Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Client-built.exe

Overview

General Information

Sample name:Client-built.exe
Analysis ID:1576463
MD5:cbad8ccc75f88cd7c6b5ab3ec70f2e2c
SHA1:b38fe0e24043d3867de1beac829297650c8b1fda
SHA256:4e217e2407d26687d8d2f12ad07d7013a5c0c236db79ab72b402e7fe18b0e987
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found potential dummy code loops (likely to delay analysis)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Client-built.exe (PID: 3168 cmdline: "C:\Users\user\Desktop\Client-built.exe" MD5: CBAD8CCC75F88CD7C6B5AB3EC70F2E2C)
    • schtasks.exe (PID: 5900 cmdline: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 2800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "104.251.123.245:23600;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "4119a2e0-4ae4-4843-8534-99af91a2475d", "StartupKey": "Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
Client-built.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    Client-built.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Client-built.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ee9d:$x1: Quasar.Common.Messages
      • 0x29f1c6:$x1: Quasar.Common.Messages
      • 0x2ab81a:$x4: Uninstalling... good bye :-(
      • 0x2ad00f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      Client-built.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aadcc:$f1: FileZilla\recentservers.xml
      • 0x2aae0c:$f2: FileZilla\sitemanager.xml
      • 0x2aae4e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab09a:$b1: Chrome\User Data\
      • 0x2ab0f0:$b1: Chrome\User Data\
      • 0x2ab3c8:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4c4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd420:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab61c:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6d6:$b5: YandexBrowser\User Data\
      • 0x2ab744:$b5: YandexBrowser\User Data\
      • 0x2ab418:$s4: logins.json
      • 0x2ab14e:$a1: username_value
      • 0x2ab16c:$a2: password_value
      • 0x2ab458:$a3: encryptedUsername
      • 0x2fd364:$a3: encryptedUsername
      • 0x2ab47c:$a4: encryptedPassword
      • 0x2fd382:$a4: encryptedPassword
      • 0x2fd300:$a5: httpRealm
      Client-built.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab904:$s3: Process already elevated.
      • 0x28eb9c:$s4: get_PotentiallyVulnerablePasswords
      • 0x278c58:$s5: GetKeyloggerLogsDirectory
      • 0x29e925:$s5: GetKeyloggerLogsDirectory
      • 0x28ebbf:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea4e:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1323382293.0000000000770000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000000.00000002.3778069344.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000000.00000000.1323071352.0000000000452000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Process Memory Space: Client-built.exe PID: 3168JoeSecurity_QuasarYara detected Quasar RATJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.Client-built.exe.450000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                0.0.Client-built.exe.450000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  0.0.Client-built.exe.450000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                  • 0x28ee9d:$x1: Quasar.Common.Messages
                  • 0x29f1c6:$x1: Quasar.Common.Messages
                  • 0x2ab81a:$x4: Uninstalling... good bye :-(
                  • 0x2ad00f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                  0.0.Client-built.exe.450000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                  • 0x2aadcc:$f1: FileZilla\recentservers.xml
                  • 0x2aae0c:$f2: FileZilla\sitemanager.xml
                  • 0x2aae4e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                  • 0x2ab09a:$b1: Chrome\User Data\
                  • 0x2ab0f0:$b1: Chrome\User Data\
                  • 0x2ab3c8:$b2: Mozilla\Firefox\Profiles
                  • 0x2ab4c4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x2fd420:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x2ab61c:$b4: Opera Software\Opera Stable\Login Data
                  • 0x2ab6d6:$b5: YandexBrowser\User Data\
                  • 0x2ab744:$b5: YandexBrowser\User Data\
                  • 0x2ab418:$s4: logins.json
                  • 0x2ab14e:$a1: username_value
                  • 0x2ab16c:$a2: password_value
                  • 0x2ab458:$a3: encryptedUsername
                  • 0x2fd364:$a3: encryptedUsername
                  • 0x2ab47c:$a4: encryptedPassword
                  • 0x2fd382:$a4: encryptedPassword
                  • 0x2fd300:$a5: httpRealm
                  0.0.Client-built.exe.450000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                  • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                  • 0x2ab904:$s3: Process already elevated.
