Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Money.exe

Overview

General Information

Sample name:Money.exe
Analysis ID:1576461
MD5:fc6a9a66fb9a404078fe5c31d73c3bab
SHA1:2cfb6b088ed8ab7ca66299d094813ce2d04e5677
SHA256:695bc096a65c4bd026b95d5363a4b9c316cec8fec3672808e036081397da6df8
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Money.exe (PID: 5076 cmdline: "C:\Users\user\Desktop\Money.exe" MD5: FC6A9A66FB9A404078FE5C31D73C3BAB)
    • schtasks.exe (PID: 5256 cmdline: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 4208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Client.exe (PID: 2020 cmdline: "C:\Users\user\AppData\Roaming\SubDir\Client.exe" MD5: FC6A9A66FB9A404078FE5C31D73C3BAB)
      • schtasks.exe (PID: 1792 cmdline: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 4208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Client.exe (PID: 644 cmdline: C:\Users\user\AppData\Roaming\SubDir\Client.exe MD5: FC6A9A66FB9A404078FE5C31D73C3BAB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "104.251.123.245:23600;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "4119a2e0-4ae4-4843-8534-99af91a2475d", "StartupKey": "Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
Money.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    Money.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Money.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ef13:$x1: Quasar.Common.Messages
      • 0x29f23c:$x1: Quasar.Common.Messages
      • 0x2ab822:$x4: Uninstalling... good bye :-(
      • 0x2ad017:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      Money.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aadd4:$f1: FileZilla\recentservers.xml
      • 0x2aae14:$f2: FileZilla\sitemanager.xml
      • 0x2aae56:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab0a2:$b1: Chrome\User Data\
      • 0x2ab0f8:$b1: Chrome\User Data\
      • 0x2ab3d0:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4cc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd428:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab624:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6de:$b5: YandexBrowser\User Data\
      • 0x2ab74c:$b5: YandexBrowser\User Data\
      • 0x2ab420:$s4: logins.json
      • 0x2ab156:$a1: username_value
      • 0x2ab174:$a2: password_value
      • 0x2ab460:$a3: encryptedUsername
      • 0x2fd36c:$a3: encryptedUsername
      • 0x2ab484:$a4: encryptedPassword
      • 0x2fd38a:$a4: encryptedPassword
      • 0x2fd308:$a5: httpRealm
      Money.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab90c:$s3: Process already elevated.
      • 0x28ec12:$s4: get_PotentiallyVulnerablePasswords
      • 0x278cce:$s5: GetKeyloggerLogsDirectory
      • 0x29e99b:$s5: GetKeyloggerLogsDirectory
      • 0x28ec35:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea56:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\SubDir\Client.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28ef13:$x1: Quasar.Common.Messages
          • 0x29f23c:$x1: Quasar.Common.Messages
          • 0x2ab822:$x4: Uninstalling... good bye :-(
          • 0x2ad017:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Users\user\AppData\Roaming\SubDir\Client.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aadd4:$f1: FileZilla\recentservers.xml
          • 0x2aae14:$f2: FileZilla\sitemanager.xml
          • 0x2aae56:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab0a2:$b1: Chrome\User Data\
          • 0x2ab0f8:$b1: Chrome\User Data\
          • 0x2ab3d0:$b2: Mozilla\Firefox\Profiles
          • 0x2ab4cc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd428:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab624:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab6de:$b5: YandexBrowser\User Data\
          • 0x2ab74c:$b5: YandexBrowser\User Data\
          • 0x2ab420:$s4: logins.json
          • 0x2ab156:$a1: username_value
          • 0x2ab174:$a2: password_value
          • 0x2ab460:$a3: encryptedUsername
          • 0x2fd36c:$a3: encryptedUsername
          • 0x2ab484:$a4: encryptedPassword
          • 0x2fd38a:$a4: encryptedPassword
          • 0x2fd308:$a5: httpRealm
          C:\Users\user\AppData\Roaming\SubDir\Client.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab90c:$s3: Process already elevated.
          • 0x28ec12:$s4: get_PotentiallyVulnerablePasswords
          • 0x278cce:$s5: GetKeyloggerLogsDirectory
          • 0x29e99b:$s5: GetKeyloggerLogsDirectory
          • 0x28ec35:$s6: set_PotentiallyVulnerablePasswords
          • 0x2fea56:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          0000000A.00000002.3732259265.0000000002DE9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000006.00000000.1275530383.00000000006A0000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              00000006.00000000.1275112665.0000000000382000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
                Process Memory Space: Money.exe PID: 5076JoeSecurity_QuasarYara detected Quasar RATJoe Security
                  Process Memory Space: Client.exe PID: 2020JoeSecurity_QuasarYara detected Quasar RATJoe Security
                    SourceRuleDescriptionAuthorStrings
                    6.0.Money.exe.380000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                      6.0.Money.exe.380000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                        6.0.Money.exe.380000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                        • 0x28ef13:$x1: Quasar.Common.Messages
                        • 0x29f23c:$x1: Quasar.Common.Messages
                        • 0x2ab822:$x4: Uninstalling... good bye :-(
                        • 0x2ad017:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                        6.0.Money.exe.380000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                        • 0x2aadd4:$f1: FileZilla\recentservers.xml
                        • 0x2aae14:$f2: FileZilla\sitemanager.xml
                        • 0x2aae56:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                        • 0x2ab0a2:$b1: Chrome\User Data\
                        • 0x2ab0f8:$b1: Chrome\User Data\
                        • 0x2ab3d0:$b2: Mozilla\Firefox\Profiles
                        • 0x2ab4cc:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2fd428:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                        • 0x2ab624:$b4: Opera Software\Opera Stable\Login Data
                        • 0x2ab6de:$b5: YandexBrowser\User Data\
                        • 0x2ab74c:$b5: YandexBrowser\User Data\
                        • 0x2ab420:$s4: logins.json
                        • 0x2ab156:$a1: username_value
                        • 0x2ab174:$a2: password_value
                        • 0x2ab460:$a3: encryptedUsername
                        • 0x2fd36c:$a3: encryptedUsername
                        • 0x2ab484:$a4: encryptedPassword
                        • 0x2fd38a:$a4: encryptedPassword
                        • 0x2fd308:$a5: httpRealm
                        6.0.Money.exe.380000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                        • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                        • 0x2ab90c:$s3: Process already elevated.
                        • 0x28ec12:$s4: get_PotentiallyVulnerablePasswords
                        • 0x278cce:$s5: GetKeyloggerLogsDirectory
                        • 0x29e99b:$s5: GetKeyloggerLogsDirectory
                        • 0x28ec35:$s6: set_PotentiallyVulnerablePasswords
                        • 0x2fea56:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\Client.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\Client.exe, ParentProcessId: 2020, ParentProcessName: Client.exe, ProcessCommandLine: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 1792, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Money.exe", ParentImage: C:\Users\user\Desktop\Money.exe, ParentProcessId: 5076, ParentProcessName: Money.exe, ProcessCommandLine: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 5256, ProcessName: schtasks.exe
                        No Suricata rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Money.exeAvira: detected
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                        Source: Money.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "104.251.123.245:23600;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "4119a2e0-4ae4-4843-8534-99af91a2475d", "StartupKey": "Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeReversingLabs: Detection: 73%
                        Source: Money.exeReversingLabs: Detection: 73%
                        Source: Yara matchFile source: Money.exe, type: SAMPLE
                        Source: Yara matchFile source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000A.00000002.3732259265.0000000002DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1275530383.00000000006A0000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1275112665.0000000000382000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Money.exe PID: 5076, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2020, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeJoe Sandbox ML: detected
                        Source: Money.exeJoe Sandbox ML: detected
                        Source: Money.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Money.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: 104.251.123.245
                        Source: Yara matchFile source: Money.exe, type: SAMPLE
                        Source: Yara matchFile source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        Source: global trafficTCP traffic: 192.168.2.7:49701 -> 104.251.123.245:23600
                        Source: Joe Sandbox ViewASN Name: 1GSERVERSUS 1GSERVERSUS
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                        Source: Money.exe, 00000006.00000002.1307884891.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000000A.00000002.3732259265.0000000002DE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: Money.exe, Client.exe.6.drString found in binary or memory: https://api.ipify.org/
                        Source: Money.exe, Client.exe.6.drString found in binary or memory: https://ipwho.is/
                        Source: Money.exe, Client.exe.6.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                        Source: Money.exe, Client.exe.6.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                        Source: Money.exe, Client.exe.6.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to behavior

