaWH/U588VZfY+KcyE+2IWtsI/k=', 'l/B8XTg9S5xKJDLUol1cGt51fFzg7Kh9ql5vG7YVNf47xeWVJog/mLNMD5rSNWyOgWqvCQowry4tvzzld0RNdg==', 'UV1mAEKU45f3tqH1aeFw9QGuj2aP639kB1AfYcdcxYvNg+gKpkVp9E45smFAOj7l79m2s5WGE8bdcF8Z4eCk6A==', 'Ht3n6QKovmc+HSJH1KVuHmSWItL5nMXc+mJYcVoMMvPl1Oo5HZPq3RAAS49zQ7+PfzjmzVxjorL19oLb6b4ndOf8s81DM+oMnDSesMjHdKQYBoCK3nn/vPp4o7SLL1/q8W4DDRv94CdmpdlEUhHy1mdEUXwWHdINak6Lt9P4o8zSddEZ92mxGSaFDhPyXiWBx9dTYSzHuWdA4OOVHqj7Dpq0o8OCgZ6FgOrTMmFiOy6HGwaLMroiq03YPbD6A9x6JDMRJKJt2w4r6spPjIpp5iY4RhkO9rF9k4Li99d4Vuj2z7UiOWUUCjwe18h2Ey2d1RsgWnSvoTIXoNHQlLhUJxlVpOhWE6GOIcA3yyLd9a9/XEgKCNaZlX5FXxi+VNjfBlnej8PleJ0T+9Cg9M4JxQlOzOnrEhMMIR3hWLFKq8E2YzvI74Iqd8YUPKQ5Nuy8VhQcpEfsQvppwBBUDmJmhpr3XwOzOa+46R4NWRKJTv/Hw1GQXTveSzdgB3GYCt+dkv/J4WAQvFQ8O3Acx2Cf1cX8XQkQ1hheqX2rC/RZXx+1RqljlBvGiFBSBrXZq1GBdk5YNB8M5D9qkhLOeHXGu+LMgkgwn3lIJbxfJTOsZynW9dJOJd74D0WMkUWCjVW+o/+c+TwT1yz30cRQTRq6GxgjQxxywiD+ROqvUG2WpQtkN1FPKPgzKvDX25nPhHLhplW/XGfrYCavH7Byo74dEmsxSKEwnea3gsGbpnRhhlINevfjpWZOuF5fyvcd/GfCTS76Nh9jVr6qd3hMaI1U2TEGWTXmL3Bmf1WnYyRYAGaeV7MVn3NR7QEyNMgVTQa2riXOdSE7q/7yJ6o5tc1IoYdE72RUUOiLCxWqF1fLBAmCATEV9AwB7ES9x64YzNZ+YoXSKHixWimAG+14rqqA8AghnDB/9YJCSs5mkdNa4RSWKhfGTy8LRK0FlNWolnEXVvDv/REpqtjLQlK3E3Abt2UQIO9TMpwrQdcMRBdwhI8DEp4gtzP8Mq4kxTKPjE8gPpQ6tQAFdGluNZgY1e8yd9KVJq8TcvJ+1izAmcjpLZH1FWC6XsELVTcBEy5bqMudCUCb+oLNM64JygKHrRGVAVZCpGDTm0ZFpL3XJUo4jJVdQvvW35PIuZcit3dpL7Ok9NMh+x7ubttquxZegmQdUvbuA73uL6MI37uOpAGJzvGpM9/WEanfnv9KcXBmPWVZ+I2gTYXddSB6ookj/eFs0K/lUgPINx8rA2iplQGY+lO9vCUSRXT/aOgjAXloTkHcqthqnMyJdOE0VCMoTYiISl7qzl3+fXKT8LuudArUMfX8eqvEZAONKTtkT0RGXGBP5BQiy9y55pkaSBdOkQdhdEPjTriF9CWECG3/OntEHi0VdBkLVg3/l0HTMS5yrWqwM4pCOO2r5yFc0j9L0U0UYX5hckWu+OnFLzI8o2SiVpdLG/x3DGrPdhv0xj+zhEJfjWXvayfG3PmSvUN57YUiMgdK0eM1kIoHPjLtivbn6sN4dyJTnvGNwLgafPaUx3jPb7wNDL33EUIJX7XgJJA4aPMmW108KMoU5/G6fNc8j9tkVtMK/Wcf9Qle8SQ9vd9leRGYW8XcxEb7mVjiCuC/4rExC3hIjvLZkM3IBZIPGXtbRuL19HlugRnJR8/FjYAR02hREcbJMT/ikPjMB9RYCIU3d5j8GSiAZJoyvNwYguYf2bzAW6ZXIS6VgmLNepawamkXThRUiAk00X0Q8FKsTbF+S/RsZPKGHQaGLcjMFB41Cgw5wvOwZ7xW7YIivhi5jILgitXAL4Xiaf+4Z5mYKj30wnGjS9N0P1Mm0oaE7dvWBxzAIO6ZJy2nEXFoBr/Xb00j7J2JAf5xctscvEqZTFD+TqXMul+dVPJgeMwmXfPWRzfGawfvsXt5tXwZUoA1H8DDoU1rAF+QG7MidMtZYNg9ZuSdLsnuHyvliz2KqpcGsuyIRinio2Oi1/+TDdC7hxFEawSUfCbiKmqH+OsCWQuxT8IR1QaMXGzJhC1COM1IyKHX2eMOTjokMwfuyUK5oQNDGh1KlfnyTqcoXEkTJYX5wh01kzXS0bJTg4brhWz/H58TLXXF/H8sDBGW1hfMxYi9qht4QkP+AuByze+VpR46F7ovGH99zkKpMLaFALbHD+Y4BxVqn0D4+v4Nj8YrKb7TuAqe0vFkzfI0ba8vFkXp4AqN14d9ITO0neUo6MkvNrxafCJ1r8Yp8yzxbeAVMwo6UH+W4oQPkIJlWpbnXSoH6MMFDrvag92u/a/8Tf2D3LItjR0XFXYNaUTehipnFxcJdXpi4RHO8I0oCc5vYjaLfkh/Uf6pTlfz4HXWbRI=', 'ssULbq5nI3xQOXzskksHU+M2DBqgVt6BcZuvBQjRZ8ryAXUzvp2xJswmSeQjv0sqTYliBp4Aj4PbDCHQ3Dgp4w==', 'XWc5S6aolzSmnaV/JGeYbCZLwDVRpsh8hJllVh2zsiHAKEhQxnxYDm4uN+X/Ai2o7yFTPNiZSZGt0ytsoo2BpQ=='
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@2/2
            Source: C:\Users\user\Desktop\CrSpoofer.exeMutant created: NULL
            Source: C:\Users\user\Desktop\CrSpoofer.exeMutant created: \Sessions\1\BaseNamedObjects\aNoM7pvDUvoo
            Source: CrSpoofer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: CrSpoofer.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\CrSpoofer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: CrSpoofer.exeReversingLabs: Detection: 84%
            Source: CrSpoofer.exeVirustotal: Detection: 79%
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeSection loaded: schannel.dllJump to behavior
            Source: CrSpoofer.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: CrSpoofer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: CrSpoofer.exe, UcfjAinbFA.csHigh entropy of concatenated method names: 'pxAJRsISVTXaO', 'jhSGqEPQhuwoFl', 'cpTEhwAVcVMtqkXH', 'WIVbrfvrpZKEFu', 'TNiIsuVZBkYM', 'xQpHbmwNmvkwDwleQ', 'qfkwHDVMsfma', 'ZDujyoaLfhh', 'lKfavNbZcmeY', 'yGleACzzVtGqK'

            Boot Survival

            barindex
            Source: Yara matchFile source: CrSpoofer.exe, type: SAMPLE
            Source: Yara matchFile source: 2.0.CrSpoofer.exe.a50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CrSpoofer.exe PID: 2104, type: MEMORYSTR
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: CrSpoofer.exe, type: SAMPLE
            Source: Yara matchFile source: 2.0.CrSpoofer.exe.a50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CrSpoofer.exe PID: 2104, type: MEMORYSTR
            Source: CrSpoofer.exeBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\Desktop\CrSpoofer.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeMemory allocated: 2E30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exe TID: 2780Thread sleep time: -80000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\CrSpoofer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: CrSpoofer.exeBinary or memory string: vmware
            Source: CrSpoofer.exe, 00000002.00000002.3541344839.00000000010DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllm
            Source: C:\Users\user\Desktop\CrSpoofer.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeQueries volume information: C:\Users\user\Desktop\CrSpoofer.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\CrSpoofer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: CrSpoofer.exe, type: SAMPLE