                  • 0x28eb9c:$s4: get_PotentiallyVulnerablePasswords
                  • 0x278c58:$s5: GetKeyloggerLogsDirectory
                  • 0x29e925:$s5: GetKeyloggerLogsDirectory
                  • 0x28ebbf:$s6: set_PotentiallyVulnerablePasswords
                  • 0x2fea4e:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Client-built.exe", ParentImage: C:\Users\user\Desktop\Client-built.exe, ParentProcessId: 3168, ParentProcessName: Client-built.exe, ProcessCommandLine: "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f, ProcessId: 5900, ProcessName: schtasks.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Client-built.exeAvira: detected
                  Source: Client-built.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "104.251.123.245:23600;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "4119a2e0-4ae4-4843-8534-99af91a2475d", "StartupKey": "Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAMqrBgYlb6a1Z/kKnJrAITANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTIwODEzMjgxOFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxpjNNWqXrfwi4V7qk0dxXzMcyxegQRt6bTBQhMHKUElfXRsAPU/Y5+sR5hSz7kcqdd0KrwjVxFYZdjbf334bztDO8V02TS3dGTfh8YmlyNpo6K66xJuhuSMpnGs8DUjnZWU8LIa26mFyJ3PoeDYS0qv+2tZtJKBmQ7ZQ6cMWN+PELML1LPLcD1RxOWmim/Ztu9kPORd+uTeFdMlUAoYGwHVB7PSz1se8/L/wQK94gkRBOTq6Ka2i4nY7deXTR6jqeC+gVlT/F6541dgQWzLUzcwdQgFADrRWRLxHFExUIS8Vtlucp2ZiQjQ7BbFP+uZIJfxcUpixqZueEStrYxwdipkpu6Tfm3xTD1jFrrAWMyVbGsvGxpxAOqebHbGzFCsgpepeUXlvaLlkICiJjOs8QL7vr5Io5M05NennNk0BGsy94m9ARWgInBiMuXmLnvAc4R6UE0ZCXWGLmyeuUqCgFegTSSGSiOTRjMunhgPUlVQTyj2GMHB/jBZPuv1u1oqJam/jKkWABGUmZaZbhgXxnt2F5sm9TmXRWSvcDK8zIh7kaaQjwPHkBsTO25wDWNqWmoGvJnabOWL8dXyjmTSs4czWsQlCbQQS4HBzXVwdBN/fTpB+HqGDzPSuHu9CM7tW/DwbFef0CXVJsFEeYhg8pfwJUWYFumCEckrLEyFhBm8CAwEAAaMyMDAwHQYDVR0OBBYEFNHDNB71FPsp8Jjx7Wn1zElRBXD3MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAHHr6eSKnYCLvtV+/lPKxLT1JBDuF0IV29ncwTBworqLcEyfZ+OfpWNt9oNB++DQ2RfqVkNRkubW862mn4N4PkPzGw2NfKCgamYAruRbnV2iJrI0PnXuKBfpGdWBeh39IIPZZwxwP4pEgQgC3cI11b3/KBJHPcdcgjdoExfZj3yvxaC9HDiMNSUgcW2k3FySwGwbk0Yi3K9QbItVaCzE2kZ8Cjc3fsNUTvpB4x6684TbKu1b7TRGG90PLcw/Xlwq6mY9g9+IEK9JB4c5xOdOT/drkKI3qLQv1+Tbn3rhsPhijAMwx4zyOW0GebzrI+4gjL2bQtpO1xM/NoUXBb7g88/c7Pg7FQkwv6i8Ku7Lp6jojrntz4Fh+l+zQaiqdZEuc0mBJCmUJUj4SOP1Spa7QZB/kE4brofJ3xk6UZqMr22X9Oh9uSUfxmjbl31+CdwCGsH1IPxbKEIarf4zsZRGjHz934gy2Q5ZD/1Zo/Zm6D3k9D3R0YPXUTjGGMG14PMr6o0AEqRoWMRg1XPhy6TRu6wgnDmKQIiig96a8CjwW+7GQBhBf5RTHVwoUjxrtFe78LBuD4F/FL4Oy/BKSHUdCkfk/8sJGAtaUXAn8c7vqJ0O+/iaxUvKmWB0lkl1H8tNAI/ytUwXkLZlDKz8BSV9c3cRd5OyuYGQ/lEf2ue7/r9m"}
                  Source: Client-built.exeVirustotal: Detection: 80%Perma Link
                  Source: Client-built.exeReversingLabs: Detection: 76%
                  Source: Yara matchFile source: Client-built.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1323382293.0000000000770000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3778069344.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1323071352.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Client-built.exe PID: 3168, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: Client-built.exeJoe Sandbox ML: detected
                  Source: Client-built.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Client-built.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 104.251.123.245
                  Source: Yara matchFile source: Client-built.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPE
                  Source: global trafficTCP traffic: 192.168.2.9:49712 -> 104.251.123.245:23600
                  Source: Joe Sandbox ViewASN Name: 1GSERVERSUS 1GSERVERSUS
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.251.123.245
                  Source: Client-built.exe, 00000000.00000002.3778069344.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Client-built.exeString found in binary or memory: https://api.ipify.org/
                  Source: Client-built.exeString found in binary or memory: https://ipwho.is/
                  Source: Client-built.exeString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: Client-built.exeString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: Client-built.exeString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\Client-built.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Client-built.exeJump to behavior

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: Client-built.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1323382293.0000000000770000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3778069344.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1323071352.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Client-built.exe PID: 3168, type: MEMORYSTR

                  System Summary

                  barindex
                  Source: Client-built.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: Client-built.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: Client-built.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC8D410_2_00007FF887FC8D41
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC61870_2_00007FF887FC6187
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC62430_2_00007FF887FC6243
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC54B60_2_00007FF887FC54B6
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FCAAAD0_2_00007FF887FCAAAD
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC9AC40_2_00007FF887FC9AC4
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC0DD10_2_00007FF887FC0DD1
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC11FA0_2_00007FF887FC11FA
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC10F20_2_00007FF887FC10F2
                  Source: Client-built.exe, 00000000.00000000.1323382293.0000000000770000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Client-built.exe
                  Source: Client-built.exeBinary or memory string: OriginalFilenameClient.exe. vs Client-built.exe
