Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
td7aCkwbmN.exe

Overview

General Information

Sample name:td7aCkwbmN.exe
renamed because original name is a hash value
Original sample name:04277f82a0458b2a1faf76102fbeb254.exe
Analysis ID:1580884
MD5:04277f82a0458b2a1faf76102fbeb254
SHA1:128b1abb7e42b5f7b20fe947b0711ae92f13a2e3
SHA256:f65d628ba3957335300a2d68668ba82f8af231e103ee991a5775cf50b45598a8
Tags:exeuser-abuse_ch
Infos:

Detection

Phorpiex
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Phorpiex
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for dropped file
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • td7aCkwbmN.exe (PID: 6356 cmdline: "C:\Users\user\Desktop\td7aCkwbmN.exe" MD5: 04277F82A0458B2A1FAF76102FBEB254)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
td7aCkwbmN.exeJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
    SourceRuleDescriptionAuthorStrings
    0.0.td7aCkwbmN.exe.670000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
      0.2.td7aCkwbmN.exe.670000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeReversingLabs: Detection: 68%
        Source: td7aCkwbmN.exeReversingLabs: Detection: 47%
        Source: td7aCkwbmN.exeVirustotal: Detection: 37%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.4% probability
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeJoe Sandbox ML: detected

        Phishing

        barindex
        Source: Yara matchFile source: td7aCkwbmN.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.td7aCkwbmN.exe.670000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.td7aCkwbmN.exe.670000.0.unpack, type: UNPACKEDPE
        Source: td7aCkwbmN.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: td7aCkwbmN.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb" source: td7aCkwbmN.exe, 00000000.00000002.4022006249.000000000A461000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: ntkrnlmp.pdbx6 source: td7aCkwbmN.exe, 00000000.00000002.3968856489.0000000009644000.00000004.00000020.00020000.00000000.sdmp, td7aCkwbmN.exe, 00000000.00000002.4022006249.000000000A461000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb= source: td7aCkwbmN.exe, 00000000.00000002.3968856489.0000000009644000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeCode function: 0_2_006728D0 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_006728D0
        Source: integrator.exe.0.drString found in binary or memory: http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte
        Source: VC_redist.x64.exe.0.drString found in binary or memory: http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
        Source: integrator.exe.0.drString found in binary or memory: https://nexus.officeapps.live.comhttps://nexusrules.officeapps.live.com
        Source: integrator.exe.0.drString found in binary or memory: https://otelrules.azureedge.net/rules/.bundlesdxhelper.exeFailed
        Source: integrator.exe.0.drBinary or memory string: RegisterRawInputDevicesmemstr_94f5100e-2