            Source: Yara matchFile source: 2.0.CrSpoofer.exe.a50000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CrSpoofer.exe PID: 2104, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            2
            Virtualization/Sandbox Evasion
            OS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory2
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager13
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive11
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Obfuscated Files or Information
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            CrSpoofer.exe84%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
            CrSpoofer.exe79%VirustotalBrowse
            CrSpoofer.exe100%AviraTR/Dropper.Gen
            CrSpoofer.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            0.tcp.eu.ngrok.io0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            s-part-0035.t-0009.t-msedge.net
            13.107.246.63
            truefalse
              high
              0.tcp.eu.ngrok.io
              3.78.28.71
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                0.tcp.eu.ngrok.iotrue
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                3.78.28.71
                0.tcp.eu.ngrok.ioUnited States
                16509AMAZON-02UStrue
                18.153.198.123
                unknownUnited States
                16509AMAZON-02USfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1575584
                Start date and time:2024-12-16 06:17:10 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 35s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:CrSpoofer.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@1/0@2/2
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 17
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.190.181.0, 20.12.23.50
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target CrSpoofer.exe, PID 2104 because it is empty
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                3.78.28.717299_output.vbsGet hashmaliciousUnknownBrowse
                  TLH3anP3lh.exeGet hashmaliciousNjratBrowse
                    r0FS3r7Ore.exeGet hashmaliciousNjratBrowse
                      lXLWfHWHMd.exeGet hashmaliciousNjratBrowse
                        4zeGOaTirn.exeGet hashmaliciousNjratBrowse
                          18.153.198.123YiWuyX184J.exeGet hashmaliciousNjratBrowse
                            TLH3anP3lh.exeGet hashmaliciousNjratBrowse
                              OLHskBFtS1.exeGet hashmaliciousNjratBrowse
                                tjK8Z8Q3JH.exeGet hashmaliciousNjratBrowse
                                  4zeGOaTirn.exeGet hashmaliciousNjratBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    s-part-0035.t-0009.t-msedge.netImageMso.Gallery.xllGet hashmaliciousUnknownBrowse
                                    • 13.107.246.63
                                    iAERhkhaZC.exeGet hashmaliciousUnknownBrowse
                                    • 13.107.246.63
                                    I37faEaz1K.exeGet hashmaliciousLummaCBrowse
                                    • 13.107.246.63
                                    6eftz6UKDm.exeGet hashmaliciousCredential FlusherBrowse
                                    • 13.107.246.63
                                    Adver Ransomware.exeGet hashmaliciousUnknownBrowse
                                    • 13.107.246.63
                                    Starcat Ransomware 32bit.exeGet hashmaliciousStarcatBrowse
                                    • 13.107.246.63
                                    RCRU64 Ransomware.exeGet hashmaliciousTrojanRansomBrowse
                                    • 13.107.246.63
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                    • 13.107.246.63
                                    O4nVtyc9UD.exeGet hashmaliciousUnknownBrowse
                                    • 13.107.246.63
                                    Yl5PzZNJRC.exeGet hashmaliciousUnknownBrowse
                                    • 13.107.246.63
                                    0.tcp.eu.ngrok.io7299_output.vbsGet hashmaliciousUnknownBrowse
                                    • 3.78.28.71
                                    Opera.exeGet hashmaliciousZTratBrowse
                                    • 52.57.120.10
                                    YiWuyX184J.exeGet hashmaliciousNjratBrowse
                                    • 3.74.27.83
                                    TLH3anP3lh.exeGet hashmaliciousNjratBrowse
                                    • 52.57.120.10
                                    r0FS3r7Ore.exeGet hashmaliciousNjratBrowse
                                    • 3.74.27.83
                                    OLHskBFtS1.exeGet hashmaliciousNjratBrowse
                                    • 3.74.27.83
                                    lXLWfHWHMd.exeGet hashmaliciousNjratBrowse