                  Source: Client-built.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Client-built.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: Client-built.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: Client-built.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@0/1
                  Source: C:\Users\user\Desktop\Client-built.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2800:120:WilError_03
                  Source: C:\Users\user\Desktop\Client-built.exeMutant created: \Sessions\1\BaseNamedObjects\Local\4119a2e0-4ae4-4843-8534-99af91a2475d
                  Source: Client-built.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Client-built.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\Client-built.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Client-built.exeVirustotal: Detection: 80%
                  Source: Client-built.exeReversingLabs: Detection: 76%
                  Source: Client-built.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                  Source: unknownProcess created: C:\Users\user\Desktop\Client-built.exe "C:\Users\user\Desktop\Client-built.exe"
                  Source: C:\Users\user\Desktop\Client-built.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                  Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Client-built.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: mrmcorer.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: thumbcache.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                  Source: Client-built.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Client-built.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: Client-built.exeStatic file information: File size 3265536 > 1048576
                  Source: Client-built.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                  Source: Client-built.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887D5752B push ebx; iretd 0_2_00007FF887D5756A
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887D5842D push eax; ret 0_2_00007FF887D5846D
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887D52BE5 pushad ; iretd 0_2_00007FF887D52C3D
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887D52B8B pushad ; iretd 0_2_00007FF887D52C3D
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887D5D9F2 push eax; iretd 0_2_00007FF887D5DA11
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC54B6 push ecx; retf 0_2_00007FF887FC59DC
                  Source: C:\Users\user\Desktop\Client-built.exeCode function: 0_2_00007FF887FC5948 push ecx; retf 0_2_00007FF887FC59DC

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\Client-built.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\Client-built.exeFile opened: C:\Users\user\Desktop\Client-built.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeMemory allocated: 2960000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeMemory allocated: 1AAF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeWindow / User API: threadDelayed 8501Jump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeWindow / User API: threadDelayed 1324Jump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exe TID: 1700Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Client-built.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: Client-built.exe, 00000000.00000002.3780663557.000000001B67A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\Client-built.exeProcess Stats: CPU usage > 42% for more than 60s
                  Source: C:\Users\user\Desktop\Client-built.exeProcess token adjusted: DebugJump to behavior
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Users\user\Desktop\Client-built.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /fJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeQueries volume information: C:\Users\user\Desktop\Client-built.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Client-built.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Client-built.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1323382293.0000000000770000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3778069344.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1323071352.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Client-built.exe PID: 3168, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Client-built.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client-built.exe.450000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1323382293.0000000000770000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3778069344.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1323071352.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Client-built.exe PID: 3168, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Command and Scripting Interpreter
                  1
                  Scheduled Task/Job
                  11
                  Process Injection
                  1
                  Disable or Modify Tools
                  11
                  Input Capture
                  11
                  Security Software Discovery
                  Remote Services11
                  Input Capture
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Scheduled Task/Job
                  1
                  DLL Side-Loading
                  1
                  Scheduled Task/Job
                  132
                  Virtualization/Sandbox Evasion
                  LSASS Memory132
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  11
                  Process Injection
                  Security Account Manager1
                  Application Window Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Hidden Files and Directories
                  NTDS1
                  File and Directory Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Obfuscated Files or Information
                  LSA Secrets12
                  System Information Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Client-built.exe81%VirustotalBrowse
                  Client-built.exe76%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                  Client-built.exe100%AviraHEUR/AGEN.1307453