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: Money.exe, type: SAMPLE
                        Source: Yara matchFile source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000A.00000002.3732259265.0000000002DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1275530383.00000000006A0000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1275112665.0000000000382000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Money.exe PID: 5076, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2020, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                        System Summary

                        barindex
                        Source: Money.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: Money.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: Money.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC7B8D4110_2_00007FFAAC7B8D41
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC7B618710_2_00007FFAAC7B6187
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC7B41A410_2_00007FFAAC7B41A4
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC7B624310_2_00007FFAAC7B6243
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC7BAAAD10_2_00007FFAAC7BAAAD
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC7B9AC310_2_00007FFAAC7B9AC3
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC7B54B610_2_00007FFAAC7B54B6
                        Source: Money.exe, 00000006.00000000.1275530383.00000000006A0000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Money.exe
                        Source: Money.exeBinary or memory string: OriginalFilenameClient.exe. vs Money.exe
                        Source: Money.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Money.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: Money.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: Money.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/3@0/1
                        Source: C:\Users\user\Desktop\Money.exeFile created: C:\Users\user\AppData\Roaming\SubDirJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: NULL
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Local\4119a2e0-4ae4-4843-8534-99af91a2475d
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4208:120:WilError_03
                        Source: Money.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: Money.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Users\user\Desktop\Money.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Money.exeReversingLabs: Detection: 73%
                        Source: Money.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                        Source: C:\Users\user\Desktop\Money.exeFile read: C:\Users\user\Desktop\Money.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\Money.exe "C:\Users\user\Desktop\Money.exe"
                        Source: C:\Users\user\Desktop\Money.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\Money.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe C:\Users\user\AppData\Roaming\SubDir\Client.exe
                        Source: C:\Users\user\Desktop\Money.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeSection loaded: msasn1.dllJump to behavior
                        Source: Money.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: Money.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: Money.exeStatic file information: File size 3282432 > 1048576
                        Source: Money.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                        Source: Money.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC54752B push ebx; iretd 10_2_00007FFAAC54756A
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC54D9F2 push eax; iretd 10_2_00007FFAAC54DA11
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC542B83 pushad ; iretd 10_2_00007FFAAC542C3D
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC542BE5 pushad ; iretd 10_2_00007FFAAC542C3D
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC7B54B6 push ecx; retf 10_2_00007FFAAC7B59DC
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeCode function: 10_2_00007FFAAC7B5948 push ecx; retf 10_2_00007FFAAC7B59DC
                        Source: C:\Users\user\Desktop\Money.exeFile created: C:\Users\user\AppData\Roaming\SubDir\Client.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\Money.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Users\user\Desktop\Money.exeFile opened: C:\Users\user\Desktop\Money.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeMemory allocated: BD0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeMemory allocated: 1A9E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1160000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1ADB0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1470000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeMemory allocated: 1B060000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 2814Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeWindow / User API: threadDelayed 7026Jump to behavior
                        Source: C:\Users\user\Desktop\Money.exe TID: 1476Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 1792Thread sleep count: 36 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 1792Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 6508Thread sleep count: 2814 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 6508Thread sleep count: 7026 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe TID: 4208Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\Money.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: Client.exe, 0000000A.00000002.3739591594.000000001B7B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllhi
                        Source: C:\Users\user\Desktop\Money.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeMemory allocated: page read and write | page guardJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\Client.exe "C:\Users\user\AppData\Roaming\SubDir\Client.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeQueries volume information: C:\Users\user\Desktop\Money.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\SubDir\Client.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\Client.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Money.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: Money.exe, type: SAMPLE
                        Source: Yara matchFile source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000A.00000002.3732259265.0000000002DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1275530383.00000000006A0000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1275112665.0000000000382000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Money.exe PID: 5076, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2020, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Money.exe, type: SAMPLE
                        Source: Yara matchFile source: 6.0.Money.exe.380000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000A.00000002.3732259265.0000000002DE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1275530383.00000000006A0000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1275112665.0000000000382000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Money.exe PID: 5076, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Client.exe PID: 2020, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                        Command and Scripting Interpreter
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        1
                        Masquerading
                        11
                        Input Capture
                        11
                        Security Software Discovery
                        Remote Services11
                        Input Capture
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Scheduled Task/Job
                        1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        1
                        Disable or Modify Tools
                        LSASS Memory31
                        Virtualization/Sandbox Evasion
                        Remote Desktop Protocol1
                        Archive Collected Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        31
                        Virtualization/Sandbox Evasion
                        Security Account Manager1
                        Application Window Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                        Process Injection
                        NTDS12
                        System Information Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Hidden Files and Directories
                        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Obfuscated Files or Information
                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1576461 Sample: Money.exe Startdate: 17/12/2024 Architecture: WINDOWS Score: 100 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 6 other signatures 2->38 8 Money.exe 5 2->8         started        12 Client.exe 3 2->12         started        process3 file4 26 C:\Users\user\AppData\Roaming\...\Client.exe, PE32 8->26 dropped 28 C:\Users\user\AppData\Local\...\Money.exe.log, CSV 8->28 dropped 40 Uses schtasks.exe or at.exe to add and modify task schedules 8->40 42 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->42 14 Client.exe 2 8->14         started        18 schtasks.exe 1 8->18         started        signatures5 process6 dnsIp7 30 104.251.123.245, 23600, 49701, 49731 1GSERVERSUS United States 14->30 44 Antivirus detection for dropped file 14->44 46 Multi AV Scanner detection for dropped file 14->46 48 Machine Learning detection for dropped file 14->48 50 2 other signatures 14->50 20 schtasks.exe 1 14->20         started        22 conhost.exe 18->22         started        signatures8 process9 process10 24 conhost.exe 20->24         started       