                                    • 18.192.31.30
                                    tjK8Z8Q3JH.exeGet hashmaliciousNjratBrowse
                                    • 18.153.198.123
                                    4zeGOaTirn.exeGet hashmaliciousNjratBrowse
                                    • 3.78.28.71
                                    C9zGTJBy3T.exeGet hashmaliciousNjratBrowse
                                    • 3.125.209.94
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    AMAZON-02UShttp://18.224.21.137/FFmnpShhHMMWeIqsVa2rJ69xinQlZ-7450Get hashmaliciousUnknownBrowse
                                    • 18.224.21.137
                                    arm5.elfGet hashmaliciousUnknownBrowse
                                    • 35.164.31.57
                                    arm.elfGet hashmaliciousUnknownBrowse
                                    • 18.146.49.140
                                    sh4.elfGet hashmaliciousUnknownBrowse
                                    • 54.104.203.158
                                    ppc.elfGet hashmaliciousUnknownBrowse
                                    • 3.3.247.98
                                    mips.elfGet hashmaliciousUnknownBrowse
                                    • 18.202.125.197
                                    arm6.elfGet hashmaliciousUnknownBrowse
                                    • 18.253.84.76
                                    x86.elfGet hashmaliciousUnknownBrowse
                                    • 15.184.158.117
                                    hmips.elfGet hashmaliciousUnknownBrowse
                                    • 34.249.145.219
                                    sparc.elfGet hashmaliciousUnknownBrowse
                                    • 18.135.9.157
                                    AMAZON-02UShttp://18.224.21.137/FFmnpShhHMMWeIqsVa2rJ69xinQlZ-7450Get hashmaliciousUnknownBrowse
                                    • 18.224.21.137
                                    arm5.elfGet hashmaliciousUnknownBrowse
                                    • 35.164.31.57
                                    arm.elfGet hashmaliciousUnknownBrowse
                                    • 18.146.49.140
                                    sh4.elfGet hashmaliciousUnknownBrowse
                                    • 54.104.203.158
                                    ppc.elfGet hashmaliciousUnknownBrowse
                                    • 3.3.247.98
                                    mips.elfGet hashmaliciousUnknownBrowse
                                    • 18.202.125.197
                                    arm6.elfGet hashmaliciousUnknownBrowse
                                    • 18.253.84.76
                                    x86.elfGet hashmaliciousUnknownBrowse
                                    • 15.184.158.117
                                    hmips.elfGet hashmaliciousUnknownBrowse
                                    • 34.249.145.219
                                    sparc.elfGet hashmaliciousUnknownBrowse
                                    • 18.135.9.157
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):2.5553259242690545
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:CrSpoofer.exe
                                    File size:319'488 bytes
                                    MD5:2e87d4e593da9635c26553f5d5af389a
                                    SHA1:64fad232e197d1bf0091db37e137ef722024b497
                                    SHA256:561c94494c3cd0b918bdf5eb323682fad6596a0a54c4cdd85a99880b4028b3f8
                                    SHA512:0667ddaea41c4c4f21e7bc249384230763c4be7d9c01d6b1cf694da647fbcd66de859afad5f7c88399656da48b349e892f22301380da0bd100199e9c5b23c2e3
                                    SSDEEP:1536:vuPfZTgKa2fl7vACbbZvsZyMmXdz1P03Jr+4buiCsRxjToex:vuPBTgKa2NbA+bZE2XP2CsR9oex
                                    TLSH:9264E6607BA5AD0AE93B0BB85065D3B95363BF697202C3061CF1FC637533A821DD15D9
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....-e.....................,......^.... ........@.. .......................@............@................................
                                    Icon Hash:44de787832506410
                                    Entrypoint:0x40d05e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x652DADE5 [Mon Oct 16 21:40:53 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xd00c0x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x428cb.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x520000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xb0640xb200d4b61db217386e02f629229e90265972False0.5413448033707865data5.618784830654349IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xe0000x428cb0x42a00b41db1ffef3210ef5bdd03eccbc2ab85False0.08520828447467167data1.7846622064522097IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x520000xc0x20015084b3914063aed16bc949794199c55False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xe1300x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2621440.0822447258632423