        Spam, unwanted Advertisements and Ransom Demands

        barindex
        Source: Yara matchFile source: td7aCkwbmN.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.td7aCkwbmN.exe.670000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.td7aCkwbmN.exe.670000.0.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeProcess Stats: CPU usage > 49%
        Source: td7aCkwbmN.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: classification engineClassification label: mal84.troj.evad.winEXE@1/3@0/0
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeMutant created: \Sessions\1\BaseNamedObjects\6436646754
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeCommand line argument: 64366467540_2_00671000
        Source: td7aCkwbmN.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: integrator.exe.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
        Source: integrator.exe.0.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: td7aCkwbmN.exeReversingLabs: Detection: 47%
        Source: td7aCkwbmN.exeVirustotal: Detection: 37%
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: td7aCkwbmN.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb" source: td7aCkwbmN.exe, 00000000.00000002.4022006249.000000000A461000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: ntkrnlmp.pdbx6 source: td7aCkwbmN.exe, 00000000.00000002.3968856489.0000000009644000.00000004.00000020.00020000.00000000.sdmp, td7aCkwbmN.exe, 00000000.00000002.4022006249.000000000A461000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb= source: td7aCkwbmN.exe, 00000000.00000002.3968856489.0000000009644000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: td7aCkwbmN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: td7aCkwbmN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: td7aCkwbmN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: td7aCkwbmN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: td7aCkwbmN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: initial sampleStatic PE information: section where entry point is pointing to: .zero
        Source: integrator.exe.0.drStatic PE information: section name: .zero
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .wixburn
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .zero
        Source: chrome.exe.0.drStatic PE information: section name: .zero
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeCode function: 0_2_00673231 push ecx; ret 0_2_00673244
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeFile created: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeWindow / User API: threadDelayed 8192Jump to behavior
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeDropped PE file which has not been started: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeDropped PE file which has not been started: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\td7aCkwbmN.exe TID: 4540Thread sleep count: 8192 > 30Jump to behavior
        Source: C:\Users\user\Desktop\td7aCkwbmN.exe TID: 4540Thread sleep time: -1769472000000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\td7aCkwbmN.exe TID: 4540Thread sleep count: 73 > 30Jump to behavior
        Source: C:\Users\user\Desktop\td7aCkwbmN.exe TID: 4540Thread sleep time: -15768000000s >= -30000sJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeCode function: 0_2_006728D0 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_006728D0
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeThread delayed: delay time: 216000000Jump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeProcess Stats: CPU usage > 42% for more than 60s
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeCode function: 0_2_00673368 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00673368
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeCode function: 0_2_00671D10 mov eax, dword ptr fs:[00000030h]0_2_00671D10
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeCode function: 0_2_00673368 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00673368
        Source: C:\Users\user\Desktop\td7aCkwbmN.exeCode function: 0_2_00673298 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00673298