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Money.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        Money.exe100%AviraHEUR/AGEN.1307453
                        Money.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe100%AviraHEUR/AGEN.1307453
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\SubDir\Client.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        104.251.123.2450%Avira URL Cloudsafe
                        No contacted domains info
                        NameMaliciousAntivirus DetectionReputation
                        104.251.123.245true
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/Money.exe, Client.exe.6.drfalse
                          high
                          https://stackoverflow.com/q/14436606/23354Money.exe, Client.exe.6.drfalse
                            high
                            https://stackoverflow.com/q/2152978/23354sCannotMoney.exe, Client.exe.6.drfalse
                              high
                              https://ipwho.is/Money.exe, Client.exe.6.drfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMoney.exe, 00000006.00000002.1307884891.00000000029E1000.00000004.00000800.00020000.00000000.sdmp, Client.exe, 0000000A.00000002.3732259265.0000000002DE9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/11564914/23354;Money.exe, Client.exe.6.drfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    104.251.123.245
                                    unknownUnited States
                                    143151GSERVERSUStrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1576461
                                    Start date and time:2024-12-17 07:28:10 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 8m 7s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:20
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Money.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@9/3@0/1
                                    EGA Information:
                                    • Successful, ratio: 66.7%
                                    HCA Information:
                                    • Successful, ratio: 99%
                                    • Number of executed functions: 29
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
                                    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target Client.exe, PID 644 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • VT rate limit hit for: Money.exe
                                    TimeTypeDescription
                                    01:29:12API Interceptor10949760x Sleep call for process: Client.exe modified
                                    07:29:11Task SchedulerRun new task: Startup path: C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                    No context
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    1GSERVERSUSjew.sh4.elfGet hashmaliciousUnknownBrowse
                                    • 207.32.216.19
                                    SecuriteInfo.com.Win64.Malware-gen.4046.15809.exeGet hashmaliciousEICARBrowse
                                    • 104.251.123.67
                                    loader.exeGet hashmaliciousXmrigBrowse
                                    • 142.202.242.43
                                    sora.arm.elfGet hashmaliciousMiraiBrowse
                                    • 207.32.216.26
                                    PT54FFSL7ET46RASB.exeGet hashmaliciousLummaC Stealer, PureLog Stealer, Xmrig, zgRATBrowse
                                    • 142.202.242.43
                                    System.exeGet hashmaliciousFlesh Stealer, XmrigBrowse
                                    • 142.202.242.43
                                    2BuZaUic3i.exeGet hashmaliciousRedLineBrowse
                                    • 207.32.219.79
                                    EpCrfIUgyF.exeGet hashmaliciousRedLineBrowse
                                    • 207.32.219.79
                                    04cde81ac938706771fa9fe936ee8f79fe7e079973098.exeGet hashmaliciousRedLine, XmrigBrowse
                                    • 142.202.242.45
                                    Facturation.exeGet hashmaliciousDoeneriumBrowse
                                    • 104.251.123.67
                                    No context
                                    No context
                                    Process:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                    File Type:CSV text
                                    Category:dropped
                                    Size (bytes):1281
                                    Entropy (8bit):5.370111951859942
                                    Encrypted:false
                                    SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                    MD5:12C61586CD59AA6F2A21DF30501F71BD
                                    SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                    SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                    SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                    Process:C:\Users\user\Desktop\Money.exe
                                    File Type:CSV text
                                    Category:dropped
                                    Size (bytes):1281
                                    Entropy (8bit):5.370111951859942
                                    Encrypted:false
                                    SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                    MD5:12C61586CD59AA6F2A21DF30501F71BD
                                    SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                    SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                    SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                    Process:C:\Users\user\Desktop\Money.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):3282432
                                    Entropy (8bit):6.082370246182561
                                    Encrypted:false
                                    SSDEEP:49152:3vFt62XlaSFNWPjljiFa2RoUYIDew65Bxz/oGdVaTHHB72eh2NT:3v362XlaSFNWPjljiFXRoUYIZ6d
                                    MD5:FC6A9A66FB9A404078FE5C31D73C3BAB
                                    SHA1:2CFB6B088ED8AB7CA66299D094813CE2D04E5677
                                    SHA-256:695BC096A65C4BD026B95D5363A4B9C316CEC8FEC3672808E036081397DA6DF8
                                    SHA-512:5EDD45B69CA36E87AE399EB8260EB47411575A7B8296007B948B8A7C4B8200C0BDA115CD223029BF39095D64A5E1C0DBD381D4B6947A67560E0A9142E18A642F
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                    • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                    • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 74%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1..P........1.. ........@.. ........................2...........@...................................1.K.....2.`M...................`2...................................................... ............... ..H............text.....1.. ....1................. ..`.rsrc...`M....2..N....1.............@..@.reloc.......`2.......2.............@..B..................1.....H........................k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):6.082370246182561
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:Money.exe
                                    File size:3'282'432 bytes
                                    MD5:fc6a9a66fb9a404078fe5c31d73c3bab
                                    SHA1:2cfb6b088ed8ab7ca66299d094813ce2d04e5677
                                    SHA256:695bc096a65c4bd026b95d5363a4b9c316cec8fec3672808e036081397da6df8
                                    SHA512:5edd45b69ca36e87ae399eb8260eb47411575a7b8296007b948b8a7c4b8200c0bda115cd223029bf39095d64a5e1c0dbd381d4b6947a67560e0a9142e18a642f
                                    SSDEEP:49152:3vFt62XlaSFNWPjljiFa2RoUYIDew65Bxz/oGdVaTHHB72eh2NT:3v362XlaSFNWPjljiFXRoUYIZ6d
                                    TLSH:BEE56B0437F85E33E56BD2B3D5B05022A3F1E82AF363EB1B519167BE1C53B5488426A7
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1..P........1.. ........@.. ........................2...........@................................
                                    Icon Hash:cdec7d3a36265e07
                                    Entrypoint:0x71e3de
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3900x4b.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000x4d60.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3260000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x31c3e40x31c40047b667c12c6505dab1b9bca6ea63b487unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x3200000x4d600x4e00a5665483d19bae9c34dd90ed4c02985eFalse0.412109375data5.748910698884591IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x3260000xc0x200576e09f300aa2216eb4d32ea1fecea5fFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x3201300x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.4058219178082192
                                    RT_GROUP_ICON0x3243580x14data1.1
                                    RT_VERSION0x32436c0x31cdata0.4484924623115578
                                    RT_MANIFEST0x3246880x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 17, 2024 07:29:12.376014948 CET4970123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:29:12.495948076 CET2360049701104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:29:12.496049881 CET4970123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:29:12.508028984 CET4970123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:29:12.627856970 CET2360049701104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:29:34.409071922 CET2360049701104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:29:34.409245014 CET4970123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:29:34.468571901 CET4970123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:29:34.588387966 CET2360049701104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:29:37.882384062 CET4973123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:29:38.002362013 CET2360049731104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:29:38.002463102 CET4973123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:29:38.008614063 CET4973123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:29:38.128495932 CET2360049731104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:29:59.927983999 CET2360049731104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:29:59.928045034 CET4973123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:29:59.928530931 CET4973123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:00.052154064 CET2360049731104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:03.432708025 CET4973223600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:03.552716017 CET2360049732104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:03.552942038 CET4973223600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:03.553683043 CET4973223600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:03.673472881 CET2360049732104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:25.456664085 CET2360049732104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:25.456749916 CET4973223600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:25.457278967 CET4973223600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:25.577034950 CET2360049732104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:29.057918072 CET4973523600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:29.177643061 CET2360049735104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:29.177767038 CET4973523600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:29.178270102 CET4973523600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:29.298023939 CET2360049735104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:51.082215071 CET2360049735104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:51.082338095 CET4973523600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:51.084316015 CET4973523600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:51.204030991 CET2360049735104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:54.370539904 CET4973623600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:54.490539074 CET2360049736104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:30:54.490633965 CET4973623600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:54.491364002 CET4973623600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:30:54.612370014 CET2360049736104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:31:16.379842043 CET2360049736104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:31:16.379910946 CET4973623600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:16.380480051 CET4973623600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:16.500260115 CET2360049736104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:31:20.342763901 CET4973723600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:20.462555885 CET2360049737104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:31:20.462668896 CET4973723600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:20.464245081 CET4973723600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:20.584028006 CET2360049737104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:31:42.349391937 CET2360049737104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:31:42.349826097 CET4973723600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:42.352122068 CET4973723600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:42.472227097 CET2360049737104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:31:45.620939970 CET4973823600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:45.740900040 CET2360049738104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:31:45.741027117 CET4973823600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:45.741652012 CET4973823600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:31:45.861478090 CET2360049738104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:07.677687883 CET2360049738104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:07.677762985 CET4973823600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:07.678494930 CET4973823600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:07.798579931 CET2360049738104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:11.308506012 CET4973923600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:11.428498983 CET2360049739104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:11.428587914 CET4973923600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:11.429117918 CET4973923600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:11.548887968 CET2360049739104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:33.353574038 CET2360049739104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:33.353862047 CET4973923600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:33.354415894 CET4973923600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:33.476000071 CET2360049739104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:36.841615915 CET4974023600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:36.961474895 CET2360049740104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:36.961585999 CET4974023600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:36.962021112 CET4974023600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:37.081830978 CET2360049740104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:58.866055012 CET2360049740104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:32:58.866249084 CET4974023600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:58.866605997 CET4974023600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:32:58.986654043 CET2360049740104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:33:02.403413057 CET4974123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:33:02.523370981 CET2360049741104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:33:02.524353981 CET4974123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:33:02.530112982 CET4974123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:33:02.649797916 CET2360049741104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:33:24.461004019 CET2360049741104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:33:24.462412119 CET4974123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:33:24.466176033 CET4974123600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:33:24.586208105 CET2360049741104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:33:28.027369022 CET4974223600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:33:28.147569895 CET2360049742104.251.123.245192.168.2.7
                                    Dec 17, 2024 07:33:28.147701025 CET4974223600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:33:28.148139000 CET4974223600192.168.2.7104.251.123.245
                                    Dec 17, 2024 07:33:28.268121004 CET2360049742104.251.123.245192.168.2.7