                                    RT_GROUP_ICON0x501580x14data1.1
                                    RT_VERSION0x5016c0x2ccdata0.43575418994413406
                                    RT_MANIFEST0x504380x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 16, 2024 06:18:35.871062994 CET4974715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:35.990847111 CET15174497473.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:35.991120100 CET4974715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:36.005359888 CET4974715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:36.125135899 CET15174497473.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:37.261856079 CET15174497473.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:37.262042999 CET15174497473.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:37.262465000 CET4974715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:42.286933899 CET4974715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:42.288299084 CET4976315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:42.408077002 CET15174497633.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:42.408191919 CET4976315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:42.408670902 CET4976315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:42.528321028 CET15174497633.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:43.679924965 CET15174497633.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:43.680160046 CET15174497633.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:43.680228949 CET4976315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:48.690808058 CET4976315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:48.691755056 CET4978115174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:48.811510086 CET15174497813.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:48.811681032 CET4978115174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:48.812060118 CET4978115174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:48.970930099 CET15174497813.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:50.090931892 CET15174497813.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:50.091051102 CET15174497813.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:50.091303110 CET4978115174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:55.097182989 CET4978115174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:55.098733902 CET4979715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:55.218405008 CET15174497973.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:55.218508005 CET4979715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:55.219192028 CET4979715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:18:55.338901997 CET15174497973.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:56.495630026 CET15174497973.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:56.496102095 CET15174497973.78.28.71192.168.2.5
                                    Dec 16, 2024 06:18:56.496246099 CET4979715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:01.503238916 CET4979715174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:01.504235983 CET4981315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:01.626070023 CET15174498133.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:01.626323938 CET4981315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:01.627015114 CET4981315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:01.747160912 CET15174498133.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:02.901376009 CET15174498133.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:02.901786089 CET15174498133.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:02.902225971 CET4981315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:07.909653902 CET4981315174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:07.910490036 CET4983015174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:08.030957937 CET15174498303.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:08.031161070 CET4983015174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:08.031980038 CET4983015174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:08.151685953 CET15174498303.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:09.300601006 CET15174498303.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:09.300720930 CET15174498303.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:09.300838947 CET4983015174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:14.315640926 CET4983015174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:14.316637039 CET4984615174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:14.436292887 CET15174498463.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:14.436398029 CET4984615174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:14.437043905 CET4984615174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:14.556668997 CET15174498463.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:15.710298061 CET15174498463.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:15.710741997 CET15174498463.