                  Client-built.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  104.251.123.2450%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  s-part-0035.t-0009.t-msedge.net
                  13.107.246.63
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    104.251.123.245true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/Client-built.exefalse
                      high
                      https://stackoverflow.com/q/14436606/23354Client-built.exefalse
                        high
                        https://stackoverflow.com/q/2152978/23354sCannotClient-built.exefalse
                          high
                          https://ipwho.is/Client-built.exefalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameClient-built.exe, 00000000.00000002.3778069344.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/11564914/23354;Client-built.exefalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                104.251.123.245
                                unknownUnited States
                                143151GSERVERSUStrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1576463
                                Start date and time:2024-12-17 07:28:54 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 7m 27s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:8
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:Client-built.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@4/0@0/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 98%
                                • Number of executed functions: 9
                                • Number of non-executed functions: 3
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                TimeTypeDescription
                                01:29:47API Interceptor13138607x Sleep call for process: Client-built.exe modified
                                06:29:46Task SchedulerRun new task: Startup path: C:\Users\user\AppData\Roaming\SubDir\Client.exe
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                s-part-0035.t-0009.t-msedge.netwayneenterprisesbatcave-6.0.1901-windows-installer.msiGet hashmaliciousScreenConnect ToolBrowse
                                • 13.107.246.63
                                bad.htmlGet hashmaliciousHTMLPhisherBrowse
                                • 13.107.246.63
                                Yogi Tea Benefits Open Enrollment.emlGet hashmaliciousHTMLPhisherBrowse
                                • 13.107.246.63
                                http://inspirafinancial.comGet hashmaliciousUnknownBrowse
                                • 13.107.246.63
                                Remit_Advice_SMKT_84655.htmGet hashmaliciousHTMLPhisherBrowse
                                • 13.107.246.63
                                ME-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                • 13.107.246.63
                                TEC-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                • 13.107.246.63
                                Smple_Order-048576744759475945.xlsGet hashmaliciousUnknownBrowse
                                • 13.107.246.63
                                Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                • 13.107.246.63
                                Sample_Order_000000991.xlsGet hashmaliciousUnknownBrowse
                                • 13.107.246.63
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                1GSERVERSUSjew.sh4.elfGet hashmaliciousUnknownBrowse
                                • 207.32.216.19
                                SecuriteInfo.com.Win64.Malware-gen.4046.15809.exeGet hashmaliciousEICARBrowse
                                • 104.251.123.67
                                loader.exeGet hashmaliciousXmrigBrowse
                                • 142.202.242.43
                                sora.arm.elfGet hashmaliciousMiraiBrowse
                                • 207.32.216.26
                                PT54FFSL7ET46RASB.exeGet hashmaliciousLummaC Stealer, PureLog Stealer, Xmrig, zgRATBrowse
                                • 142.202.242.43
                                System.exeGet hashmaliciousFlesh Stealer, XmrigBrowse
                                • 142.202.242.43
                                2BuZaUic3i.exeGet hashmaliciousRedLineBrowse
                                • 207.32.219.79
                                EpCrfIUgyF.exeGet hashmaliciousRedLineBrowse
                                • 207.32.219.79
                                04cde81ac938706771fa9fe936ee8f79fe7e079973098.exeGet hashmaliciousRedLine, XmrigBrowse
                                • 142.202.242.45
                                Facturation.exeGet hashmaliciousDoeneriumBrowse
                                • 104.251.123.67
                                No context
                                No context
                                No created / dropped files found
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):6.084001555814208
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:Client-built.exe
                                File size:3'265'536 bytes
                                MD5:cbad8ccc75f88cd7c6b5ab3ec70f2e2c
                                SHA1:b38fe0e24043d3867de1beac829297650c8b1fda
                                SHA256:4e217e2407d26687d8d2f12ad07d7013a5c0c236db79ab72b402e7fe18b0e987
                                SHA512:0dec15040dc1b60892ac2330a593891bb5d0e4fdf77075fdacaac9034d53cafebaff4a362236f350ae93cd67ed4a45c1dea8d75b126fc205037780b23322224c
                                SSDEEP:49152:KvQt62XlaSFNWPjljiFa2RoUYI1HRJ6bbR3LoGdt5ZTHHB72eh2NT:Kvc62XlaSFNWPjljiFXRoUYI1HRJ6tr
                                TLSH:C4E56B143BF85E27E1BBE277E5B0041267F0FC1AB363EB0B6581677A1C53B5098426A7
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                                Icon Hash:00928e8e8686b000
                                Entrypoint:0x71e3de
