Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ir_agent.exe

Overview

General Information

Sample name:ir_agent.exe
Analysis ID:1578549
MD5:cd4d0398199d42561ceb70c9e1ce76d7
SHA1:d87aa727958d5f94df0b31e88f131e359c2d9084
SHA256:7f9bfaa0b8f5ed6a9666c0a09ea9708dd6e555672edee3ac96fb424317a1aff2
Tags:exemetasploituser-smica83
Infos:

Detection

Metasploit
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Detected potential crypto function
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Yara signature match

Classification

  • System is w10x64
  • ir_agent.exe (PID: 5328 cmdline: "C:\Users\user\Desktop\ir_agent.exe" MD5: CD4D0398199D42561CEB70C9E1CE76D7)
    • conhost.exe (PID: 5072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"Type": "Metasploit Connect", "IP": "157.230.10.115", "Port": 443}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
    • 0xb1:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_91bc5d7dunknownunknown
    • 0x107:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "157.230.10.115", "Port": 443}
    Source: ir_agent.exeReversingLabs: Detection: 30%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: ir_agent.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
    Source: C:\Users\user\Desktop\ir_agent.exeCode function: 0_2_000001CEE1940106 LoadLibraryA,WSASocketA,connect,recv,0_2_000001CEE1940106
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707

    System Summary

    barindex
    Source: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
    Source: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
    Source: C:\Users\user\Desktop\ir_agent.exeCode function: 0_2_00007FF7663C9B400_2_00007FF7663C9B40
    Source: C:\Users\user\Desktop\ir_agent.exeCode function: 0_2_00007FF7663B14700_2_00007FF7663B1470
    Source: C:\Users\user\Desktop\ir_agent.exeCode function: 0_2_00007FF7663BEB200_2_00007FF7663BEB20
    Source: C:\Users\user\Desktop\ir_agent.exeCode function: 0_2_00007FF7663D72100_2_00007FF7663D7210
    Source: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
    Source: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
    Source: classification engineClassification label: mal76.troj.winEXE@2/0@0/1
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5072:120:WilError_03
    Source: ir_agent.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\ir_agent.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: ir_agent.exeReversingLabs: Detection: 30%
    Source: unknownProcess created: C:\Users\user\Desktop\ir_agent.exe "C:\Users\user\Desktop\ir_agent.exe"
    Source: C:\Users\user\Desktop\ir_agent.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\ir_agent.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\ir_agent.exeSection loaded: mswsock.dllJump to behavior
    Source: ir_agent.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: ir_agent.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: ir_agent.exeStatic PE information: section name: .text entropy: 6.961434007873607
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: ir_agent.exe, 00000000.00000002.3371501517.000001CEE0092000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@@}
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\ir_agent.exeCode function: 0_2_00007FF7663B1160 GetStartupInfoA,Sleep,Sleep,_initterm,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_cexit,0_2_00007FF7663B1160