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:6
                                    Start time:01:29:06
                                    Start date:17/12/2024
                                    Path:C:\Users\user\Desktop\Money.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\Money.exe"
                                    Imagebase:0x380000
                                    File size:3'282'432 bytes
                                    MD5 hash:FC6A9A66FB9A404078FE5C31D73C3BAB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000000.1275530383.00000000006A0000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000006.00000000.1275112665.0000000000382000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:8
                                    Start time:01:29:09
                                    Start date:17/12/2024
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:"schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                    Imagebase:0x7ff694490000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:9
                                    Start time:01:29:09
                                    Start date:17/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff75da10000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:10
                                    Start time:01:29:09
                                    Start date:17/12/2024
                                    Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\AppData\Roaming\SubDir\Client.exe"
                                    Imagebase:0x800000
                                    File size:3'282'432 bytes
                                    MD5 hash:FC6A9A66FB9A404078FE5C31D73C3BAB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000A.00000002.3732259265.0000000002DE9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Joe Security
                                    • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: Florian Roth
                                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekSHen
                                    • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Users\user\AppData\Roaming\SubDir\Client.exe, Author: ditekshen
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 74%, ReversingLabs
                                    Reputation:low
                                    Has exited:false

                                    Target ID:12
                                    Start time:01:29:10
                                    Start date:17/12/2024
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:"schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                    Imagebase:0x7ff694490000
                                    File size:235'008 bytes
                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:13
                                    Start time:01:29:10
                                    Start date:17/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff75da10000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:14
                                    Start time:01:29:12
                                    Start date:17/12/2024
                                    Path:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                    Imagebase:0xb20000
                                    File size:3'282'432 bytes
                                    MD5 hash:FC6A9A66FB9A404078FE5C31D73C3BAB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:14.7%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:13
                                      Total number of Limit Nodes:0
                                      execution_graph 1806 7ffaac573811 1807 7ffaac57382f 1806->1807 1808 7ffaac5738c4 1807->1808 1811 7ffaac573540 1808->1811 1810 7ffaac5738d1 1812 7ffaac573551 DeleteFileW 1811->1812 1814 7ffaac573616 1812->1814 1814->1810 1802 7ffaac573569 1803 7ffaac573571 DeleteFileW 1802->1803 1805 7ffaac573616 1803->1805 1815 7ffaac573525 1816 7ffaac573531 DeleteFileW 1815->1816 1818 7ffaac573616 1816->1818

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1313621588.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffaac570000_Money.jbxd
                                      Similarity
                                      • API ID: DeleteFile
                                      • String ID:
                                      • API String ID: 4033686569-0
                                      • Opcode ID: 4bdeaec37a1650b8796656c5440e61c1ebc8102f36ed38ab8372c663d66bfab5
                                      • Instruction ID: 1feae8d4792a9be03afd83f9fa4b349c62953df8f89acb4edb5594b4d3d4ffa8
                                      • Opcode Fuzzy Hash: 4bdeaec37a1650b8796656c5440e61c1ebc8102f36ed38ab8372c663d66bfab5
                                      • Instruction Fuzzy Hash: 3C41157180DB988FDB19DB6CC8596F97FF0FF66320F04826FD049D7692CA24A8498791

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 40 7ffaac573569-7ffaac5735d8 45 7ffaac5735da-7ffaac5735df 40->45 46 7ffaac5735e2-7ffaac573614 DeleteFileW 40->46 45->46 47 7ffaac57361c-7ffaac57364a 46->47 48 7ffaac573616 46->48 48->47
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1313621588.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffaac570000_Money.jbxd
                                      Similarity
                                      • API ID: DeleteFile
                                      • String ID:
                                      • API String ID: 4033686569-0
                                      • Opcode ID: 47311f08f1ab9705b195a51e808c65a851233fc9723806861ad63139de31db77
                                      • Instruction ID: 7184092e54945977e7b0d88647d416304e73a53410a9560b0d6d23c0d568d533
                                      • Opcode Fuzzy Hash: 47311f08f1ab9705b195a51e808c65a851233fc9723806861ad63139de31db77
                                      • Instruction Fuzzy Hash: 0831C57190CA5C8FDB19DB58C4496F9BBF0FF65320F04826BD049D3152CB74A8458B91

                                      Execution Graph

                                      Execution Coverage:11.3%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:6
                                      Total number of Limit Nodes:0
                                      execution_graph 11519 7ffaac7be373 11520 7ffaac7be384 SetWindowsHookExW 11519->11520 11521 7ffaac7be3c6 11520->11521 11522 7ffaac543569 11523 7ffaac543571 DeleteFileW 11522->11523 11525 7ffaac543616 11523->11525