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3880x53.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x31c3e40x31c400a98a70168435fd91841c68f1ba37ce5cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x3200000xa930xc00cdeae95ac72e9e58017d2bcc89d2fbeaFalse0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x3220000xc0x200576e09f300aa2216eb4d32ea1fecea5fFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_VERSION0x3200a00x31cdata0.4484924623115578
                                RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 17, 2024 07:29:47.455650091 CET4971223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:29:47.592499971 CET2360049712104.251.123.245192.168.2.9
                                Dec 17, 2024 07:29:47.592577934 CET4971223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:29:47.603281021 CET4971223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:29:47.834940910 CET2360049712104.251.123.245192.168.2.9
                                Dec 17, 2024 07:30:09.472330093 CET2360049712104.251.123.245192.168.2.9
                                Dec 17, 2024 07:30:09.472450018 CET4971223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:09.567001104 CET4971223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:09.686801910 CET2360049712104.251.123.245192.168.2.9
                                Dec 17, 2024 07:30:13.123560905 CET4973123600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:13.243397951 CET2360049731104.251.123.245192.168.2.9
                                Dec 17, 2024 07:30:13.243573904 CET4973123600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:13.244038105 CET4973123600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:13.363684893 CET2360049731104.251.123.245192.168.2.9
                                Dec 17, 2024 07:30:35.130244017 CET2360049731104.251.123.245192.168.2.9
                                Dec 17, 2024 07:30:35.130475044 CET4973123600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:35.130990028 CET4973123600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:35.251075983 CET2360049731104.251.123.245192.168.2.9
                                Dec 17, 2024 07:30:38.811100960 CET4973223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:38.931003094 CET2360049732104.251.123.245192.168.2.9
                                Dec 17, 2024 07:30:38.931144953 CET4973223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:38.931629896 CET4973223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:30:39.051423073 CET2360049732104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:00.848372936 CET2360049732104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:00.848484993 CET4973223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:00.848764896 CET4973223600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:00.968498945 CET2360049732104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:04.357970953 CET4973423600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:04.477749109 CET2360049734104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:04.478025913 CET4973423600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:04.478373051 CET4973423600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:04.598753929 CET2360049734104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:26.379930019 CET2360049734104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:26.380273104 CET4973423600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:26.430622101 CET4973423600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:26.550528049 CET2360049734104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:29.969789028 CET4973523600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:30.089713097 CET2360049735104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:30.089936018 CET4973523600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:30.090276003 CET4973523600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:30.209914923 CET2360049735104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:52.007107973 CET2360049735104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:52.007256031 CET4973523600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:52.007622957 CET4973523600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:52.127692938 CET2360049735104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:55.748598099 CET4973623600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:55.868549109 CET2360049736104.251.123.245192.168.2.9
                                Dec 17, 2024 07:31:55.868669987 CET4973623600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:55.869116068 CET4973623600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:31:55.988935947 CET2360049736104.251.123.245192.168.2.9
                                Dec 17, 2024 07:32:17.787333965 CET2360049736104.251.123.245192.168.2.9
                                Dec 17, 2024 07:32:17.787698030 CET4973623600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:17.788897991 CET4973623600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:17.908643961 CET2360049736104.251.123.245192.168.2.9
                                Dec 17, 2024 07:32:21.491935015 CET4973723600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:21.613423109 CET2360049737104.251.123.245192.168.2.9
                                Dec 17, 2024 07:32:21.613545895 CET4973723600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:21.613924026 CET4973723600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:21.733671904 CET2360049737104.251.123.245192.168.2.9
                                Dec 17, 2024 07:32:43.506541967 CET2360049737104.251.123.245192.168.2.9
                                Dec 17, 2024 07:32:43.510179043 CET4973723600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:43.513014078 CET4973723600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:43.632787943 CET2360049737104.251.123.245192.168.2.9
                                Dec 17, 2024 07:32:46.998944044 CET4973823600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:47.118817091 CET2360049738104.251.123.245192.168.2.9