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    Process Injection
    1
    Software Packing
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    12
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    System Information Discovery
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    ir_agent.exe31%ReversingLabsWin64.Exploit.Marte
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    157.230.10.115
    unknownUnited States
    14061DIGITALOCEAN-ASNUStrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1578549
    Start date and time:2024-12-19 21:52:06 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 55s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:ir_agent.exe
    Detection:MAL
    Classification:mal76.troj.winEXE@2/0@0/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 3
    • Number of non-executed functions: 9
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: ir_agent.exe
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    DIGITALOCEAN-ASNUShttps://track.samsupport.jmsend.com/z.z?l=aHR0cHM6Ly9zYW1zdXBwb3J0cy1jb20uam1haWxyb3V0ZS5uZXQveC91P3U9ZWJlNTI4YmMtYTNjMS00NjI0LWFmZjEtYzcwNDJmMjczZWIw&r=14771356625&d=20437066&p=1&t=h&h=40dfe9be3647ce867f619b07dd91c655Get hashmaliciousUnknownBrowse
    • 104.248.15.35
    arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 138.69.143.193
    mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 64.225.24.108
    mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 68.183.178.14
    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 134.123.5.235
    arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 165.22.66.232
    http://jonotarmot.com/dcs/ms_doc.htmlGet hashmaliciousHTMLPhisherBrowse
    • 134.209.237.210
    3.elfGet hashmaliciousUnknownBrowse
    • 157.245.194.19
    la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
    • 104.236.38.140
    loligang.ppc.elfGet hashmaliciousMiraiBrowse
    • 142.93.208.29
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (console) x86-64, for MS Windows
    Entropy (8bit):6.941575313496421
    TrID:
    • Win64 Executable Console (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:ir_agent.exe
    File size:172'544 bytes
    MD5:cd4d0398199d42561ceb70c9e1ce76d7
    SHA1:d87aa727958d5f94df0b31e88f131e359c2d9084
    SHA256:7f9bfaa0b8f5ed6a9666c0a09ea9708dd6e555672edee3ac96fb424317a1aff2
    SHA512:f79d4d93a984e7794ff7d95ecd6383cc4b3033fd6104fda54187b0d059ba2ffd75b26bfa7eb8fb25e1093060ecf495d96f76353e24ef5955f93d7781d7471cc4
    SSDEEP:3072:1Z8wQQ1w7+NmlcEm0SK4gRFVNrtu/T64fL6WT9t:UwA+NTD0SK4gRFVBtu/GTkt
    TLSH:E7F39C22E4EE4142FDD342727A6D87EFB612A7B78B1C74DB6064475402C6DED0DBA02B
    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....lbg.........."................. ..........@..........................................`........................................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x140001420
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x67626C10 [Wed Dec 18 06:30:40 2024 UTC]
    TLS Callbacks:0x40027c40, 0x1, 0x40027cc0, 0x1
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:402dab86678feded565fb47136ef1eff
    Instruction
    dec eax
    sub esp, 28h
    dec eax
    mov eax, dword ptr [00028BF5h]
    mov dword ptr [eax], 00000000h
    call 00007F3EE064A2FFh
    nop
    nop
    nop
    dec eax
    add esp, 28h
    ret
    nop
    dec eax
    sub esp, 28h
    call 00007F3EE067171Ch
    dec eax
    cmp eax, 01h
    sbb eax, eax
    dec eax
    add esp, 28h
    ret
    nop word ptr [eax+eax+00000000h]
    nop
    ret
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    inc ecx
    push edi
    inc ecx
    push esi
    inc ecx
    push ebp
    inc ecx
    push esp
    push esi
    push edi
    push ebp
    push ebx
    dec eax
    sub esp, 40h
    dec eax
    mov dword ptr [esp+30h], edx
    dec eax
    mov dword ptr [esp+28h], ecx
    mov eax, dword ptr [0002AEE8h]
    lea edx, dword ptr [eax-01h]
    imul edx, eax
    mov ecx, edx
    xor ecx, 546259B0h
    and ecx, edx
    and edx, 546259B0h
    xor edx, 50401900h
    xor edx, 042240B0h
    mov eax, edx
    and eax, ecx
    xor ecx, edx
    or ecx, eax
    xor ecx, C9F20F01h
    mov edi, ecx
    xor edi, 626FA94Eh
    xor ecx, 9D9056B1h
    mov eax, ecx
    and eax, E2448AF4h
    mov ebx, edi
    and ebx, 1DBB750Bh
    or ebx, eax
    mov eax, ebx
    xor eax, 1DBB750Bh
    mov ebp, ebx
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x2a4c80xdc.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2d0000x1a4.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x2f0000x7c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x2a1180x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x2a7a00x1f8.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x280f60x2820038dd3a2e26d979141f23a3d309576429False0.605833820093458data6.961434007873607IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x2a0000x10200x1200c43aae4258edfeee51e78faa067c381aFalse0.3285590277777778data4.513239420305925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x2c0000x44c0x4005933ec5af764be1cffa9389186812114False0.6337890625Matlab v4 mat-file (little endian) ^\257\207\373\255t\374VXR]\211\005/\006G\376\306G\376\305e\200>y\035s\006\177=\207t\351\352\345\376\340\347\323\376\376\376\022\207\356Z\217\366\342\372\336\022\022\022QAQB@Z!\300uZ\227@rZ\227@, numeric, rows 0, columns 05.382355071572988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x2d0000x1a40x2003ac07613c3e430ee20b028ab5793e6b5False0.5234375data3.844671298736754IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .tls0x2e0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .reloc0x2f0000x7c0x20020ad51a49fb91857d26db4cc7e6817bfFalse0.251953125data1.7038436532797745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    DLLImport
    api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc
    api-ms-win-crt-private-l1-1-0.dll__C_specific_handler, memcpy
    api-ms-win-crt-runtime-l1-1-0.dll__p___argc, __p___argv, __p___wargv, __p__acmdln, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_app_type, _set_invalid_parameter_handler, abort, exit, perror, signal
    api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfprintf, __stdio_common_vfwprintf, fwrite
    api-ms-win-crt-string-l1-1-0.dllstrlen, strncmp
    USER32.dllEnumWindows
    KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetLastError, GetStartupInfoA, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery
    api-ms-win-crt-math-l1-1-0.dll__setusermatherr
    api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron
    api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _tzset
    TimestampSource PortDest PortSource IPDest IP
    Dec 19, 2024 21:52:57.370867014 CET49707443192.168.2.6157.230.10.115
    Dec 19, 2024 21:52:57.370919943 CET44349707157.230.10.115192.168.2.6
    Dec 19, 2024 21:52:57.371001005 CET49707443192.168.2.6157.230.10.115

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:15:52:56
    Start date:19/12/2024
    Path:C:\Users\user\Desktop\ir_agent.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\ir_agent.exe"
    Imagebase:0x7ff7663b0000
    File size:172'544 bytes
    MD5 hash:CD4D0398199D42561CEB70C9E1CE76D7
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Yara matches:
    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
    • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
    Reputation:low
    Has exited:false