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 7ffaac7b6243-7ffaac7b626f 2 7ffaac7b6275-7ffaac7b6278 0->2 3 7ffaac7b670e-7ffaac7b672b 0->3 4 7ffaac7b62a5-7ffaac7b62c3 2->4 5 7ffaac7b627a-7ffaac7b629f 2->5 6 7ffaac7b61e5-7ffaac7b621f 3->6 7 7ffaac7b6731-7ffaac7b6734 3->7 14 7ffaac7b62c9-7ffaac7b62cb 4->14 15 7ffaac7b648a-7ffaac7b649c 4->15 5->3 5->4 6->3 28 7ffaac7b6225-7ffaac7b623f 6->28 8 7ffaac7b6756-7ffaac7b6777 7->8 9 7ffaac7b6736-7ffaac7b673a 7->9 18 7ffaac7b6779-7ffaac7b678f 8->18 19 7ffaac7b6796-7ffaac7b679b 8->19 9->8 12 7ffaac7b673c-7ffaac7b6751 call 7ffaac7b51d0 9->12 12->8 14->3 21 7ffaac7b62d1-7ffaac7b62f1 14->21 24 7ffaac7b6475-7ffaac7b6485 15->24 25 7ffaac7b649e-7ffaac7b64a3 15->25 18->19 26 7ffaac7b67dd-7ffaac7b67e4 19->26 27 7ffaac7b679d-7ffaac7b67bb 19->27 36 7ffaac7b63d7-7ffaac7b63e9 21->36 37 7ffaac7b62f7-7ffaac7b6346 21->37 24->3 31 7ffaac7b64a9-7ffaac7b64f0 25->31 32 7ffaac7b657f-7ffaac7b6591 25->32 29 7ffaac7b6812-7ffaac7b6817 26->29 30 7ffaac7b67e6-7ffaac7b67ff 26->30 27->26 35 7ffaac7b67bd-7ffaac7b67c9 27->35 28->3 40 7ffaac7b68ec-7ffaac7b68fd 29->40 41 7ffaac7b681d-7ffaac7b6825 29->41 52 7ffaac7b680a-7ffaac7b6810 30->52 53 7ffaac7b6801-7ffaac7b6802 30->53 58 7ffaac7b64f2-7ffaac7b6505 31->58 59 7ffaac7b650b-7ffaac7b6566 31->59 32->3 49 7ffaac7b6569-7ffaac7b657a 32->49 44 7ffaac7b67d5-7ffaac7b67db 35->44 45 7ffaac7b67cb-7ffaac7b67d3 35->45 51 7ffaac7b63ef-7ffaac7b6474 36->51 37->36 67 7ffaac7b634c-7ffaac7b6387 37->67 47 7ffaac7b6977-7ffaac7b69ae 41->47 48 7ffaac7b682b-7ffaac7b683b 41->48 44->26 44->35 45->44 68 7ffaac7b696b-7ffaac7b6971 47->68 69 7ffaac7b69b0-7ffaac7b6a0d 47->69 63 7ffaac7b683d-7ffaac7b6841 48->63 64 7ffaac7b684b-7ffaac7b6853 48->64 49->3 51->24 52->29 52->30 53->52 58->3 58->59 59->49 63->47 65 7ffaac7b6847-7ffaac7b6848 63->65 64->47 66 7ffaac7b6859-7ffaac7b6869 64->66 65->64 75 7ffaac7b6879-7ffaac7b6881 66->75 76 7ffaac7b686b-7ffaac7b686f 66->76 81 7ffaac7b63b4-7ffaac7b63c5 67->81 82 7ffaac7b6389-7ffaac7b63b2 67->82 68->47 96 7ffaac7b6a18-7ffaac7b6a29 69->96 97 7ffaac7b6a0f-7ffaac7b6a17 69->97 75->47 80 7ffaac7b6887-7ffaac7b6897 75->80 76->47 79 7ffaac7b6875-7ffaac7b6876 76->79 79->75 88 7ffaac7b6899-7ffaac7b689d 80->88 89 7ffaac7b68a7-7ffaac7b68af 80->89 81->67 84 7ffaac7b63c7 81->84 82->81 94 7ffaac7b63c9-7ffaac7b63d1 82->94 84->36 88->47 90 7ffaac7b68a3-7ffaac7b68a4 88->90 89->47 92 7ffaac7b68b5-7ffaac7b68c5 89->92 90->89 98 7ffaac7b68d5-7ffaac7b68e5 92->98 99 7ffaac7b68c7-7ffaac7b68cb 92->99 94->36 100 7ffaac7b6a34-7ffaac7b6a46 96->100 101 7ffaac7b6a2b-7ffaac7b6a33 96->101 97->96 98->40 99->47 102 7ffaac7b68d1-7ffaac7b68d2 99->102 103 7ffaac7b6a48-7ffaac7b6a4a 100->103 104 7ffaac7b6a4c-7ffaac7b6a56 100->104 101->100 102->98 105 7ffaac7b6a5a-7ffaac7b6a9b 103->105 104->105 110 7ffaac7b6ab6-7ffaac7b6ac7 105->110 111 7ffaac7b6a9d-7ffaac7b6ab3 105->111 112 7ffaac7b6ac9-7ffaac7b6ae8 110->112 113 7ffaac7b6afd-7ffaac7b6b03 110->113 111->110 112->113 115 7ffaac7b6aea-7ffaac7b6afb 112->115 115->113 116 7ffaac7b6b04-7ffaac7b6b5b 115->116 116->113
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3744014668.00007FFAAC7B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac7b0000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0#%$0X%
                                      • API String ID: 0-758952704
                                      • Opcode ID: 094922e3dbce093ffd9173786fe79a3e77ba1a2fa0773a4a4aedce312211d59f
                                      • Instruction ID: 19a9de80591cd3d8375e16aa5f3dd69f3d7927d0e4089467f65118460e16250f
                                      • Opcode Fuzzy Hash: 094922e3dbce093ffd9173786fe79a3e77ba1a2fa0773a4a4aedce312211d59f
                                      • Instruction Fuzzy Hash: 4D025074A18A198FEB98EF18C445BA977F1FF99300F1485B9D54ED3292DE34E8858B80

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 223 7ffaac7baaad-7ffaac7bab49 225 7ffaac7bb1c1-7ffaac7bb1d6 223->225 226 7ffaac7bab4f-7ffaac7bab52 223->226 226->225 227 7ffaac7bab58-7ffaac7bab75 226->227 227->225 229 7ffaac7bab7b-7ffaac7bab9a 227->229 231 7ffaac7baba6-7ffaac7babb9 229->231 232 7ffaac7bab9c-7ffaac7bab9f 229->232 235 7ffaac7bac49-7ffaac7bac5b 231->235 233 7ffaac7baba1 232->233 234 7ffaac7babbe-7ffaac7babee 232->234 233->225 234->225 240 7ffaac7babf4-7ffaac7bac42 234->240 235->225 238 7ffaac7bac61-7ffaac7baca0 235->238 238->225 245 7ffaac7baca6-7ffaac7bacb0 238->245 240->235 249 7ffaac7bacb2-7ffaac7bacc6 245->249 250 7ffaac7bacc8-7ffaac7bacd8 245->250 252 7ffaac7bace2-7ffaac7bad37 249->252 250->252 256 7ffaac7bad3d-7ffaac7bad45 252->256 257 7ffaac7bad47-7ffaac7bad5b 256->257 258 7ffaac7badab-7ffaac7badb3 256->258 257->258 262 7ffaac7bad5d-7ffaac7bada7 257->262 258->225 259 7ffaac7badb9-7ffaac7baddb 258->259 263 7ffaac7bade1-7ffaac7bae0a 259->263 264 7ffaac7baedf-7ffaac7baf15 259->264 262->258 270 7ffaac7bae91-7ffaac7baeb2 263->270 271 7ffaac7bae10-7ffaac7bae36 263->271 264->225 276 7ffaac7baf1b-7ffaac7baf2d 264->276 270->263 272 7ffaac7baeb8 270->272 271->270 279 7ffaac7bae38-7ffaac7bae4e 271->279 272->264 276->225 281 7ffaac7baf33-7ffaac7baf51 276->281 279->270 283 7ffaac7bae50-7ffaac7bae68 279->283 281->225 287 7ffaac7baf57-7ffaac7baf85 281->287 283->270 288 7ffaac7bae6a-7ffaac7bae8f 283->288 295 7ffaac7bafa8-7ffaac7bafb5 287->295 296 7ffaac7baf87-7ffaac7bafa1 287->296 288->270 291 7ffaac7baeba-7ffaac7baed8 288->291 291->264 299 7ffaac7bafbb-7ffaac7bafe8 295->299 300 7ffaac7bb07a-7ffaac7bb09a 295->300 296->295 309 7ffaac7bb00b-7ffaac7bb017 299->309 310 7ffaac7bafea-7ffaac7bb004 299->310 303 7ffaac7bb0a4-7ffaac7bb0e0 300->303 304 7ffaac7bb09c-7ffaac7bb09d 300->304 303->225 314 7ffaac7bb0e6-7ffaac7bb103 303->314 304->303 315 7ffaac7bb019-7ffaac7bb025 309->315 316 7ffaac7bb068-7ffaac7bb074 309->316 310->309 323 7ffaac7bb105-7ffaac7bb106 314->323 324 7ffaac7bb10d-7ffaac7bb148 314->324 317 7ffaac7bb02b-7ffaac7bb061 315->317 318 7ffaac7bb310-7ffaac7bb327 315->318 316->225 316->300 317->316 325 7ffaac7bb329-7ffaac7bb330 318->325 326 7ffaac7bb331-7ffaac7bb39f call 7ffaac7b4f50 call 7ffaac7b7840 call 7ffaac7b5250 call 7ffaac7bb3a0 318->326 323->324 324->225 338 7ffaac7bb14a-7ffaac7bb15c 324->338 325->326 338->225 342 7ffaac7bb15e-7ffaac7bb17c 338->342 342->225 345 7ffaac7bb17e-7ffaac7bb19a 342->345 348 7ffaac7bb1d7-7ffaac7bb24c 345->348 349 7ffaac7bb19c-7ffaac7bb1bf 345->349 359 7ffaac7bb252-7ffaac7bb25e 348->359 360 7ffaac7bb2f7-7ffaac7bb30f 348->360 349->225 349->348 362 7ffaac7bb292-7ffaac7bb2f0 359->362 363 7ffaac7bb260-7ffaac7bb27a 359->363 362->360 363->360 366 7ffaac7bb27c-7ffaac7bb28f 363->366 366->362
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3744014668.00007FFAAC7B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac7b0000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: x2_H
                                      • API String ID: 0-3976523432
                                      • Opcode ID: cbad732323abb03e6ffdafec573e29efcb2f032c9ddabfb4ce841fb2303b0900
                                      • Instruction ID: fac111ff71f38f20c9472cb2f6adaaadd2a898d5b469217b741629ab555f9d01
                                      • Opcode Fuzzy Hash: cbad732323abb03e6ffdafec573e29efcb2f032c9ddabfb4ce841fb2303b0900
                                      • Instruction Fuzzy Hash: BF524E30708A498FEB98EB2CC459B6977E1FF99301F1485B9E44EC72A2DE34EC458B41