                                Dec 17, 2024 07:32:47.118902922 CET4973823600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:47.119453907 CET4973823600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:32:47.239152908 CET2360049738104.251.123.245192.168.2.9
                                Dec 17, 2024 07:33:09.022746086 CET2360049738104.251.123.245192.168.2.9
                                Dec 17, 2024 07:33:09.022927046 CET4973823600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:09.023395061 CET4973823600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:09.143114090 CET2360049738104.251.123.245192.168.2.9
                                Dec 17, 2024 07:33:12.576973915 CET4973923600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:12.696845055 CET2360049739104.251.123.245192.168.2.9
                                Dec 17, 2024 07:33:12.702272892 CET4973923600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:12.703658104 CET4973923600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:12.823417902 CET2360049739104.251.123.245192.168.2.9
                                Dec 17, 2024 07:33:34.617042065 CET2360049739104.251.123.245192.168.2.9
                                Dec 17, 2024 07:33:34.617247105 CET4973923600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:34.618249893 CET4973923600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:34.737967014 CET2360049739104.251.123.245192.168.2.9
                                Dec 17, 2024 07:33:38.343216896 CET4974023600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:38.463231087 CET2360049740104.251.123.245192.168.2.9
                                Dec 17, 2024 07:33:38.463367939 CET4974023600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:38.463869095 CET4974023600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:33:38.583730936 CET2360049740104.251.123.245192.168.2.9
                                Dec 17, 2024 07:34:00.382946968 CET2360049740104.251.123.245192.168.2.9
                                Dec 17, 2024 07:34:00.383019924 CET4974023600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:34:00.383331060 CET4974023600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:34:00.503032923 CET2360049740104.251.123.245192.168.2.9
                                Dec 17, 2024 07:34:04.092833042 CET4974123600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:34:04.213402987 CET2360049741104.251.123.245192.168.2.9
                                Dec 17, 2024 07:34:04.213526964 CET4974123600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:34:04.214143038 CET4974123600192.168.2.9104.251.123.245
                                Dec 17, 2024 07:34:04.333998919 CET2360049741104.251.123.245192.168.2.9
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Dec 17, 2024 07:29:42.766943932 CET1.1.1.1192.168.2.90xcd00No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                Dec 17, 2024 07:29:42.766943932 CET1.1.1.1192.168.2.90xcd00No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:01:29:43
                                Start date:17/12/2024
                                Path:C:\Users\user\Desktop\Client-built.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\Client-built.exe"
                                Imagebase:0x450000
                                File size:3'265'536 bytes
                                MD5 hash:CBAD8CCC75F88CD7C6B5AB3EC70F2E2C
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1323382293.0000000000770000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.3778069344.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1323071352.0000000000452000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:2
                                Start time:01:29:45
                                Start date:17/12/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:"schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                Imagebase:0x7ff6cff80000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:01:29:46
                                Start date:17/12/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff70f010000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:9.8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:8
                                  Total number of Limit Nodes:1
                                  execution_graph 13249 7ff887d53569 13250 7ff887d53571 DeleteFileW 13249->13250 13252 7ff887d53616 13250->13252 13253 7ff887fce1d9 13255 7ff887fce1ef 13253->13255 13254 7ff887fce29b 13255->13254 13256 7ff887fce394 SetWindowsHookExW 13255->13256 13257 7ff887fce3d6 13256->13257

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 123 7ff887fc6243-7ff887fc626f 125 7ff887fc6275-7ff887fc6278 123->125 126 7ff887fc670e-7ff887fc672b 123->126 127 7ff887fc62a5-7ff887fc62c3 125->127 128 7ff887fc627a-7ff887fc629f 125->128 129 7ff887fc6731-7ff887fc6734 126->129 130 7ff887fc61e5-7ff887fc621f 126->130 137 7ff887fc648a-7ff887fc649c 127->137 138 7ff887fc62c9-7ff887fc62cb 127->138 128->126 128->127 132 7ff887fc6756-7ff887fc6777 129->132 133 7ff887fc6736-7ff887fc673a 129->133 130->126 152 7ff887fc6225-7ff887fc623f 130->152 140 7ff887fc6796-7ff887fc679b 132->140 141 7ff887fc6779-7ff887fc678f 132->141 133->132 139 7ff887fc673c-7ff887fc6751 call 7ff887fc51d0 133->139 149 7ff887fc6475-7ff887fc6485 137->149 150 7ff887fc649e-7ff887fc64a3 137->150 138->126 143 7ff887fc62d1-7ff887fc62f1 138->143 139->132 145 7ff887fc67dd-7ff887fc67e4 140->145 146 7ff887fc679d-7ff887fc67bb 140->146 141->140 164 7ff887fc63d7-7ff887fc63e9 143->164 165 7ff887fc62f7-7ff887fc6346 143->165 153 7ff887fc6812-7ff887fc6817 145->153 154 7ff887fc67e6-7ff887fc67ff 145->154 146->145 160 7ff887fc67bd-7ff887fc67c9 146->160 149->126 155 7ff887fc64a9-7ff887fc64f0 150->155 156 7ff887fc657f-7ff887fc6591 150->156 152->126 158 7ff887fc681d-7ff887fc6825 153->158 159 7ff887fc68ec-7ff887fc68fd 153->159 175 7ff887fc6801-7ff887fc6802 154->175 176 7ff887fc680a-7ff887fc6810 154->176 182 7ff887fc64f2-7ff887fc6505 155->182 183 7ff887fc650b-7ff887fc6566 155->183 156->126 170 7ff887fc6569-7ff887fc657a 156->170 166 