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: td7aCkwbmN.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.td7aCkwbmN.exe.670000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.td7aCkwbmN.exe.670000.0.unpack, type: UNPACKEDPE
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        122
        Virtualization/Sandbox Evasion
        11
        Input Capture
        1
        System Time Discovery
        Remote Services11
        Input Capture
        Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        DLL Side-Loading
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Obfuscated Files or Information
        Security Account Manager122
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        td7aCkwbmN.exe47%ReversingLabsWin32.Ransomware.GandCrab
        td7aCkwbmN.exe38%VirustotalBrowse
        SourceDetectionScannerLabelLink
        C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%AviraW32/Infector.Gen
        C:\Users\user\AppData\Local\Temp\chrome.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe68%ReversingLabsWin32.Ransomware.GandCrab
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporteintegrator.exe.0.drfalse
          high
          http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgorVC_redist.x64.exe.0.drfalse
            high
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1580884
            Start date and time:2024-12-26 12:50:57 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 42s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Sample name:td7aCkwbmN.exe
            renamed because original name is a hash value
            Original Sample Name:04277f82a0458b2a1faf76102fbeb254.exe
            Detection:MAL
            Classification:mal84.troj.evad.winEXE@1/3@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 7
            • Number of non-executed functions: 1
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56, 172.202.163.200
            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenFile calls found.
            TimeTypeDescription
            06:51:55API Interceptor6072427x Sleep call for process: td7aCkwbmN.exe modified
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\td7aCkwbmN.exe
            File Type:PE32 executable (console) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):4436200
            Entropy (8bit):6.567497127479377
            Encrypted:false
            SSDEEP:98304:3lkkCqyDEY7+o3OBvfGVY+40yajyS+9s/pL:VkkCqaE68eV+0y8E6L
            MD5:6912BC3CB531D369558F9B55A145773B
            SHA1:4E2397CFA959CFDF9F7FF944BC1210DAF369D42A
            SHA-256:9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4
            SHA-512:07CDCE5B6E204FEED048D4B38550AF78C22F12ACB335FD04C4349FE9456ECC627A5CFD61813931D0C43FAEE8A397B627B9992C16ED205F8688636CD5EF1E96E1
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            Reputation:low
            Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........:V@.[8..[8..[8.{);..[8.{)=..[8..!<..[8..!;..[8..!=..[8.\.U..[8.\.E..[8.{)<..[8.{)>..[8.{)9..[8..[9..X8..!=..[8..!1.0^8..!...[8..[...[8..!:..[8.Rich.[8.................PE..L.................".... ..*..Z........C......`+...@...........................C..............................................=......p?..............RC..N....?.....<.=.8...................P.:..... .+.@.............+......j=......................text.....*.......*................. ..`.rdata........+.......*.............@..@.data.........=.......=.............@....rsrc........p?......F?.............@..@.reloc........?......R?.............@..B.zero.........C......RC................`........................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\td7aCkwbmN.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):654688
            Entropy (8bit):7.191321691914505
            Encrypted:false
            SSDEEP:12288:enMwHskY7gjcjhVIEhqgM7bWvcsi6aVUfIyaU40vy3W/ceKSHMsiFyY6XN:4MysZgjS1hqgSC/izkfJjymk4HM5yJ
            MD5:2E4F3FFE6E1B1ADAD701D7205CE379F1
            SHA1:03C0310CD0F7091AC4F9CF723B27C70B32C58135
            SHA-256:2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0
            SHA-512:7863E30C151B55164EFC584DD9E1F82087503B414FC68462237DAE03AD330FF2F7293D655DAA65BBBF3ABBD6606928D2D2E3B93710A2305EBA19F31E48CA9070