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:15.710829020 CET4984615174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:20.721848965 CET4984615174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:20.723007917 CET4986215174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:20.842900038 CET15174498623.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:20.843842983 CET4986215174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:20.844615936 CET4986215174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:20.964431047 CET15174498623.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:22.117647886 CET15174498623.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:22.117686987 CET15174498623.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:22.117784977 CET4986215174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:27.128341913 CET4986215174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:27.129163027 CET4987915174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:27.248980999 CET15174498793.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:27.249079943 CET4987915174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:27.249743938 CET4987915174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:27.369494915 CET15174498793.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:28.523261070 CET15174498793.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:28.523562908 CET15174498793.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:28.523616076 CET4987915174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:33.547199965 CET4987915174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:33.556281090 CET4989515174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:33.676039934 CET15174498953.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:33.676147938 CET4989515174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:33.683141947 CET4989515174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:33.802871943 CET15174498953.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:34.946791887 CET15174498953.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:34.947520971 CET15174498953.78.28.71192.168.2.5
                                    Dec 16, 2024 06:19:34.947617054 CET4989515174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:39.956275940 CET4989515174192.168.2.53.78.28.71
                                    Dec 16, 2024 06:19:40.208208084 CET4991215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:40.328015089 CET151744991218.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:40.328214884 CET4991215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:40.328773975 CET4991215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:40.448472977 CET151744991218.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:41.602981091 CET151744991218.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:41.603112936 CET151744991218.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:41.603193998 CET4991215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:46.612688065 CET4991215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:46.613974094 CET4992815174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:46.733665943 CET151744992818.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:46.733817101 CET4992815174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:46.734249115 CET4992815174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:46.853954077 CET151744992818.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:48.012033939 CET151744992818.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:48.012209892 CET151744992818.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:48.012326002 CET4992815174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:53.019367933 CET4992815174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:53.020468950 CET4994315174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:53.140208006 CET151744994318.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:53.140307903 CET4994315174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:53.140726089 CET4994315174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:53.260452032 CET151744994318.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:54.414944887 CET151744994318.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:54.414999008 CET151744994318.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:54.415081024 CET4994315174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:59.425117016 CET4994315174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:59.426394939 CET4995915174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:59.546082020 CET151744995918.153.198.123192.168.2.5