7ff887fc6977-7ff887fc69ae 158->166 167 7ff887fc682b-7ff887fc683b 158->167 168 7ff887fc67d5-7ff887fc67db 160->168 169 7ff887fc67cb-7ff887fc67d3 160->169 174 7ff887fc63ef-7ff887fc6474 164->174 165->164 190 7ff887fc634c-7ff887fc6387 165->190 188 7ff887fc69b0-7ff887fc6a0d 166->188 189 7ff887fc696b-7ff887fc6971 166->189 186 7ff887fc684b-7ff887fc6853 167->186 187 7ff887fc683d-7ff887fc6841 167->187 168->145 168->160 169->168 170->126 174->149 175->176 176->153 176->154 182->126 182->183 183->170 186->166 192 7ff887fc6859-7ff887fc6869 186->192 187->166 191 7ff887fc6847-7ff887fc6848 187->191 219 7ff887fc6a18-7ff887fc6a29 188->219 220 7ff887fc6a0f-7ff887fc6a17 188->220 189->166 202 7ff887fc63b4-7ff887fc63c5 190->202 203 7ff887fc6389-7ff887fc63b2 190->203 191->186 200 7ff887fc686b-7ff887fc686f 192->200 201 7ff887fc6879-7ff887fc6881 192->201 200->166 204 7ff887fc6875-7ff887fc6876 200->204 201->166 205 7ff887fc6887-7ff887fc6897 201->205 202->190 207 7ff887fc63c7 202->207 203->202 217 7ff887fc63c9-7ff887fc63d1 203->217 204->201 210 7ff887fc68a7-7ff887fc68af 205->210 211 7ff887fc6899-7ff887fc689d 205->211 207->164 210->166 214 7ff887fc68b5-7ff887fc68c5 210->214 211->166 213 7ff887fc68a3-7ff887fc68a4 211->213 213->210 221 7ff887fc68c7-7ff887fc68cb 214->221 222 7ff887fc68d5-7ff887fc68e5 214->222 217->164 223 7ff887fc6a34-7ff887fc6a46 219->223 224 7ff887fc6a2b-7ff887fc6a33 219->224 220->219 221->166 225 7ff887fc68d1-7ff887fc68d2 221->225 222->159 226 7ff887fc6a48-7ff887fc6a4a 223->226 227 7ff887fc6a4c-7ff887fc6a56 223->227 224->223 225->222 228 7ff887fc6a5a-7ff887fc6a9b 226->228 227->228 233 7ff887fc6ab6-7ff887fc6ac7 228->233 234 7ff887fc6a9d-7ff887fc6ab3 228->234 236 7ff887fc6ac9-7ff887fc6ae8 233->236 237 7ff887fc6afd-7ff887fc6b03 233->237 234->233 236->237 239 7ff887fc6aea-7ff887fc6afb 236->239 239->237 240 7ff887fc6b04-7ff887fc6b5b 239->240 240->237
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0#L$0XL
                                  • API String ID: 0-892149821
                                  • Opcode ID: 11aaf21444399585fa66a496ae058b8f660840c01f4646a29f2c552acb5c783f
                                  • Instruction ID: b5a075fc81a587f8217577ed5fdd2919f1fb22c8c7cf0b0637ab28c665e39f45
                                  • Opcode Fuzzy Hash: 11aaf21444399585fa66a496ae058b8f660840c01f4646a29f2c552acb5c783f
                                  • Instruction Fuzzy Hash: 81023930A58A298FEB98DF19C4857A9B3F2FF99340F1445BAD04ED7695CE34E881CB40

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 407 7ff887fcaaad-7ff887fcab49 409 7ff887fcb1c1-7ff887fcb1d6 407->409 410 7ff887fcab4f-7ff887fcab52 407->410 410->409 411 7ff887fcab58-7ff887fcab75 410->411 411->409 413 7ff887fcab7b-7ff887fcab9a 411->413 415 7ff887fcaba6-7ff887fcabb9 413->415 416 7ff887fcab9c-7ff887fcab9f 413->416 419 7ff887fcac49-7ff887fcac5b 415->419 417 7ff887fcaba1 416->417 418 7ff887fcabbe-7ff887fcabee 416->418 417->409 418->409 424 7ff887fcabf4-7ff887fcac42 418->424 419->409 422 7ff887fcac61-7ff887fcaca0 419->422 422->409 429 7ff887fcaca6-7ff887fcacb0 422->429 424->419 432 7ff887fcacb2-7ff887fcacc6 429->432 433 7ff887fcacc8-7ff887fcacd8 429->433 436 7ff887fcace2-7ff887fcad37 432->436 433->436 440 7ff887fcad3d-7ff887fcad45 436->440 441 7ff887fcad47-7ff887fcad5b 440->441 442 7ff887fcadab-7ff887fcadb3 440->442 441->442 446 7ff887fcad5d-7ff887fcada7 441->446 442->409 443 7ff887fcadb9-7ff887fcaddb 442->443 447 7ff887fcade1-7ff887fcae0a 443->447 448 7ff887fcaedf-7ff887fcaf15 443->448 446->442 453 7ff887fcae10-7ff887fcae36 447->453 454 7ff887fcae91-7ff887fcaeb2 447->454 448->409 460 7ff887fcaf1b-7ff887fcaf2d 448->460 453->454 463 7ff887fcae38-7ff887fcae4e 453->463 454->447 456 7ff887fcaeb8 454->456 456->448 460->409 465 7ff887fcaf33-7ff887fcaf51 460->465 463->454 467 7ff887fcae50-7ff887fcae68 463->467 465->409 472 7ff887fcaf57-7ff887fcaf85 465->472 467->454 471 7ff887fcae6a-7ff887fcae8f 467->471 471->454 475 7ff887fcaeba-7ff887fcaed8 471->475 479 7ff887fcaf87-7ff887fcafa1 472->479 480 7ff887fcafa8-7ff887fcafb5 472->480 475->448 479->480 483 7ff887fcb07a-7ff887fcb09a 480->483 484 7ff887fcafbb-7ff887fcafe8 480->484 487 7ff887fcb0a4-7ff887fcb0e0 483->487 488 7ff887fcb09c-7ff887fcb09d 483->488 492 7ff887fcafea-7ff887fcb004 484->492 493 7ff887fcb00b-7ff887fcb017 484->493 487->409 500 7ff887fcb0e6-7ff887fcb103 487->500 488->487 492->493 498 7ff887fcb068-7ff887fcb074 493->498 499 7ff887fcb019-7ff887fcb025 493->499 498->409 498->483 501 7ff887fcb310-7ff887fcb327 499->501 502 7ff887fcb02b-7ff887fcb061 499->502 505 7ff887fcb105-7ff887fcb106 500->505 506 7ff887fcb10d-7ff887fcb148 500->506 509 7ff887fcb331-7ff887fcb39f call 7ff887fc4f50 call 7ff887fc7840 call 7ff887fc5250 call 7ff887fcb3a0 501->509 510 7ff887fcb329-7ff887fcb330 501->510 502->498 505->506 506->409 521 7ff887fcb14a-7ff887fcb15c 506->521 510->509 521->409 526 7ff887fcb15e-7ff887fcb17c 521->526 526->409 530 7ff887fcb17e-7ff887fcb19a 526->530 533 7ff887fcb1d7-7ff887fcb24c 530->533 534 7ff887fcb19c-7ff887fcb1bf 530->534 544 7ff887fcb2f7-7ff887fcb30f 533->544 545 7ff887fcb252-7ff887fcb25e 533->545 534->409 534->533 547 7ff887fcb290-7ff887fcb2f0 545->547 548 7ff887fcb260-7ff887fcb27a 545->548 547->544 548->544 551 7ff887fcb27c-7ff887fcb28f 548->551 551->547
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: x0_H
                                  • API String ID: 0-4001381062
                                  • Opcode ID: 43810639bd5ed6b26a5d2f2f5b0107ccf2e992063b6857c6d387b7ff66dc2bf3
                                  • Instruction ID: fe9638c261bf68398020a15a847b776a3093f91f5a92a75860347581eec46522
                                  • Opcode Fuzzy Hash: 43810639bd5ed6b26a5d2f2f5b0107ccf2e992063b6857c6d387b7ff66dc2bf3
                                  • Instruction Fuzzy Hash: E8526330648A498FEB98EB2CD458B7977E2FF99340F1445B9E44DC72A6DE38E841C741
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1e42e1c86b3fdb531ccf689fd10b51266a5f01ad44434674dd5cca1bc71d2629
                                  • Instruction ID: 43cb6dcae45906d4693302d709cfb17bca79152d23beaeb9b68142a6fbe88092