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c...'.u.'.u.'.u.......u.....[.u.....?.u...v.4.u...q.4.u...p...u.....".u....6.u.'.t.v.u...p.l.u....&.u.'..%.u...w.&.u.Rich'.u.........................PE..L............................v.......p............@..........................}...........................................................;..........(...8(...0...=.. t..T...................tt......@n..@...................$........................text.............................. ..`.rdata..............................@..@.data...@...........................@....wixburn8...........................@..@.tls................................@....gfids..............................@..@.rsrc....;.......<..................@..@.reloc...=...0...>..................@..B.zero........p.........................`................................................................................................................
            Process:C:\Users\user\Desktop\td7aCkwbmN.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):144896
            Entropy (8bit):6.793947225132544
            Encrypted:false
            SSDEEP:3072:PZLWfp2KkvL5kdnQrWLuzeHpl18fCtnRPF9EVnb43jaI5gr/uHrC:hgkSdQ6mCtnRPF9cCGr/uH
            MD5:6CE46EB4C85D086F06BA00DD19B56A5C
            SHA1:DA45E3798D2581335C770A1EB3DF5EA2B6930D39
            SHA-256:0BA09F85F26EB3E7B08C6DAAB34D160BDCC3E0898BD67C5D57635DE8B4EC23C4
            SHA-512:109C5E563837B9A72C0455FCC7EC7B24CFFADF1EF4DAACD4C6B8B253FF2A16D0F458105AA46AE773B3A098DAE05129DA51B18F91224837BA84D0CD28505BCE5D
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: ReversingLabs, Detection: 68%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.T6...6...6...}...<...}.......}..."...............'......."...}...1...6...T.......7.....:.7...6.R.7.......7...Rich6...........PE..L......................#.....d.......`............@..........................m...............................................;..P....p.. ....................P......./..p............................/..@...............P............................text...3........................... ..`.rdata...c.......d..................@..@.data........P.......2..............@....rsrc... ....p.......<..............@..@.reloc.......P......................@..B.zero........`.......&.................`................................................................................................................................................................................................................................................................
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):5.902688989477882
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:td7aCkwbmN.exe
            File size:20'480 bytes
            MD5:04277f82a0458b2a1faf76102fbeb254
            SHA1:128b1abb7e42b5f7b20fe947b0711ae92f13a2e3
            SHA256:f65d628ba3957335300a2d68668ba82f8af231e103ee991a5775cf50b45598a8
            SHA512:646cdcfd3c1a8f8331d805d0b65e761bfece768411ca836c3d1dcf6f88349acd4c028a9174a911c300c38ac84bd77c619c444687caacddecad082506ba9f0d61
            SSDEEP:384:iv0WLc01PT5cgafkrVUAd/ibYTJ4JVB00gMSSRJh:y5PTvaiVUdYAvgw
            TLSH:3F922A06A95A535BE972187093B32D25603E7E76631D84CFFF80093916A4EE4FB3334A
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2H..S&..S&..S&..+...S&..+...S&..+...S&...]..S&..S'..S&..+...S&..+...S&.Rich.S&.........................PE..L....wlg...........
            Icon Hash:00928e8e8686b000
            Entrypoint:0x402f1b
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x676C77E2 [Wed Dec 25 21:23:46 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:0
            File Version Major:5
            File Version Minor:0
            Subsystem Version Major:5
            Subsystem Version Minor:0
            Import Hash:14927c59260882ecd7d3211753d56621
            Instruction
            call 00007FDC20C54CADh
            jmp 00007FDC20C5466Bh
            mov edi, edi
            push ebp
            mov ebp, esp
            mov eax, dword ptr [ebp+08h]
            mov eax, dword ptr [eax]
            cmp dword ptr [eax], E06D7363h
            jne 00007FDC20C5495Ch
            cmp dword ptr [eax+10h], 03h