    Target ID:1
    Start time:15:52:56
    Start date:19/12/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff66e660000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:1.9%
      Dynamic/Decrypted Code Coverage:5.3%
      Signature Coverage:32.9%
      Total number of Nodes:170
      Total number of Limit Nodes:4
      execution_graph 2319 7ff7663d8804 2320 7ff7663d8811 EnterCriticalSection 2319->2320 2322 7ff7663d8914 2319->2322 2321 7ff7663d8907 LeaveCriticalSection 2320->2321 2327 7ff7663d882e 2320->2327 2321->2322 2323 7ff7663d8972 2322->2323 2324 7ff7663d8941 DeleteCriticalSection 2322->2324 2326 7ff7663d8930 free 2322->2326 2324->2323 2325 7ff7663d884d TlsGetValue GetLastError 2325->2327 2326->2324 2326->2326 2327->2321 2327->2325 2183 7ff7663b1420 2186 7ff7663b1160 2183->2186 2185 7ff7663b1436 2187 7ff7663b11b3 2186->2187 2188 7ff7663b11a8 GetStartupInfoA 2186->2188 2189 7ff7663b11f8 2187->2189 2190 7ff7663b11d8 2187->2190 2188->2187 2193 7ff7663b1210 2189->2193 2256 7ff7663d85d0 __acrt_iob_func 2189->2256 2190->2189 2191 7ff7663b11e0 Sleep 2190->2191 2191->2189 2191->2190 2194 7ff7663b1240 _initterm 2193->2194 2195 7ff7663b1259 2193->2195 2194->2195 2210 7ff7663d7d60 2195->2210 2199 7ff7663b12ab __p__acmdln 2203 7ff7663b12c6 malloc 2199->2203 2201 7ff7663b1352 2202 7ff7663b1360 strlen malloc memcpy 2201->2202 2202->2202 2204 7ff7663b1391 2202->2204 2203->2201 2205 7ff7663b1393 2203->2205 2204->2205 2225 7ff7663c9b40 2205->2225 2208 7ff7663b13fa 2208->2185 2209 7ff7663b13ef _cexit 2209->2208 2211 7ff7663b1283 SetUnhandledExceptionFilter _set_invalid_parameter_handler 2210->2211 2212 7ff7663d7d82 2210->2212 2224 7ff7663d7d50 2211->2224 2212->2211 2213 7ff7663d7e2d 2212->2213 2214 7ff7663d7f00 2212->2214 2215 7ff7663d7e36 2213->2215 2216 7ff7663d7e7d 2213->2216 2214->2216 2217 7ff7663d8060 2214->2217 2219 7ff7663d7f1d 2214->2219 2215->2216 2259 7ff7663d80a0 2215->2259 2216->2211 2222 7ff7663d7eca VirtualProtect 2216->2222 2218 7ff7663d8240 __acrt_iob_func 2217->2218 2221 7ff7663d8070 2218->2221 2274 7ff7663d8240 2219->2274 2222->2216 2224->2199 2226 7ff7663c9b5a 2225->2226 2227 7ff7663d6347 EnumWindows 2226->2227 2228 7ff7663d0555 VirtualAlloc 2226->2228 2229 7ff7663d3048 EnumWindows 2226->2229 2230 7ff7663d0a44 VirtualAlloc 2226->2230 2231 7ff7663d0be0 EnumWindows 2226->2231 2232 7ff7663d469c VirtualAlloc 2226->2232 2233 7ff7663d1258 VirtualAlloc 2226->2233 2234 7ff7663d6d3f VirtualFree 2226->2234 2235 7ff7663cbe5a VirtualAlloc 2226->2235 2236 7ff7663d70ed perror 2226->2236 2237 7ff7663d710f perror 2226->2237 2238 7ff7663cd085 EnumWindows 2226->2238 2239 7ff7663cdbc4 EnumWindows 2226->2239 2240 7ff7663ce04d VirtualAlloc 2226->2240 2241 7ff7663ce727 VirtualAlloc 2226->2241 2242 7ff7663cf339 VirtualAlloc 2226->2242 2243 7ff7663d6e21 perror 2226->2243 2244 7ff7663d6e43 perror 2226->2244 2245 7ff7663d6f6f perror 2226->2245 2246 7ff7663d6f91 VirtualFree perror 2226->2246 2247 7ff7663d6fc5 perror 2226->2247 2248 7ff7663b13d7 2226->2248 2249 7ff7663d1cc2 memcpy 2226->2249 2250 7ff7663d3acd memcpy 2226->2250 2251 7ff7663d3c82 memcpy 2226->2251 2252 7ff7663d3e1c memcpy 2226->2252 2253 7ff7663d56f7 memcpy 2226->2253 2254 7ff7663d5727 memcpy 2226->2254 2255 7ff7663ca475 memcpy 2226->2255 2227->2226 2228->2226 2229->2226 2230->2231 2231->2226 2232->2226 2233->2226 2234->2226 2235->2226 2236->2226 2237->2226 2238->2226 2239->2226 2240->2226 2241->2226 2242->2226 2243->2226 2244->2226 2245->2226 2246->2226 2247->2226 2248->2208 2248->2209 2249->2226 2250->2226 2251->2226 2252->2226 2253->2226 2254->2226 2255->2226 2278 7ff7663d89a0 __stdio_common_vfprintf 2256->2278 2258 7ff7663d85f3 2258->2193 2260 7ff7663d80c2 2259->2260 2261 7ff7663d8103 memcpy 2260->2261 2263 7ff7663d81f2 2260->2263 2264 7ff7663d811c 2260->2264 2261->2215 2265 7ff7663d8240 __acrt_iob_func 2263->2265 2267 7ff7663d8143 VirtualQuery 2264->2267 2266 7ff7663d8201 2265->2266 2268 7ff7663d8240 __acrt_iob_func 2266->2268 2267->2266 2272 7ff7663d816f 2267->2272 2269 7ff7663d8220 GetLastError 2268->2269 2271 7ff7663d8240 __acrt_iob_func 2269->2271 2270 7ff7663d81a1 VirtualProtect 2270->2261 2270->2269 2273 7ff7663d8234 2271->2273 2272->2261 2272->2270 2275 7ff7663d826b 2274->2275 2276 7ff7663d8285 __acrt_iob_func 2275->2276 2277 7ff7663d829f 2276->2277 2277->2217 2278->2258 2328 7ff7663b1000 2329 7ff7663b108d _set_app_type __p__fmode __p__commode 2328->2329 2331 7ff7663b1040 2328->2331 2330 7ff7663b10cf 2329->2330 2332 7ff7663b10e7 2330->2332 2334 7ff7663d82f0 2330->2334 2331->2329 2335 7ff7663d8f40 __setusermatherr 2334->2335 2336 7ff7663b1140 2337 7ff7663b1160 48 API calls 2336->2337 2338 7ff7663b1156 2337->2338 2290 7ff7663d8520 2291 7ff7663d8541 2290->2291 2292 7ff7663d8551 __p___argc 2291->2292 2293 7ff7663d855f 2292->2293 2294 7ff7663d8575 _set_new_mode 2293->2294 2295 7ff7663d857d 2293->2295 2294->2295 2339 7ff7663d8300 2340 7ff7663d831f 2339->2340 2341 7ff7663d83a7 2340->2341 2342 7ff7663d83be 2340->2342 2345 7ff7663d8345 2340->2345 2342->2341 2343 7ff7663d83c5 signal 2342->2343 2343->2341 2344 7ff7663d83d6 2343->2344 2344->2341 2346 7ff7663d83dc signal 2344->2346 2345->2341 2347 7ff7663d8404 signal 2345->2347 2346->2341 2347->2341 2296 7ff7663d7ce0 2297 7ff7663d7cf3 __acrt_iob_func 2296->2297 2301 7ff7663d89a0 __stdio_common_vfprintf 2297->2301 2300 7ff7663d7d40 2301->2300 2348 7ff7663d7f40 2349 7ff7663d7f4d 2348->2349 2352 7ff7663d7e7d 2348->2352 2351 7ff7663d8240 __acrt_iob_func 2349->2351 2350 7ff7663d7eef 2354 7ff7663d8060 2351->2354 2352->2350 2353 7ff7663d7eca VirtualProtect 2352->2353 2353->2352 2355 7ff7663d8240 __acrt_iob_func 2354->2355 2356 7ff7663d8070 2355->2356 2279 1cee1940000 2280 1cee1940029 2279->2280 2283 1cee1940106 2280->2283 2284 1cee194012b LoadLibraryA 2283->2284 2288 1cee194014b 2283->2288 2284->2288 2285 1cee194016e connect 2286 1cee194018e recv 2285->2286 2285->2288 2286->2288 2287 1cee194014f WSASocketA 2287->2288 2288->2285 2288->2286 2288->2287 2289 1cee194021e 2288->2289 2302 7ff7663d8357 signal 2303 7ff7663d836e 2302->2303 2305 7ff7663d838b 2302->2305 2304 7ff7663d8374 signal 2303->2304 2303->2305 2304->2305 2306 7ff7663d889a 2307 7ff7663d8972 2306->2307 2308 7ff7663d88a7 EnterCriticalSection 2306->2308 2309 7ff7663d8965 LeaveCriticalSection 2308->2309 2311 7ff7663d88c4 2308->2311 2309->2307 2310 7ff7663d88e9 TlsGetValue GetLastError 2310->2311 2311->2309 2311->2310 2312 7ff7663d85b0 2313 7ff7663d85bf _crt_at_quick_exit 2312->2313 2314 7ff7663d85bc 2312->2314 2357 7ff7663d8a50 strlen 2358 7ff7663d8a67 2357->2358 2359 7ff7663d8650 2360 7ff7663d865d __tzname __timezone __daylight 2359->2360 2361 7ff7663d8750 2362 7ff7663d875f EnterCriticalSection 2361->2362 2363 7ff7663d87cd 2361->2363 2364 7ff7663d87c0 LeaveCriticalSection 2362->2364 2365 7ff7663d877a 2362->2365 2364->2363 2365->2364 2366 7ff7663d87bb free 2365->2366 2366->2364 2367 7ff7663d86d0 2368 7ff7663d86e4 2367->2368 2369 7ff7663d8733 2367->2369 2368->2369 2370 7ff7663d86fd EnterCriticalSection LeaveCriticalSection 2368->2370 2370->2369 2316 7ff7663d886b 2317 7ff7663d8874 InitializeCriticalSection 2316->2317 2318 7ff7663d8881 2316->2318 2317->2318