                                  • Opcode Fuzzy Hash: 1e42e1c86b3fdb531ccf689fd10b51266a5f01ad44434674dd5cca1bc71d2629
                                  • Instruction Fuzzy Hash: 78B29070A18A598FDF98DF18C494BAD77F2FFA9340F5441A8D04ED7296CA35E882CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03b1982e9f5f00a3f527fa0eadf8ed172097eeafdd7370c68495c5af70029b54
                                  • Instruction ID: 0a6c8153d55847b2a0ee2116c016592eb68f9ac802db33dbf6af26d8d9237d68
                                  • Opcode Fuzzy Hash: 03b1982e9f5f00a3f527fa0eadf8ed172097eeafdd7370c68495c5af70029b54
                                  • Instruction Fuzzy Hash: BD521430B1C9594FEB98EB2CD459AB977E1FF98350B0401B9D44EC72A6DE28EC42C741
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9a3a8cd3633c402645b23ffef77f603689f5d3f4ab066d3c39f6783ece402cfa
                                  • Instruction ID: 4dbf86da60c9aa1f02f65eb2e7e6cf3bb5244a1745af451067c6d46cbb44bae6
                                  • Opcode Fuzzy Hash: 9a3a8cd3633c402645b23ffef77f603689f5d3f4ab066d3c39f6783ece402cfa
                                  • Instruction Fuzzy Hash: 86228C30A58A598FEB98EA2D94957BD77E2FFA8340F14017DD44EC3296DE38E842C741
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8181df47c7d6ef5de1051a27b2fdd6fcce18f241e718a5094a0b3ef2bcdc01c7
                                  • Instruction ID: 088640f495e7b45196e489390e33b17980fd77609dbd49c4212673767ae0fd3a
                                  • Opcode Fuzzy Hash: 8181df47c7d6ef5de1051a27b2fdd6fcce18f241e718a5094a0b3ef2bcdc01c7
                                  • Instruction Fuzzy Hash: D4E1CE30A1CA5A8FEB98DB29C8456B977F1FF8A340F1445B9D45EC7292CE38E841C741

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4ed6c0b9fdbd36d210e99a1b886b4445eb015be0df821d08e306c982688d4fb
                                  • Instruction ID: 657a59421abeddceef79b3ae115fbd710046132703bc0f12ca050097667721bc
                                  • Opcode Fuzzy Hash: e4ed6c0b9fdbd36d210e99a1b886b4445eb015be0df821d08e306c982688d4fb
                                  • Instruction Fuzzy Hash: 15710771E5CA994FD748AB6C94562F97BE0FF98710B0041BED04EC7197DE28A842C781

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 834 7ff887d53525-7ff887d5352f 835 7ff887d53571-7ff887d535d8 834->835 836 7ff887d53531-7ff887d53562 834->836 842 7ff887d535da-7ff887d535df 835->842 843 7ff887d535e2-7ff887d53614 DeleteFileW 835->843 836->835 842->843 844 7ff887d5361c-7ff887d5364a 843->844 845 7ff887d53616 843->845 845->844
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3781858218.00007FF887D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887d50000_Client-built.jbxd
                                  Similarity
                                  • API ID: DeleteFile
                                  • String ID:
                                  • API String ID: 4033686569-0
                                  • Opcode ID: 958916973d33705142a353d2f59f961da9a3e7b49f043a384991cc47fce82854
                                  • Instruction ID: 505e43926b3c0462876eec520037dc15787522b7d0b36152951c53d9dd128da8
                                  • Opcode Fuzzy Hash: 958916973d33705142a353d2f59f961da9a3e7b49f043a384991cc47fce82854
                                  • Instruction Fuzzy Hash: 8641263290DB8C9FDB19DB6888496ED7FF0FF56310F0442AFC04AC7692CA24A809C791

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 847 7ff887d53569-7ff887d535d8 852 7ff887d535da-7ff887d535df 847->852 853 7ff887d535e2-7ff887d53614 DeleteFileW 847->853 852->853 854 7ff887d5361c-7ff887d5364a 853->854 855 7ff887d53616 853->855 855->854
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3781858218.00007FF887D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887d50000_Client-built.jbxd
                                  Similarity
                                  • API ID: DeleteFile
                                  • String ID:
                                  • API String ID: 4033686569-0
                                  • Opcode ID: b2cca23c88342b29aafaf2887214c89a07014493ba4fa48f2bb6eb360646d77d
                                  • Instruction ID: 55afb0cf26a637cb862a63d0aca041a6550e000123a4f28c27551ba25671a7b9
                                  • Opcode Fuzzy Hash: b2cca23c88342b29aafaf2887214c89a07014493ba4fa48f2bb6eb360646d77d
                                  • Instruction Fuzzy Hash: 0431C03190CA9C8FDB59DB98C8496EDBBF0FF65310F04426BD04AD3692DB64A806CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 47726dd488ebcab7f354ab5f15f380e7eb79b1e14d4660c6e4d7703d7200e026
                                  • Instruction ID: 6b82a16be8162d99e6756596b1f57e028c9e42a982444e0396f548bf05a7471e
                                  • Opcode Fuzzy Hash: 47726dd488ebcab7f354ab5f15f380e7eb79b1e14d4660c6e4d7703d7200e026
                                  • Instruction Fuzzy Hash: 39325217D0D1E28AE61176BDF4A21EE3F60DF422B970C41B7D1ED49053DD0CA98BC6A6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d2bbf7ec3f854d84665498cbbd7bf1d198d2b2d3eeb7840277c872505444a3a4
                                  • Instruction ID: 236d9947695e32fa7bb5d3f2320ed19560a9fc01d707379b96d5e166e331047c
                                  • Opcode Fuzzy Hash: d2bbf7ec3f854d84665498cbbd7bf1d198d2b2d3eeb7840277c872505444a3a4
                                  • Instruction Fuzzy Hash: 36E1511BD0D1E28AE71176FDF4A21EE3F609F422B970841B7E1ED49053DD0C668BC6A6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3783419307.00007FF887FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff887fc0000_Client-built.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 50283b5171bd9d5fc91d6669d2bc0c5744c141261e7ef84fa7bdec8ef07a2aa8
                                  • Instruction ID: 8ef440a5d3af0739480b35ac7df0600f6fc6703940c4618fc595a8249800a9ce
                                  • Opcode Fuzzy Hash: 50283b5171bd9d5fc91d6669d2bc0c5744c141261e7ef84fa7bdec8ef07a2aa8
                                  • Instruction Fuzzy Hash: D5C1311BD0D1E28AE61176FDF4A21EE3F609F422B970841B7D1ED49053DD0CA68BC6A6