            jne 00007FDC20C54956h
            mov eax, dword ptr [eax+14h]
            cmp eax, 19930520h
            je 00007FDC20C54947h
            cmp eax, 19930521h
            je 00007FDC20C54940h
            cmp eax, 19930522h
            je 00007FDC20C54939h
            cmp eax, 01994000h
            jne 00007FDC20C54937h
            call 00007FDC20C54D02h
            xor eax, eax
            pop ebp
            retn 0004h
            push 00402F25h
            call dword ptr [00404034h]
            xor eax, eax
            ret
            int3
            jmp dword ptr [00404108h]
            int3
            push 00000014h
            push 004054D0h
            call 00007FDC20C54B98h
            push dword ptr [00406384h]
            mov esi, dword ptr [004040B0h]
            call esi
            pop ecx
            mov dword ptr [ebp-1Ch], eax
            cmp eax, FFFFFFFFh
            jne 00007FDC20C5493Eh
            push dword ptr [ebp+08h]
            call dword ptr [004040B4h]
            pop ecx
            jmp 00007FDC20C54999h
            push 00000008h
            call 00007FDC20C54CC2h
            pop ecx
            and dword ptr [ebp-04h], 00000000h
            push dword ptr [00406384h]
            call esi
            mov dword ptr [ebp-1Ch], eax
            push dword ptr [00406380h]
            call esi
            pop ecx
            pop ecx
            mov dword ptr [ebp-20h], eax
            lea eax, dword ptr [ebp-20h]
            push eax
            lea eax, dword ptr [ebp-1Ch]
            push eax
            push dword ptr [ebp+08h]
            mov esi, dword ptr [004040CCh]
            call esi
            Programming Language:
            • [IMP] VS2008 SP1 build 30729
            • [ASM] VS2008 SP1 build 30729
            • [ C ] VS2008 SP1 build 30729
            • [IMP] VS2005 build 50727
            • [C++] VS2008 SP1 build 30729
            • [LNK] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x550c0x78.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x2b0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x1f4.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x54400x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x40000x134.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x24740x2600a85c53433f714031e62597d0df6fae8bFalse0.5235402960526315data6.070594518628338IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x40000x1ba00x1c001f450595470ed8a4eb611fdb485ae50dFalse0.45814732142857145data5.482818694894555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x60000x38c0x200202a0f14ba4a024e6a35d5895669b769False0.060546875data0.35275948821577235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x70000x2b00x40058a3970c5ba6bee8bcaf23ee7343f378False0.3623046875data5.190213072505898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x80000x2740x400b6070c93d4f6a9a43314143abef813ceFalse0.4833984375data3.8301551091634582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_MANIFEST0x70580x256ASCII text, with CRLF line terminatorsEnglishUnited States0.5100334448160535
            DLLImport
            SHLWAPI.dllPathMatchSpecW, PathCombineW, StrCmpNW
            MSVCR90.dll_crt_debugger_hook, _controlfp_s, _invoke_watson, _except_handler4_common, _decode_pointer, _onexit, _lock, __dllonexit, _unlock, ?terminate@@YAXXZ, __set_app_type, _encode_pointer, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _configthreadlocale, _initterm_e, _initterm, _acmdln, exit, _ismbblead, _XcptFilter, _exit, _cexit, __getmainargs, _amsg_exit, wcsstr, memset, memcpy
            KERNEL32.dllIsDebuggerPresent, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, SetUnhandledExceptionFilter, GetStartupInfoA, InterlockedCompareExchange, InterlockedExchange, ExitThread, FindFirstFileW, lstrcmpW, FindNextFileW, GetLogicalDrives, GetDriveTypeW, QueryDosDeviceW, lstrcpyW, CreateFileW, GetFileSize, CreateFileMappingA, CloseHandle, MapViewOfFile, FlushViewOfFile, UnmapViewOfFile, SetFilePointer, SetEndOfFile, CreateThread, ExitProcess, GetLastError, CreateMutexA, Sleep
            USER32.dllCharLowerW
            ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegCloseKey
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            No network behavior found