                                    Dec 16, 2024 06:19:59.546183109 CET4995915174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:59.546669960 CET4995915174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:19:59.666301012 CET151744995918.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:00.988323927 CET151744995918.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:00.988425970 CET151744995918.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:00.988490105 CET4995915174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:06.003616095 CET4995915174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:06.004911900 CET4997515174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:06.124593019 CET151744997518.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:06.124723911 CET4997515174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:06.125222921 CET4997515174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:06.244796038 CET151744997518.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:07.399765015 CET151744997518.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:07.399842024 CET151744997518.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:07.399904966 CET4997515174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:12.409672976 CET4997515174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:12.411464930 CET4999115174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:12.531292915 CET151744999118.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:12.531487942 CET4999115174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:12.532180071 CET4999115174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:12.651899099 CET151744999118.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:13.805824041 CET151744999118.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:13.806094885 CET151744999118.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:13.806212902 CET4999115174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:18.815699100 CET4999115174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:18.816912889 CET5000715174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:18.936620951 CET151745000718.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:18.936786890 CET5000715174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:18.937410116 CET5000715174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:19.057027102 CET151745000718.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:20.212265968 CET151745000718.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:20.212665081 CET151745000718.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:20.212718010 CET5000715174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:25.222692013 CET5000715174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:25.224154949 CET5001215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:25.344291925 CET151745001218.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:25.344475985 CET5001215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:25.345042944 CET5001215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:25.464693069 CET151745001218.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:26.615567923 CET151745001218.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:26.615678072 CET151745001218.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:26.615864038 CET5001215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:31.628366947 CET5001215174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:31.629564047 CET5001315174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:31.750422955 CET151745001318.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:31.750550985 CET5001315174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:31.751033068 CET5001315174192.168.2.518.153.198.123
                                    Dec 16, 2024 06:20:31.870733023 CET151745001318.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:33.021486998 CET151745001318.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:33.021737099 CET151745001318.153.198.123192.168.2.5
                                    Dec 16, 2024 06:20:33.021852970 CET5001315174192.168.2.518.153.198.123
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 16, 2024 06:18:34.980418921 CET6314453192.168.2.51.1.1.1
                                    Dec 16, 2024 06:18:35.829479933 CET53631441.1.1.1192.168.2.5
                                    Dec 16, 2024 06:19:39.957062006 CET6402353192.168.2.51.1.1.1
                                    Dec 16, 2024 06:19:40.207384109 CET53640231.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 16, 2024 06:18:34.980418921 CET192.168.2.51.1.1.10x3b1eStandard query (0)0.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                    Dec 16, 2024 06:19:39.957062006 CET192.168.2.51.1.1.10x3b1Standard query (0)0.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 16, 2024 06:18:23.246635914 CET1.1.1.1192.168.2.50xf69fNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Dec 16, 2024 06:18:23.246635914 CET1.1.1.1192.168.2.50xf69fNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                    Dec 16, 2024 06:18:35.829479933 CET1.1.1.1192.168.2.50x3b1eNo error (0)0.tcp.eu.ngrok.io3.78.28.71A (IP address)IN (0x0001)false
                                    Dec 16, 2024 06:19:40.207384109 CET1.1.1.1192.168.2.50x3b1No error (0)0.tcp.eu.ngrok.io18.153.198.123A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Target ID:2