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_00007FF7663B1160 5 Function_00007FF7663D7D60 0->5 46 Function_00007FF7663C9B40 0->46 50 Function_00007FF7663D7BC0 0->50 57 Function_00007FF7663D85D0 0->57 59 Function_00007FF7663D7D50 0->59 1 Function_00007FF7663D87E0 2 Function_00007FF7663D8AE0 3 Function_00007FF7663D89E0 4 Function_00007FF7663D7CE0 33 Function_00007FF7663D89A0 4->33 18 Function_00007FF7663D8478 5->18 34 Function_00007FF7663D80A0 5->34 44 Function_00007FF7663D8240 5->44 54 Function_00007FF7663D8B50 5->54 6 Function_00007FF7663D7B60 7 Function_00007FF7663D8357 7->59 8 Function_00007FF7663B1470 9 Function_00007FF7663B10F0 38 Function_00007FF7663D84B0 9->38 10 Function_00007FF7663D82F0 11 Function_00007FF7663D886B 12 Function_00007FF7663D8984 13 Function_00007FF7663D8804 14 Function_00007FF7663B1000 14->10 39 Function_00007FF7663D7C30 14->39 15 Function_00007FF7663D8C00 16 Function_00007FF7663D8300 17 Function_00007FF7663D8600 19 Function_00007FF7663D8477 20 Function_00007FF7663D8993 21 Function_00007FF7663D8A10 22 Function_00007FF7663D8610 23 Function_00007FF7663D8890 23->59 24 Function_00007FF7663D8690 25 Function_00007FF7663D8590 26 Function_00007FF7663D8D90 27 Function_00007FF7663D8B90 28 Function_00007FF7663D7210 29 Function_00007FF7663D7B10 30 Function_00007FF7663BEB20 30->18 31 Function_00007FF7663B1420 31->0 32 Function_00007FF7663D8520 34->2 34->15 34->44 35 Function_00007FF7663D889A 36 Function_00007FF7663D8C30 37 Function_00007FF7663D85B0 40 Function_00007FF7663D7CB0 41 Function_000001CEE1940002 42 Function_00007FF7663B1440 42->25 43 Function_00007FF7663B1140 43->0 44->26 45 Function_00007FF7663D8CC0 46->8 46->30 46->50 47 Function_00007FF7663D7C40 47->1 48 Function_00007FF7663D7F40 48->44 49 Function_00007FF7663D7CC0 49->1 51 Function_000001CEE1940000 51->41 52 Function_000001CEE1940106 51->52 53 Function_00007FF7663D8A50 55 Function_00007FF7663D8650 56 Function_00007FF7663D8750 57->33 58 Function_00007FF7663D86D0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID:
      • String ID: ,y*$-y*$-y*$-y*$9T e$:T e$:T e$:h=_$;h=_$;h=_$;h=_$;h=_$N$pQ$N$pQ$N$pQ$N$pQ$VirtualAlloc failed.$`gW$agW$agW$agW$agW$gc$gc$gc$gc$hello$x Z`$y Z`$y Z`$y Z`$yLe$yLe$yLe$yLe
      • API String ID: 0-794395507
      • Opcode ID: 1e7c9471f0dbb0ca7f7801cdeb3f2fbc0a84233fd8707e9bd0e65227a31fc825
      • Instruction ID: 013e90048f0466098afbf9f8f3f311d803e15962749f98536a44a0920766ce88
      • Opcode Fuzzy Hash: 1e7c9471f0dbb0ca7f7801cdeb3f2fbc0a84233fd8707e9bd0e65227a31fc825
      • Instruction Fuzzy Hash: DE341767BA56025BFF0CC9768CE23FB47C357E1314F6AE43E9506CB296DC6E980A5600