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:06:51:52
            Start date:26/12/2024
            Path:C:\Users\user\Desktop\td7aCkwbmN.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\td7aCkwbmN.exe"
            Imagebase:0x670000
            File size:20'480 bytes
            MD5 hash:04277F82A0458B2A1FAF76102FBEB254
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:19.7%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:19.4%
              Total number of Nodes:129
              Total number of Limit Nodes:5
              execution_graph 621 673245 _except_handler4_common 622 672f25 623 672f61 622->623 625 672f37 622->625 624 672f5c ?terminate@ 624->623 625->623 625->624 645 672dd5 _XcptFilter 646 672c15 651 673022 646->651 649 672c52 _amsg_exit 650 672c5a 649->650 654 672f7d 651->654 653 672c1a __getmainargs 653->649 653->650 661 6731ec 654->661 656 672f89 _decode_pointer 657 672fa0 _onexit 656->657 658 672fac 7 API calls 656->658 659 673010 __onexit 657->659 662 673019 _unlock 658->662 659->653 661->656 662->659 626 671060 631 671069 626->631 628 67107d 635 671d10 GetPEB 628->635 630 6717cb 631->628 632 671d20 631->632 636 671d10 GetPEB 632->636 634 671d32 634->631 635->630 636->634 526 672c5b 547 6731ec 526->547 528 672c67 GetStartupInfoA 529 672c95 InterlockedCompareExchange 528->529 530 672ca3 529->530 531 672ca7 529->531 530->531 532 672cae Sleep 530->532 533 672cc7 _amsg_exit 531->533 534 672cd1 531->534 532->529 535 672cfa 533->535 534->535 536 672cda _initterm_e 534->536 537 672d24 535->537 538 672d09 _initterm 535->538 536->535 540 672cf5 __onexit 536->540 539 672d28 InterlockedExchange 537->539 543 672d30 __IsNonwritableInCurrentImage 537->543 538->537 539->543 541 672dbf _ismbblead 541->543 542 672e04 542->540 544 672e0d _cexit 542->544 543->541 543->542 546 672da9 exit 543->546 548 671000 Sleep CreateMutexA GetLastError 543->548 544->540 546->543 547->528 549 671036 CreateThread 548->549 550 67102e ExitProcess 548->550 551 67104b Sleep 549->551 552 672b90 549->552 551->551 558 672810 GetLogicalDrives 552->558 554 672bef ExitThread 556 672b9b 556->554 564 672730 556->564 570 6728d0 memset memset PathCombineW FindFirstFileW 556->570 563 67283d 558->563 559 6728b6 559->556 560 67284c RegOpenKeyExW 561 67286e RegQueryValueExW 560->561 560->563 562 6728aa RegCloseKey 561->562 561->563 562->563 563->559 563->560 563->562 565 67274c 564->565 566 672789 564->566 584 672790 GetDriveTypeW 565->584 566->556 569 67277b lstrcpyW 569->566 571 672b51 CloseHandle 570->571 582 67299d 570->582 571->556 572 672a00 CharLowerW 572->582 573 6729a8 lstrcmpW 574 6729be lstrcmpW 573->574 573->582 575 6729d4 PathCombineW 574->575 574->582 577 6728d0 18 API calls 575->577 576 672b35 FindNextFileW 576->571 576->582 577->582 578 672b70 wcsstr 578->582 579 672a7c PathMatchSpecW 579->576 580 672a96 PathCombineW 579->580 589 672b70 wcsstr 580->589 582->572 582->573 582->576 582->578 582->579 590 672430 CreateFileW 582->590 585 67276f 584->585 586 6727b8 584->586 585->566 585->569 586->585 587 6727cc QueryDosDeviceW 586->587 587->585 588 6727e6 StrCmpNW 587->588 588->585 589->582 591 672462 GetFileSize 590->591 592 67245b 590->592 591->592 593 67247e CreateFileMappingA 591->593 592->582 595 6724e9 MapViewOfFile 593->595 596 6724d8 CloseHandle 593->596 597 672507 CloseHandle CloseHandle 595->597 598 672522 595->598 596->592 597->592 600 672589 598->600 602 6725a6 598->602 606 672535 6 API calls 598->606 607 672070 600->607 602->606 613 6721d0 602->613 605 672661 memcpy 605->606 606->592 608 67209e 607->608 612 672163 607->612 608->612 617 671e10 608->617 611 67213c memcpy 611->612 612->606 614 6721ea 613->614 615 6721f1 613->615 614->605 614->606 615->614 616 6723a7 memcpy 615->616 616->614 618 671e2a 617->618 619 671e31 617->619 618->611 618->612 619->618 620 671fe7 memcpy 619->620 620->618 663 672f1b 666 673298 663->666 665 672f20 665->665 667 6732bd 666->667 668 6732ca GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 666->668 667->668 669 6732c1 667->669 668->669 669->665 670 672e3a 671 672e48 __set_app_type _encode_pointer __p__fmode __p__commode 670->671 673 672ee7 _pre_c_init __RTC_Initialize 671->673 674 672ef5 __setusermatherr 673->674 675 672f01 673->675 674->675 680 67326a _controlfp_s 675->680 678 672f0f _configthreadlocale 679 672f18 678->679 681 673286 _invoke_watson 680->681 682 672f06 680->682 681->682 682->678 682->679 637 672de9 638 672e04 637->638 639 672dfd _exit 637->639 640 672e0d _cexit 638->640 641 672e13 __onexit 638->641 639->638 640->641 642 673368 IsDebuggerPresent _crt_debugger_hook SetUnhandledExceptionFilter UnhandledExceptionFilter 643 673452 _crt_debugger_hook 642->643 644 67345a GetCurrentProcess TerminateProcess 642->644 643->644