                                    Start time:00:18:29
                                    Start date:16/12/2024
                                    Path:C:\Users\user\Desktop\CrSpoofer.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\CrSpoofer.exe"
                                    Imagebase:0xa50000
                                    File size:319'488 bytes
                                    MD5 hash:2E87D4E593DA9635C26553F5D5AF389A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000002.00000000.2298492071.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:false

                                    Reset < >
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: acq$ acq$,$xgq
                                      • API String ID: 0-3878074385
                                      • Opcode ID: da2f56d2f9d9ce663895e8d377269c4a088ff8c43acdcd7679c9a225c5db462f
                                      • Instruction ID: 0025e8d1ba502fdf2f12358e2756137edb35171dd73656890008db9331737e4e
                                      • Opcode Fuzzy Hash: da2f56d2f9d9ce663895e8d377269c4a088ff8c43acdcd7679c9a225c5db462f
                                      • Instruction Fuzzy Hash: 8802CF707002059FDB15FF29D458B6E7BE2BF84308F248A29E4059B399DFB5AD46CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: acq$ acq$xgq
                                      • API String ID: 0-3257647305
                                      • Opcode ID: e7beae2ad4ccc0b305e5032c040fdd4fc67fcf682a0487118506016202016bab
                                      • Instruction ID: 5cc8b45885fbd2b46e54f04d4b3a7cff9d6e17f9305848c7155cc2b275a13000
                                      • Opcode Fuzzy Hash: e7beae2ad4ccc0b305e5032c040fdd4fc67fcf682a0487118506016202016bab
                                      • Instruction Fuzzy Hash: 216199B47002049FD715BF29E848B5A7BE2FF84308F648929E5069B395DBB5AD498F80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (gq$Tecq$dp
                                      • API String ID: 0-1580151992
                                      • Opcode ID: d822a02d4d735c5a6ddab09747ff81773540df7a5fd9d07eacef7001075b172d
                                      • Instruction ID: 20140812ccab345466b7bd39ba3336c518bfd087709ca44599c04a38bc0efd5f
                                      • Opcode Fuzzy Hash: d822a02d4d735c5a6ddab09747ff81773540df7a5fd9d07eacef7001075b172d
                                      • Instruction Fuzzy Hash: FF518C30B101049FCB44EF69C458A6EBBF6EF89714F2581A9E806DB3A5CA75ED01CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hgq$dLiq
                                      • API String ID: 0-4280054783
                                      • Opcode ID: b3aff58dd7e31fcaa35cbd33d8a76d256da6ef5396174b652db67f53ff1e1c68
                                      • Instruction ID: fb6649beab04be3821a7e10b7e4cab4c9fe320d59baaa2bda6f6015ffde28558
                                      • Opcode Fuzzy Hash: b3aff58dd7e31fcaa35cbd33d8a76d256da6ef5396174b652db67f53ff1e1c68
                                      • Instruction Fuzzy Hash: 2D41F3317042449FCB15EF79D458AAEBBF6EF89304F1484AAE445DB3A2CB35AD05CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LRcq
                                      • API String ID: 0-4134321033
                                      • Opcode ID: aba32e3b8955651ce203b9226e927806aa4f45baeb05cc6cda82e094b431abfe
                                      • Instruction ID: 9cc817a8c015c8e0a36831ddc7087d71b0dc9a5238549cc6111513ea4a7f8c3d
                                      • Opcode Fuzzy Hash: aba32e3b8955651ce203b9226e927806aa4f45baeb05cc6cda82e094b431abfe
                                      • Instruction Fuzzy Hash: 6831F471F002168FCB04AB79C554A6E7BF2BFC9204B188469E14DDB365DE70DD02C791
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: dLiq
                                      • API String ID: 0-2143115944
                                      • Opcode ID: 180ae0349074474b2cae4accbec005003bd9095f6e15099cadfbca3cc807565c
                                      • Instruction ID: aef751873030731c9272ed566f330120e3ba97b713643d0491ae8c16bb66ced0
                                      • Opcode Fuzzy Hash: 180ae0349074474b2cae4accbec005003bd9095f6e15099cadfbca3cc807565c
                                      • Instruction Fuzzy Hash: 8231A271A042049FDB15DF69C458BAEBBF2FF88304F1485AAE441AB361CB75ED44CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hgq
                                      • API String ID: 0-2103768809
                                      • Opcode ID: 81f086c3052880730525d48175207055d15eabb99d116f83468ec560b376959a
                                      • Instruction ID: 6c49b065c92bf066ab58ac06d0c845ea7a93e21d99c377767b96873c27b555d7
                                      • Opcode Fuzzy Hash: 81f086c3052880730525d48175207055d15eabb99d116f83468ec560b376959a
                                      • Instruction Fuzzy Hash: 73F0CD217082805FC347673D582446E7FA79FCB15479948F6E185CF397DD259D058351