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 728 7ff7663b1160-7ff7663b11a6 729 7ff7663b11b3-7ff7663b11d1 728->729 730 7ff7663b11a8-7ff7663b11ad GetStartupInfoA 728->730 731 7ff7663b11d3-7ff7663b11d6 729->731 732 7ff7663b11f8-7ff7663b1204 729->732 730->729 731->732 733 7ff7663b11d8-7ff7663b11df 731->733 734 7ff7663b1212-7ff7663b1215 732->734 735 7ff7663b1206-7ff7663b1210 call 7ff7663d85d0 732->735 736 7ff7663b11e0-7ff7663b11f1 Sleep 733->736 738 7ff7663b1220-7ff7663b1234 call 7ff7663d8e10 734->738 739 7ff7663b1217-7ff7663b121e 734->739 742 7ff7663b1239-7ff7663b123e 735->742 736->732 740 7ff7663b11f3-7ff7663b11f6 736->740 738->742 739->742 740->732 740->736 744 7ff7663b1240-7ff7663b1253 _initterm 742->744 745 7ff7663b1259-7ff7663b125c 742->745 744->745 746 7ff7663b1263-7ff7663b1270 745->746 747 7ff7663b125e-7ff7663b1260 745->747 748 7ff7663b1272-7ff7663b1279 746->748 749 7ff7663b127e-7ff7663b12c4 call 7ff7663d7d60 SetUnhandledExceptionFilter _set_invalid_parameter_handler call 7ff7663d7d50 __p__acmdln 746->749 747->746 748->749 754 7ff7663b12c6-7ff7663b12c8 749->754 755 7ff7663b1318-7ff7663b131c 749->755 758 7ff7663b12e1-7ff7663b12e7 754->758 756 7ff7663b1336-7ff7663b1350 malloc 755->756 757 7ff7663b131e-7ff7663b1330 755->757 759 7ff7663b1352-7ff7663b135e 756->759 760 7ff7663b1393 756->760 757->756 761 7ff7663b12d0-7ff7663b12dd 758->761 762 7ff7663b12e9-7ff7663b12eb 758->762 763 7ff7663b1360-7ff7663b138f strlen malloc memcpy 759->763 764 7ff7663b1396-7ff7663b13d2 call 7ff7663d7bc0 call 7ff7663c9b40 760->764 761->758 765 7ff7663b12f1-7ff7663b12f3 762->765 766 7ff7663b12ed-7ff7663b12ef 762->766 763->763 769 7ff7663b1391 763->769 775 7ff7663b13d7-7ff7663b13e4 764->775 767 7ff7663b1311 765->767 768 7ff7663b12f5-7ff7663b12f8 765->768 766->761 766->765 767->755 768->767 771 7ff7663b12fa 768->771 769->764 773 7ff7663b1300-7ff7663b130a 771->773 773->767 776 7ff7663b130c-7ff7663b130f 773->776 777 7ff7663b13e6-7ff7663b13ed 775->777 778 7ff7663b1409-7ff7663b141b call 7ff7663d8e30 775->778 776->767 776->773 779 7ff7663b13ef-7ff7663b13f4 _cexit 777->779 780 7ff7663b13fa-7ff7663b1408 777->780 779->780
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID: ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_initterm_set_invalid_parameter_handlermallocstrlen
      • String ID:
      • API String ID: 1440079864-0
      • Opcode ID: 4b6afe1622947642599635d667c25a7f36dc70ee44e0ebee895ef452f5bf3ac0
      • Instruction ID: 333f11914bff9ba473f634f3de92fab9ab86e44dff8ac5c9cfaeab4473ef1cd5
      • Opcode Fuzzy Hash: 4b6afe1622947642599635d667c25a7f36dc70ee44e0ebee895ef452f5bf3ac0
      • Instruction Fuzzy Hash: 5E817A31A18646C6FB50AB16EC553BBB3A4BF55780FC44039DA4D4B3A1EE3DA4858F20