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 372 7ffaac7b41a4-7ffaac7b41a8 373 7ffaac7b41c9-7ffaac7b41eb 372->373 374 7ffaac7b41aa-7ffaac7b41b6 372->374 380 7ffaac7b4243-7ffaac7b424a 373->380 377 7ffaac7b41b7-7ffaac7b41be 374->377 381 7ffaac7b415c-7ffaac7b417c 380->381 382 7ffaac7b4250-7ffaac7b4259 380->382 386 7ffaac7b41ed-7ffaac7b4201 381->386 387 7ffaac7b417e-7ffaac7b418e 381->387 384 7ffaac7b45ab-7ffaac7b45bd 382->384 385 7ffaac7b425f-7ffaac7b4279 382->385 389 7ffaac7b4298-7ffaac7b42a8 385->389 390 7ffaac7b427b-7ffaac7b428c 385->390 386->382 394 7ffaac7b4203-7ffaac7b4205 386->394 387->384 397 7ffaac7b4194-7ffaac7b4196 387->397 393 7ffaac7b428d-7ffaac7b4292 389->393 396 7ffaac7b42aa-7ffaac7b42dc 389->396 390->393 393->389 394->380 398 7ffaac7b4207-7ffaac7b4209 394->398 406 7ffaac7b45a5-7ffaac7b45a9 396->406 407 7ffaac7b42e2-7ffaac7b42fd 396->407 397->373 400 7ffaac7b4198-7ffaac7b41a0 397->400 401 7ffaac7b420b-7ffaac7b421b 398->401 402 7ffaac7b4221-7ffaac7b423f 398->402 400->372 401->384 401->402 402->380 406->384 409 7ffaac7b45dc-7ffaac7b45ef 406->409 411 7ffaac7b4303-7ffaac7b4308 407->411 412 7ffaac7b4596-7ffaac7b459f 407->412 413 7ffaac7b431d-7ffaac7b4322 411->413 414 7ffaac7b430a-7ffaac7b431b 411->414 412->406 412->407 415 7ffaac7b4538-7ffaac7b453d 413->415 416 7ffaac7b4328-7ffaac7b432f 413->416 414->413 414->414 417 7ffaac7b457e-7ffaac7b4594 415->417 418 7ffaac7b453f-7ffaac7b4549 415->418 419 7ffaac7b4335-7ffaac7b433f 416->419 420 7ffaac7b4440-7ffaac7b4448 416->420 417->412 418->412 423 7ffaac7b454b-7ffaac7b4557 418->423 424 7ffaac7b4434-7ffaac7b443e 419->424 425 7ffaac7b4345-7ffaac7b4393 419->425 421 7ffaac7b45cd-7ffaac7b45d7 420->421 422 7ffaac7b444e-7ffaac7b449c 420->422 426 7ffaac7b451a-7ffaac7b4532 421->426 442 7ffaac7b4504-7ffaac7b4514 422->442 443 7ffaac7b449e-7ffaac7b44df 422->443 428 7ffaac7b455d-7ffaac7b457c 423->428 429 7ffaac7b462b-7ffaac7b4637 423->429 427 7ffaac7b43fe-7ffaac7b4411 424->427 440 7ffaac7b4395-7ffaac7b43d6 425->440 441 7ffaac7b43f0-7ffaac7b43fc 425->441 426->415 426->420 431 7ffaac7b4413 427->431 432 7ffaac7b4418-7ffaac7b4420 427->432 428->417 428->418 431->415 432->419 440->441 453 7ffaac7b43d8-7ffaac7b43ec 440->453 441->427 445 7ffaac7b4425-7ffaac7b442f 441->445 442->426 444 7ffaac7b45be-7ffaac7b45c8 442->444 443->442 452 7ffaac7b44e1-7ffaac7b44e8 443->452 444->422 445->425 452->429 454 7ffaac7b44ee-7ffaac7b4500 452->454 453->441 454->442
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3744014668.00007FFAAC7B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac7b0000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0X%
                                      • API String ID: 0-3152437580
                                      • Opcode ID: 380abafc2e440026346ef6ff44be57563d49871d8a7b9d915b18d3bcc66d304d
                                      • Instruction ID: 7dc1e5075475f171578b998169d42aac85fd18a15cf7bbbc273f84669d8b2e50
                                      • Opcode Fuzzy Hash: 380abafc2e440026346ef6ff44be57563d49871d8a7b9d915b18d3bcc66d304d
                                      • Instruction Fuzzy Hash: C0F18D30A1DA458FE758EB6CD44156AB7E1EF95340F10857DE48FC3296DE35EC428B82
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3744014668.00007FFAAC7B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac7b0000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9098a823ad1fbaccd777135c3a637131ac82fd55411602ada646e1b6b751a84b
                                      • Instruction ID: 2502bea7f9cedbe6fb7751ebff76f542b0c34503e4ae0c7b3fc2cd14ce573f70
                                      • Opcode Fuzzy Hash: 9098a823ad1fbaccd777135c3a637131ac82fd55411602ada646e1b6b751a84b
                                      • Instruction Fuzzy Hash: 92B28F70A19A498FEF98EF18C494BA977F2FF59300F1481A9D44ED7292CE35E845CB80
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3744014668.00007FFAAC7B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac7b0000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8bcd09bd401437ae00a7d2a39f6432581e031ef2dfd3d2f1b624e741db93403b
                                      • Instruction ID: a2ad7ac33c47696378db0f0f397fafa2ea27b8dccd7981f73be04160cc952e82
                                      • Opcode Fuzzy Hash: 8bcd09bd401437ae00a7d2a39f6432581e031ef2dfd3d2f1b624e741db93403b
                                      • Instruction Fuzzy Hash: 9252F53161DA098FEB98EB2CD455AB577E1FF99310B0481B9E44FC7293DE28EC468781
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3744014668.00007FFAAC7B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac7b0000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 84850e8e27364826c3f146303361ead632a59f0a5d45613c9dae204ee3cb7c3b
                                      • Instruction ID: efb99b8453b3626e55424c1116098b3c1ee246328282519f6def231df55eeb54
                                      • Opcode Fuzzy Hash: 84850e8e27364826c3f146303361ead632a59f0a5d45613c9dae204ee3cb7c3b
                                      • Instruction Fuzzy Hash: 7E325F31A19A198FEB98DB28C4957B977F2FF99300F548179D44EC3293DE38E8468781
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3744014668.00007FFAAC7B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac7b0000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eedee6028ab33e227496e2af96a05dda031ae7f6ee03e49dae91daff701d7927
                                      • Instruction ID: f864db216f008265b623b0bf31ad8b92805cdb82d3697eacdf29ef8a656a846f
                                      • Opcode Fuzzy Hash: eedee6028ab33e227496e2af96a05dda031ae7f6ee03e49dae91daff701d7927
                                      • Instruction Fuzzy Hash: E9E1D035A19A4A8FEB98EB28C841AB577F1FF46310F1485B9D54EC7293DE34F8458B80