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 47d6d86bcfe5778f6b4f470d34a913de21e5c9ff36e2795f74ba2e67de9a600e
                                      • Instruction ID: df96c542c574f82cb4f930479bb31d2bcf9f1e2e73a93f4b00b28f0b9cfc63e0
                                      • Opcode Fuzzy Hash: 47d6d86bcfe5778f6b4f470d34a913de21e5c9ff36e2795f74ba2e67de9a600e
                                      • Instruction Fuzzy Hash: 1051A878600229AFCB17EB39F44C95A7763FF853057A08A68E841CB25DEB35A945DF80
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c209ffcd3127503670c4e0e35234d2583df509b481fa53ab53f8ae34602de9b8
                                      • Instruction ID: e24a1ea5e94935b82db00e8b6296c6a991f698efc19b8d84fc3def063a683043
                                      • Opcode Fuzzy Hash: c209ffcd3127503670c4e0e35234d2583df509b481fa53ab53f8ae34602de9b8
                                      • Instruction Fuzzy Hash: 3D418FB0E00209AFCB04EFB9C85466EBBFAFF88314F24C569D449D7345DA34A9428B91
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f249cab22fa414e4bf34e67720d823a934692be73313e90c6192d931519a6b3b
                                      • Instruction ID: 82f07e8da5ba2e9e9fa509e40ef2e7c14add44baff9e23d0008645a1888156d2
                                      • Opcode Fuzzy Hash: f249cab22fa414e4bf34e67720d823a934692be73313e90c6192d931519a6b3b
                                      • Instruction Fuzzy Hash: 21215C74B001049FE714EB69C995BAE7BF2BF88724F248065E805AB3A5CBB19D01CF80
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eeeba1a01ea077d668cfe0739215f06bb6290338cc578f6dbd161c1c4502eccb
                                      • Instruction ID: b4067387d3c3bbe0d81ea1c873962602ffb0b92089c40b0352483ab5510577f8
                                      • Opcode Fuzzy Hash: eeeba1a01ea077d668cfe0739215f06bb6290338cc578f6dbd161c1c4502eccb
                                      • Instruction Fuzzy Hash: 1E21A931780246EFDB69BF76E81C6BE3BA4AF85209F40C56DE807C6144EB30DA48CB51
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 15b80c4409fc1cad7604b1931b7a1970851d53a7d15e7cf8fc234ad4789d9154
                                      • Instruction ID: bf63fc6780a872d3e1f0945301fddbe6e171f4f90de2e315b96406694491d53e
                                      • Opcode Fuzzy Hash: 15b80c4409fc1cad7604b1931b7a1970851d53a7d15e7cf8fc234ad4789d9154
                                      • Instruction Fuzzy Hash: 60215E317902179FDF64BB76F51C6BF7AA4AF85609F40952DD807C2148EB30C648CB62
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7c7eafd71f3285bbd20d9bf67331ab38aaf2e293d7c86c6dfdff6179268284fb
                                      • Instruction ID: 3a6627ab4ce3bb1d6454cb277bd0b07cd9ed007bdfed59071f63763ac7dd9840
                                      • Opcode Fuzzy Hash: 7c7eafd71f3285bbd20d9bf67331ab38aaf2e293d7c86c6dfdff6179268284fb
                                      • Instruction Fuzzy Hash: 5211C634A00255DFCB55EB79D4186697BF5EFC920571849BCC445CB325EA31DD42CB80
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 99ac284c23cf5ff35091fe1d9382789ce810ab48e6719041b399ebfd93a04fd8
                                      • Instruction ID: a6838fb6a82029db7d546a6458a2ff06ea863dad32c9c3f7966b54ef104f77c8
                                      • Opcode Fuzzy Hash: 99ac284c23cf5ff35091fe1d9382789ce810ab48e6719041b399ebfd93a04fd8
                                      • Instruction Fuzzy Hash: CB11AD70B00219DFCB54EBBAD508A6A7BE6BFC82057244878D40ADB358EB31DD42CB90
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 73d9b30a00b1a7af0a8df6f54587cb0920c61840f880c8c344dd77cc6be01814
                                      • Instruction ID: 4d8faeed0aa2f80b7b3b484dbca00f7136f207f13469e6714dc8cb55cc5dc68a
                                      • Opcode Fuzzy Hash: 73d9b30a00b1a7af0a8df6f54587cb0920c61840f880c8c344dd77cc6be01814
                                      • Instruction Fuzzy Hash: 0901DF74B012149FCF58FB69D469BBE77F4EF84609F0C806DC80AD7240DB609902CB92
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f944154753c5791d9c86a89cb6eb88915b68a234d337447cecd9a9a9d2c9b87f
                                      • Instruction ID: 06b3f77c5b4a8cf5d321a1b3aa242fd84d847633bb20375803270b81fc9d462b
                                      • Opcode Fuzzy Hash: f944154753c5791d9c86a89cb6eb88915b68a234d337447cecd9a9a9d2c9b87f
                                      • Instruction Fuzzy Hash: 65C08C22194247CFD33033A0F40C3EC3E10AB8130AF808106F843040858E7015088717
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.3541747447.0000000002C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2c80000_CrSpoofer.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dfd2ea1408fff9f4bb601c8776f711cdb9437df744784ab261e7b7f23340c924
                                      • Instruction ID: 269ade28ef92e12d6b45226d579990dbaa462338538398e17eb0628cc6459751
                                      • Opcode Fuzzy Hash: dfd2ea1408fff9f4bb601c8776f711cdb9437df744784ab261e7b7f23340c924
                                      • Instruction Fuzzy Hash: B5C08C2219468BCFD7303360F40C3EC3E10AB8130AF80810AF443040858E701508CB17