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 783 1cee1940106-1cee1940129 784 1cee194012b-1cee1940144 LoadLibraryA 783->784 785 1cee194016c 783->785 789 1cee194014b-1cee194014e 784->789 786 1cee194016e-1cee1940182 connect 785->786 787 1cee1940184-1cee1940187 786->787 788 1cee194018e-1cee19401aa recv 786->788 787->786 791 1cee1940189 call 1cee1940221 787->791 792 1cee1940201-1cee194020e 788->792 793 1cee19401ac-1cee19401d0 788->793 790 1cee194014f-1cee194016b WSASocketA 789->790 790->785 791->788 792->790 797 1cee19401d2-1cee19401e9 793->797 799 1cee1940213-1cee194021c 797->799 800 1cee19401eb-1cee19401fa 797->800 799->797 801 1cee194021e 799->801 800->792
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3371564308.000001CEE1940000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001CEE1940000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1cee1940000_ir_agent.jbxd
      Yara matches
      Similarity
      • API ID: LibraryLoadSocketconnectrecv
      • String ID: unMa$ws2_
      • API String ID: 1878761123-4254217991
      • Opcode ID: 93e75f6fbe97199e94d9654cc7725bc5ccbcd96fdde9d6e9681b12e1da60a1aa
      • Instruction ID: 246da50e393cbc08ca41ab926eacea89431a8932e8587a931f03da8d7b2f5321
      • Opcode Fuzzy Hash: 93e75f6fbe97199e94d9654cc7725bc5ccbcd96fdde9d6e9681b12e1da60a1aa
      • Instruction Fuzzy Hash: 7831C43179C94C1BF51C61AC381B7BA22C5D799765F24902FEA8EC72D7DC91DCC2009A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID:
      • String ID: !/#Z$!/#Z$!/#Z$!/#Z$!/#Z$(xi5$(xi5$(xi5$(xi5$N*$N*$N*$_^p $`^p $`^p $`^p $`^p $`^p $&$&$&$&$X~X$X~X$X~X$X~X$X~X
      • API String ID: 0-3373861532
      • Opcode ID: e8c84c2f836ae9d65415f46c7b5a9fa1ee193bb97d20fd3b038d161d3f9945cd
      • Instruction ID: 0cef538b6d32c65695855966a0774084542f0e163ecdc8fc9aa54efe91656240
      • Opcode Fuzzy Hash: e8c84c2f836ae9d65415f46c7b5a9fa1ee193bb97d20fd3b038d161d3f9945cd
      • Instruction Fuzzy Hash: D4144C67B656024BEF0CC8769CE23EB47C357E1319F6EF83E8506CB296DC6D984A5600
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID:
      • String ID: 4kjw$5kjw$5kjw$5kjw$5kjw$Am+B$Am+B$Am+B$Am+B$V54{$W54{$W54{$W54{$W54{$Z4g$[4g$[4g$[4g$g3Z$g3Z$g3Z
      • API String ID: 0-720021071
      • Opcode ID: e1e26168663148318e590f6a5155feee3c0f743b2b27dff16389282e8659ea4a
      • Instruction ID: 3f76400c1f4d26b3923ca062e3a9e2a37a5818e2899b88613a53e8ef83098e31
      • Opcode Fuzzy Hash: e1e26168663148318e590f6a5155feee3c0f743b2b27dff16389282e8659ea4a
      • Instruction Fuzzy Hash: 96D35B3BF659120BAF1CC8368CA23E757C357E235DF9AE43E8906CB295DC6D9C0A4650

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1915 7ff7663d7210-7ff7663d7b0a
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID:
      • String ID: hello$led.
      • API String ID: 0-2662902654
      • Opcode ID: a70da185b58789d06846d9223f4d54dc99da49c1e8695857b5f81c921619d86f
      • Instruction ID: d17008036f81a2e0fda3c36668691cad0e18249d3c7ca9cb50bc4f802dcb0983
      • Opcode Fuzzy Hash: a70da185b58789d06846d9223f4d54dc99da49c1e8695857b5f81c921619d86f
      • Instruction Fuzzy Hash: 1832FB4BBB56611BFF0546769CE27D70B8383B3339F61BB258A20972E3D61E450FA604

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1752 7ff7663d80a0-7ff7663d80c0 1753 7ff7663d80c2-7ff7663d80d7 1752->1753 1754 7ff7663d8108 1752->1754 1755 7ff7663d80e9-7ff7663d80f1 1753->1755 1756 7ff7663d810b-7ff7663d8116 call 7ff7663d8ae0 1754->1756 1757 7ff7663d80f3-7ff7663d8101 1755->1757 1758 7ff7663d80e0-7ff7663d80e7 1755->1758 1763 7ff7663d81f2-7ff7663d81fc call 7ff7663d8240 1756->1763 1764 7ff7663d811c-7ff7663d8169 call 7ff7663d8c00 VirtualQuery 1756->1764 1757->1758 1760 7ff7663d8103 1757->1760 1758->1755 1758->1756 1762 7ff7663d81d5-7ff7663d81f1 memcpy 1760->1762 1767 7ff7663d8201-7ff7663d821b call 7ff7663d8240 1763->1767 1764->1767 1770 7ff7663d816f-7ff7663d8176 1764->1770 1771 7ff7663d8220-7ff7663d823f GetLastError call 7ff7663d8240 1767->1771 1772 7ff7663d818b-7ff7663d8194 1770->1772 1773 7ff7663d8178-7ff7663d817b 1770->1773 1774 7ff7663d8196-7ff7663d8199 1772->1774 1775 7ff7663d81a1-7ff7663d81cc VirtualProtect 1772->1775 1777 7ff7663d81ce 1773->1777 1778 7ff7663d817d-7ff7663d8180 1773->1778 1774->1777 1779 7ff7663d819b 1774->1779 1775->1771 1775->1777 1777->1762 1778->1777 1781 7ff7663d8182-7ff7663d8187 1778->1781 1779->1775 1781->1777 1782 7ff7663d8189 1781->1782 1782->1779
      APIs
      • VirtualQuery.KERNEL32(?,?,?,?,00007FF7663DA440,00007FF7663B0000,?,?,00007FF7663DA440,00007FF7663DC3A8,00007FF7663D7E70), ref: 00007FF7663D8160
      • VirtualProtect.KERNEL32(?,?,?,?,00007FF7663DA440,00007FF7663B0000,?,?,00007FF7663DA440,00007FF7663DC3A8,00007FF7663D7E70), ref: 00007FF7663D81C4
      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,00007FF7663DA440,00007FF7663B0000,?,?,00007FF7663DA440,00007FF7663DC3A8,00007FF7663D7E70), ref: 00007FF7663D81DE
      • GetLastError.KERNEL32(?,?,?,?,00007FF7663DA440,00007FF7663B0000,?,?,00007FF7663DA440,00007FF7663DC3A8,00007FF7663D7E70), ref: 00007FF7663D8220
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID: Virtual$ErrorLastProtectQuerymemcpy
      • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
      • API String ID: 2595394609-2123141913
      • Opcode ID: 4c96dd0307677471bf7d4573c15e9d6f45584a975e30a666d6e5e77ec1f961a2
      • Instruction ID: 7a20751cf3b9ae7a2c5a1ccbc872c752d766346a149b18e7aa4e3db7dba8cce3
      • Opcode Fuzzy Hash: 4c96dd0307677471bf7d4573c15e9d6f45584a975e30a666d6e5e77ec1f961a2
      • Instruction Fuzzy Hash: 86419221A08A06E2EA11AB07DC8067AA7A1FF45BC4FD45539DF0E4B7A0DE3CF545CB20