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 627 7ffaac543525-7ffaac54352f 628 7ffaac543571-7ffaac5435d8 627->628 629 7ffaac543531-7ffaac543562 627->629 636 7ffaac5435da-7ffaac5435df 628->636 637 7ffaac5435e2-7ffaac543614 DeleteFileW 628->637 629->628 636->637 638 7ffaac54361c-7ffaac54364a 637->638 639 7ffaac543616 637->639 639->638
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3741298756.00007FFAAC540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC540000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac540000_Client.jbxd
                                      Similarity
                                      • API ID: DeleteFile
                                      • String ID:
                                      • API String ID: 4033686569-0
                                      • Opcode ID: 861b3dcc2005bd101f8b4d050e9e8766cd9e7fdca8c6495fe28883cd81687979
                                      • Instruction ID: 847b8a7b978a49f91a8efe7312b5abf96a5b897c12f397ce04a1b3f31c87106e
                                      • Opcode Fuzzy Hash: 861b3dcc2005bd101f8b4d050e9e8766cd9e7fdca8c6495fe28883cd81687979
                                      • Instruction Fuzzy Hash: 8241E27180DB898FDB59DB6CC8596F9BFF1FF56310F0482AFD049C75A2CA24A8098791

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 751 7ffaac543569-7ffaac5435d8 756 7ffaac5435da-7ffaac5435df 751->756 757 7ffaac5435e2-7ffaac543614 DeleteFileW 751->757 756->757 758 7ffaac54361c-7ffaac54364a 757->758 759 7ffaac543616 757->759 759->758
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3741298756.00007FFAAC540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC540000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac540000_Client.jbxd
                                      Similarity
                                      • API ID: DeleteFile
                                      • String ID:
                                      • API String ID: 4033686569-0
                                      • Opcode ID: cd4a902460056d7761d843508b8c42c5b101d550e4de3e5ca96f495648d56daa
                                      • Instruction ID: a7329bdcf0f4cf7ee6cd3735cc7aebb8ca9bbfcaa4b2c2fe020fa73ff44ae567
                                      • Opcode Fuzzy Hash: cd4a902460056d7761d843508b8c42c5b101d550e4de3e5ca96f495648d56daa
                                      • Instruction Fuzzy Hash: 1231C37190DA5C8FDB19DB68C8456F9BBF0FF66310F04826BD049D3262CB74A8058B91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 842 7ffaac7be373-7ffaac7be3c4 SetWindowsHookExW 844 7ffaac7be3c6 842->844 845 7ffaac7be3cc-7ffaac7be405 842->845 844->845
                                      APIs
                                      Memory Dump Source
                                      • Source File: 0000000A.00000002.3744014668.00007FFAAC7B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC7B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_10_2_7ffaac7b0000_Client.jbxd
                                      Similarity
                                      • API ID: HookWindows
                                      • String ID:
                                      • API String ID: 2559412058-0
                                      • Opcode ID: 823216b66c6237f3d3b630f0dee37bf06ae475cee822170f44595947193f760b
                                      • Instruction ID: 7d48cfd1d76fe783a6287f81ba51a5caa029180d15357a0ffe216feb1b9a9ea5
                                      • Opcode Fuzzy Hash: 823216b66c6237f3d3b630f0dee37bf06ae475cee822170f44595947193f760b
                                      • Instruction Fuzzy Hash: 3411667161CA098FDB18EF5CE4466ACB7E1EB59711F14827EE00D83282CB34B8568BC5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (L!$0W%
                                      • API String ID: 0-3439100496
                                      • Opcode ID: e1d0f27a5a8fa894981ac487c9a108ec759b24622f7d6faa5c1bd350e5b24750
                                      • Instruction ID: c557b2135d0a6e8b1f44bd4b538dac84e6ea26b4b229e443d0e498ffb47bb5ce
                                      • Opcode Fuzzy Hash: e1d0f27a5a8fa894981ac487c9a108ec759b24622f7d6faa5c1bd350e5b24750
                                      • Instruction Fuzzy Hash: C9412662A1DB468FF758A728D8167B97BD4EF95310F00457EF04EC3682DD2CA84683C6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0D%
                                      • API String ID: 0-2933537624
                                      • Opcode ID: e23cc2d3d6a5c55b78fabc131296bde3c74ba58e4189afa34005a42352fc041e
                                      • Instruction ID: 1d5868253b135e5b9dbaa30295ab4ff4aabb6dc6982bcb0881027dd74e9f6640
                                      • Opcode Fuzzy Hash: e23cc2d3d6a5c55b78fabc131296bde3c74ba58e4189afa34005a42352fc041e
                                      • Instruction Fuzzy Hash: 7EA14871A1D99B8FFB85EB2888516B937D2FF96300F0445B5E00EC7597DD28E88A83C1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ;L_I
                                      • API String ID: 0-1305308343
                                      • Opcode ID: dc215fefb2cd68324ab17a6a49bd5b220ddd732e64701387ab730b22c081268d
                                      • Instruction ID: 1b629744c7e0ae51fd23ef37c90a385743de3791a992e1ed4c867a1625ebb83c
                                      • Opcode Fuzzy Hash: dc215fefb2cd68324ab17a6a49bd5b220ddd732e64701387ab730b22c081268d
                                      • Instruction Fuzzy Hash: 0F9158A190E6C68BF745D36C94515F5BFE0FF82204B9480BAF08D872AFDD299C4983D2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: H
                                      • API String ID: 0-2852464175
                                      • Opcode ID: dac6f0415fae885f207f6375832166feb431377186d9a3c74a4e9a59c9170eed
                                      • Instruction ID: b8e7456a66ac8c337310fea3dccc640f670eb699b0649c8175f4b672b2270818
                                      • Opcode Fuzzy Hash: dac6f0415fae885f207f6375832166feb431377186d9a3c74a4e9a59c9170eed
                                      • Instruction Fuzzy Hash: C1718961A1891ECFEB98EB6CC4557BDB7E2FF89310F444578E40ED3686DE289C458780
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: `m%
                                      • API String ID: 0-1380665749
                                      • Opcode ID: 6ad03dad03fecfd2db51420ae3550aa0a400745a000b0f6d527ce1faca5d6f15
                                      • Instruction ID: 6fe4f4c11128bd2d9c747808208951cd3026f368b8b57e44b2509d4a30e3a0b2
                                      • Opcode Fuzzy Hash: 6ad03dad03fecfd2db51420ae3550aa0a400745a000b0f6d527ce1faca5d6f15