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1783 7ff7663d8804-7ff7663d880b 1784 7ff7663d8914-7ff7663d891d 1783->1784 1785 7ff7663d8811-7ff7663d8828 EnterCriticalSection 1783->1785 1788 7ff7663d891f-7ff7663d8929 1784->1788 1789 7ff7663d8972-7ff7663d8980 1784->1789 1786 7ff7663d882e-7ff7663d883c 1785->1786 1787 7ff7663d8907-7ff7663d890e LeaveCriticalSection 1785->1787 1792 7ff7663d884d-7ff7663d8859 TlsGetValue GetLastError 1786->1792 1787->1784 1790 7ff7663d8941-7ff7663d8963 DeleteCriticalSection 1788->1790 1791 7ff7663d892b 1788->1791 1790->1789 1793 7ff7663d8930-7ff7663d893f free 1791->1793 1794 7ff7663d8840-7ff7663d8847 1792->1794 1795 7ff7663d885b-7ff7663d885e 1792->1795 1793->1790 1793->1793 1794->1787 1794->1792 1795->1794 1796 7ff7663d8860-7ff7663d8869 1795->1796 1796->1794
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID: CriticalSection$DeleteEnterErrorLastLeaveValuefree
      • String ID:
      • API String ID: 3326252324-0
      • Opcode ID: 68c704ad3dd1c0f8d4001480edbf5823d2208a1f3ebf3a3a0b5904148d9e2fe6
      • Instruction ID: e416b757bf81969e3526eed410e24961cf235553d5c0d2694f0db9e96c7c9c05
      • Opcode Fuzzy Hash: 68c704ad3dd1c0f8d4001480edbf5823d2208a1f3ebf3a3a0b5904148d9e2fe6
      • Instruction Fuzzy Hash: 04213621E19642D2FA56BB17ED0027AA264BF00B94FC45438CB9D4F6A0CF3DB9468B31

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1798 7ff7663d8300-7ff7663d831d 1799 7ff7663d831f-7ff7663d8328 1798->1799 1800 7ff7663d832e-7ff7663d8338 1798->1800 1799->1800 1801 7ff7663d8440-7ff7663d8449 1799->1801 1802 7ff7663d8395-7ff7663d839a 1800->1802 1803 7ff7663d833a-7ff7663d8343 1800->1803 1802->1801 1806 7ff7663d83a0-7ff7663d83a5 1802->1806 1804 7ff7663d8345-7ff7663d8352 1803->1804 1805 7ff7663d83be-7ff7663d83c3 1803->1805 1804->1802 1807 7ff7663d8415-7ff7663d841f 1805->1807 1808 7ff7663d83c5-7ff7663d83d4 signal 1805->1808 1809 7ff7663d83ed-7ff7663d83fc call 7ff7663d8f50 1806->1809 1810 7ff7663d83a7-7ff7663d83ac 1806->1810 1812 7ff7663d8421-7ff7663d842a 1807->1812 1813 7ff7663d842e-7ff7663d8430 1807->1813 1808->1807 1811 7ff7663d83d6-7ff7663d83da 1808->1811 1809->1807 1820 7ff7663d83fe-7ff7663d8402 1809->1820 1810->1801 1815 7ff7663d83b2 1810->1815 1816 7ff7663d8432-7ff7663d8437 1811->1816 1817 7ff7663d83dc-7ff7663d83eb signal 1811->1817 1819 7ff7663d843e 1812->1819 1813->1801 1815->1807 1816->1819 1817->1801 1819->1801 1821 7ff7663d8404-7ff7663d8413 signal 1820->1821 1822 7ff7663d8439 1820->1822 1821->1801 1821->1807 1822->1819
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID:
      • String ID: CCG
      • API String ID: 0-1584390748
      • Opcode ID: 88e395ba40396330d1131c5c5ded0dd543709f822e94d952894312f2200e7fa1
      • Instruction ID: 42f27c376427febe81bac7c9ea1317b677d8da55316bd0a579261938802b7620
      • Opcode Fuzzy Hash: 88e395ba40396330d1131c5c5ded0dd543709f822e94d952894312f2200e7fa1
      • Instruction Fuzzy Hash: 2321C421E09102E5FA75762B9D8037B91AA9F84364FD9A53DCB1D4F3C8CD7CB8818A21

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1823 7ff7663d7d60-7ff7663d7d7c 1824 7ff7663d7eef-7ff7663d7eff 1823->1824 1825 7ff7663d7d82-7ff7663d7dd9 call 7ff7663d8b50 call 7ff7663d8478 1823->1825 1825->1824 1830 7ff7663d7ddf-7ff7663d7df0 1825->1830 1831 7ff7663d7df2-7ff7663d7dfc 1830->1831 1832 7ff7663d7e1e-7ff7663d7e21 1830->1832 1831->1832 1833 7ff7663d7dfe-7ff7663d7e09 1831->1833 1834 7ff7663d7e23-7ff7663d7e27 1832->1834 1835 7ff7663d7e2d-7ff7663d7e34 1832->1835 1833->1832 1836 7ff7663d7e0b-7ff7663d7e1a 1833->1836 1834->1835 1837 7ff7663d7f00-7ff7663d7f06 1834->1837 1838 7ff7663d7e36-7ff7663d7e4b 1835->1838 1839 7ff7663d7e7d-7ff7663d7e85 1835->1839 1836->1832 1841 7ff7663d8060-7ff7663d8074 call 7ff7663d8240 1837->1841 1842 7ff7663d7f0c-7ff7663d7f17 1837->1842 1843 7ff7663d7e50-7ff7663d7e7b call 7ff7663d80a0 1838->1843 1839->1824 1840 7ff7663d7e87-7ff7663d7ea0 1839->1840 1845 7ff7663d7ec0-7ff7663d7ec8 1840->1845 1842->1839 1846 7ff7663d7f1d-7ff7663d7f5c 1842->1846 1843->1839 1850 7ff7663d7eb0-7ff7663d7ebe 1845->1850 1851 7ff7663d7eca-7ff7663d7eed VirtualProtect 1845->1851 1853 7ff7663d7f62-7ff7663d7f72 1846->1853 1854 7ff7663d804d-7ff7663d805b call 7ff7663d8240 1846->1854 1850->1824 1850->1845 1851->1850 1853->1854 1854->1841
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID: ProtectVirtual
      • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
      • API String ID: 544645111-395989641
      • Opcode ID: b4a2eae29bc173e675d6e0a8e8b1ea6990511dfd5cf0cd62a474e4506587a552
      • Instruction ID: 47ec6d4090ea21286fa78e60b5bb97b4da5d611d2c6a5d2486261e09ef018aaf
      • Opcode Fuzzy Hash: b4a2eae29bc173e675d6e0a8e8b1ea6990511dfd5cf0cd62a474e4506587a552
      • Instruction Fuzzy Hash: 9F515E32E18546D6EB10AB27ED442A6A771BB04B98FC49539DB1D0B394DF3CF895CB20

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1856 7ff7663d7ce0-7ff7663d7cf1 1857 7ff7663d7cf3-7ff7663d7d03 1856->1857 1858 7ff7663d7d05 1856->1858 1859 7ff7663d7d0c-7ff7663d7d48 __acrt_iob_func call 7ff7663d89a0 1857->1859 1858->1859
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID: __acrt_iob_func
      • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 711238415-3474627141
      • Opcode ID: 2ea4d4530f7d64d5ea15161a4ae9074779ffd08bb0ec3cbddf6a00c773bda00b
      • Instruction ID: b245a4e2b92eda740dd0dd55cbc0eff781916323c18ba5bf30e4316a4a8cc8f1
      • Opcode Fuzzy Hash: 2ea4d4530f7d64d5ea15161a4ae9074779ffd08bb0ec3cbddf6a00c773bda00b
      • Instruction Fuzzy Hash: D5F0A912908A45C2D211AB26EE411BAA360EF45394FD05235DF4D5A191DF2CF141CB10

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1862 7ff7663d889a-7ff7663d88a1 1863 7ff7663d8972-7ff7663d8980 1862->1863 1864 7ff7663d88a7-7ff7663d88be EnterCriticalSection 1862->1864 1865 7ff7663d88c4-7ff7663d88d2 1864->1865 1866 7ff7663d8965-7ff7663d896c LeaveCriticalSection 1864->1866 1867 7ff7663d88e9-7ff7663d88f5 TlsGetValue GetLastError 1865->1867 1866->1863 1868 7ff7663d88e0-7ff7663d88e7 1867->1868 1869 7ff7663d88f7-7ff7663d88fa 1867->1869 1868->1866 1868->1867 1869->1868 1870 7ff7663d88fc-7ff7663d8905 1869->1870 1870->1868
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3371592803.00007FF7663B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7663B0000, based on PE: true
      • Associated: 00000000.00000002.3371578363.00007FF7663B0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371615815.00007FF7663DA000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371630036.00007FF7663DC000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371643996.00007FF7663DD000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3371658150.00007FF7663DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff7663b0000_ir_agent.jbxd
      Similarity
      • API ID: CriticalSection$EnterErrorLastLeaveValue
      • String ID:
      • API String ID: 682475483-0
      • Opcode ID: 546426dbb452c8f8101a821079127824253e0cb46b92eed415089ee64f9eb5c0
      • Instruction ID: bdeedfae1d99a99a5dc63e6d1d0b8b8981f041fede5de4e240106fe0c35e9670
      • Opcode Fuzzy Hash: 546426dbb452c8f8101a821079127824253e0cb46b92eed415089ee64f9eb5c0
      • Instruction Fuzzy Hash: DC014B21E09642D2F606BB13EE0027A9264BF04BD0FC55439CF4D0BAA0DF3DF9969A21