                                      • Instruction Fuzzy Hash: 4021EAD281DBC68FF359A77448256A56BD0FF96350F4849FAE08EC71D7DC18984883D1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .L_^
                                      • API String ID: 0-2849591005
                                      • Opcode ID: 91ce39739ecc06ad58bbe66fc660a20245ced38c05e21eed6c7fdf80c42bd257
                                      • Instruction ID: 3f7776df1c1e9a48067bae4827c6c64c9b730088378ecb90801c41558adba8c8
                                      • Opcode Fuzzy Hash: 91ce39739ecc06ad58bbe66fc660a20245ced38c05e21eed6c7fdf80c42bd257
                                      • Instruction Fuzzy Hash: 82112722B0DA6A4FE745AB2D9C651F53BE0EF9723170C41B7E04CC7153DC08990A4391
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8e%
                                      • API String ID: 0-1390493536
                                      • Opcode ID: 117e9c1d0f6343e8d303d1ff1ef51d82c9cf225d4f1c6a44d2e3016467056d05
                                      • Instruction ID: a2d554184b65e7443db1882a90bf7ac8649d1af6975f2949118bef355b0cdbd5
                                      • Opcode Fuzzy Hash: 117e9c1d0f6343e8d303d1ff1ef51d82c9cf225d4f1c6a44d2e3016467056d05
                                      • Instruction Fuzzy Hash: 51117A22A5EA820FF345A73C98498F17BD5EB9123070886BBF44DC31A3CD0CD58A8381
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 65896fe43454a0a15597f3919858a975fc08f9907836f34dd84597a037063816
                                      • Instruction ID: a42837f45f98ed71cf086c964319fcfd156e2ce3c32bc9258b06b688528038c2
                                      • Opcode Fuzzy Hash: 65896fe43454a0a15597f3919858a975fc08f9907836f34dd84597a037063816
                                      • Instruction Fuzzy Hash: 2051F991F4D99B4FFB81F33845616EA2AD2EF8624078084B9E00DCB5DBDD1CDC4A8381
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f647fe3b0d281d1e1678922e87a354d775e83ee8cda03af2e20f99ba8b42c983
                                      • Instruction ID: 8e69dae4a2c9c7e35889e0a0284dae095ee3c26516bce63fbe6e814354fe7100
                                      • Opcode Fuzzy Hash: f647fe3b0d281d1e1678922e87a354d775e83ee8cda03af2e20f99ba8b42c983
                                      • Instruction Fuzzy Hash: D441176294D69B8FFB91E7288861AF93BD5EF96310F0444B6F04DC71C3DD18E8498782
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3a9e3d8b04a6a48775919087971e4ffaea4faffd7b6904f9a708a9ca9963b6dd
                                      • Instruction ID: bdb04234a5b5ac170c0269b4f469e30492acf4baf6cc5ae0320e10b9f96d32fe
                                      • Opcode Fuzzy Hash: 3a9e3d8b04a6a48775919087971e4ffaea4faffd7b6904f9a708a9ca9963b6dd
                                      • Instruction Fuzzy Hash: 6221283194A6568FEB45DB68C0C54A67B91EF56310B1486F9E04CCF197E928ECCAC3C0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 09df0912e1c687be10b6047ed76dc82ade3f578ecebcd4fee6913a0d8a378760
                                      • Instruction ID: f1a1acf2267cb632f997a6b892df5327bbfb7b045854963236fc422604963a38
                                      • Opcode Fuzzy Hash: 09df0912e1c687be10b6047ed76dc82ade3f578ecebcd4fee6913a0d8a378760
                                      • Instruction Fuzzy Hash: 1F3163F151968A4BE744E72CC591AE57BE1BB84308FD0C1A9F409877EECE3D6808C791
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ce0bff98b08a3f0705861f728fe826ee01ed2eaa7a4a9d13219c5364f8ae5c6
                                      • Instruction ID: 673aebc9a35c44ee08b739129422de3b414b32677f2f98066270842ed4a7460f
                                      • Opcode Fuzzy Hash: 7ce0bff98b08a3f0705861f728fe826ee01ed2eaa7a4a9d13219c5364f8ae5c6
                                      • Instruction Fuzzy Hash: 9A21F571E19A5A8FE794FB3CC459AB973E1FF98311B4444BAE00DC72A2DD28D844C780
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 76b553fc1b57e5645f8657736a93fca1c5cfa0090878af0e0d257f3af27b590b
                                      • Instruction ID: d7b63d55f30f37ca918ac7f5e9cd5488bee5018a2929591d98597ec8b991ca2d
                                      • Opcode Fuzzy Hash: 76b553fc1b57e5645f8657736a93fca1c5cfa0090878af0e0d257f3af27b590b
                                      • Instruction Fuzzy Hash: C011EC11A4E6C94FE347E3389895AA53FD1AF87210B0945F7E04CCB0A3D9598845C342
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7f948b1906a1232307f934e054eebd3a64a5ba3a162030552a189fd4ada5d0e6
                                      • Instruction ID: 7c668ff30890189dff320249107fe3e1e18d3318eaf7e5c2a5fa704b0c3b0de5
                                      • Opcode Fuzzy Hash: 7f948b1906a1232307f934e054eebd3a64a5ba3a162030552a189fd4ada5d0e6
                                      • Instruction Fuzzy Hash: E0014E5396DD578BE699A32C55465F537C1EFD6320B444576F04EC3186DD08A88A43C1
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42c01a4ca19aa20e2107549262a602465dd42511824e74cb9cefeea773854c30
                                      • Instruction ID: 22bd1f9794878014373b559a3b921e1600d0c866cc2e323a667c963c1346549b
                                      • Opcode Fuzzy Hash: 42c01a4ca19aa20e2107549262a602465dd42511824e74cb9cefeea773854c30
                                      • Instruction Fuzzy Hash: F5F02423B18C2D4FA684F2BD94D9EFA27D9DBAD22131444B3F40CC72A3DC08988283C0
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d523da9b43094a010ac8dc9759b73a4d6f3f14d4ff3e4d634ae2ddace40d3176
                                      • Instruction ID: 1b536fb18e13be555ed0f82d5930d807c2639d4f0f64a94ba99e9300d10f57eb
                                      • Opcode Fuzzy Hash: d523da9b43094a010ac8dc9759b73a4d6f3f14d4ff3e4d634ae2ddace40d3176
                                      • Instruction Fuzzy Hash: 21E06D22B19C1D5FAB98F67D8489F7966C9EBAC21171449B6E80CC72A2DC19DC818380
                                      Memory Dump Source
                                      • Source File: 0000000E.00000002.1355114857.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_14_2_7ffaac570000_Client.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8ddc17b6b902fbf9abe14a40d298f47f516c38b0a79b49bf1b7f3a68761d62fe
                                      • Instruction ID: df8d21dac23dacd43608ebeaf48a8dd04ca836c44b235a83f1901740b594d270
                                      • Opcode Fuzzy Hash: 8ddc17b6b902fbf9abe14a40d298f47f516c38b0a79b49bf1b7f3a68761d62fe
                                      • Instruction Fuzzy Hash: 31E0DFA2E4A92687F0A8733821160B832C08F85690B04143AF00DC6287CC1DED8303C8