              Callgraph

              Control-flow Graph

              APIs
              • memset.MSVCR90 ref: 00672942
              • memset.MSVCR90 ref: 00672958
              • PathCombineW.SHLWAPI(?,perflogs,006753E0), ref: 00672970
              • FindFirstFileW.KERNELBASE(?,?), ref: 00672984
              • lstrcmpW.KERNEL32(?,006753E4), ref: 006729B4
              • lstrcmpW.KERNEL32(?,006753E8), ref: 006729CA
              • PathCombineW.SHLWAPI(?,perflogs,?), ref: 006729E6
              • CharLowerW.USER32(?), ref: 00672A1A
              • PathMatchSpecW.SHLWAPI(?,*.exe), ref: 00672A88
              • PathCombineW.SHLWAPI(?,perflogs,?), ref: 00672AA8
              • FindNextFileW.KERNELBASE(000000FF,?), ref: 00672B43
              • CloseHandle.KERNELBASE(000000FF), ref: 00672B58
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3729734932.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
              • Associated: 00000000.00000002.3729682480.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729779005.0000000000674000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729823657.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_670000_td7aCkwbmN.jbxd
              Similarity
              • API ID: Path$Combine$FileFindlstrcmpmemset$CharCloseFirstHandleLowerMatchNextSpec
              • String ID: Sg$$recycle.bin$*.exe$<Sg$DriveSec$LSg$VolDri$config$msocache$pSg$perflogs$programdata$sys$system$win$windows$wup$|Sg$Rg
              • API String ID: 1416314416-3273258571
              • Opcode ID: ea5d986b234b40e6ec2e11396cad5ade908af72b298c3092b2c0f40d8702aea6
              • Instruction ID: 65adfd342056e3797f2c911aed83efb7474250112263842353616d9d92274a6e
              • Opcode Fuzzy Hash: ea5d986b234b40e6ec2e11396cad5ade908af72b298c3092b2c0f40d8702aea6
              • Instruction Fuzzy Hash: B76195B19002199BCB20DF60DC99BEE7B76FB19705F40C5D8E60EA6241F7B09A88CF55

              Control-flow Graph

              APIs
              • Sleep.KERNELBASE(000007D0), ref: 00671009
              • CreateMutexA.KERNELBASE(00000000,00000000,6436646754), ref: 00671018
              • GetLastError.KERNEL32 ref: 00671021
              • ExitProcess.KERNEL32 ref: 00671030
              • CreateThread.KERNELBASE(00000000,00000000,Function_00002B90,00000000,00000000,00000000), ref: 00671045
              • Sleep.KERNELBASE(0CDFE600), ref: 00671050
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3729734932.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
              • Associated: 00000000.00000002.3729682480.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729779005.0000000000674000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729823657.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_670000_td7aCkwbmN.jbxd
              Similarity
              • API ID: CreateSleep$ErrorExitLastMutexProcessThread
              • String ID: 6436646754
              • API String ID: 3579745883-3290978236
              • Opcode ID: aff19c4fd67c29ec074bc2dea43a88623dc47115ab1496fac2667849eb348a99
              • Instruction ID: 313b6a0cdd9ae7b4d2b20f618dc854567223ecbd3fadc82138125cb2939d05e1
              • Opcode Fuzzy Hash: aff19c4fd67c29ec074bc2dea43a88623dc47115ab1496fac2667849eb348a99
              • Instruction Fuzzy Hash: ADE07D71698304F7F7681BE09D0FF583A26A715F02F115401F30DA95D0DFE565C44A15

              Control-flow Graph

              APIs
              • CreateFileW.KERNELBASE(2+g,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 0067244C
              • GetFileSize.KERNEL32(000000FF,00000000), ref: 00672468
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3729734932.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
              • Associated: 00000000.00000002.3729682480.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729779005.0000000000674000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729823657.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_670000_td7aCkwbmN.jbxd
              Similarity
              • API ID: File$CreateSize
              • String ID: .zero$2+g$2+g
              • API String ID: 2791376181-1909772162
              • Opcode ID: f5e48aa952372294c8bba17b3ad5969cb97d749aaeb1e1c36eb0cd23667efe54
              • Instruction ID: 59e8df5ca59dd54adcfc32415020c448eab5c44d6dd5e5897c4228efdaf0d905
              • Opcode Fuzzy Hash: f5e48aa952372294c8bba17b3ad5969cb97d749aaeb1e1c36eb0cd23667efe54
              • Instruction Fuzzy Hash: 3BA1EA75E0020AEFDB08CFA4D9A5BEEB7B2BF48700F208159E505BB390D7759981CB64

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 81 672810-67283b GetLogicalDrives 82 672846-67284a 81->82 83 6728b6-6728c1 82->83 84 67284c-67286c RegOpenKeyExW 82->84 85 6728b4 84->85 86 67286e-672899 RegQueryValueExW 84->86 85->82 87 67289b-67289f 86->87 88 6728aa-6728ae RegCloseKey 86->88 87->88 90 6728a1-6728a7 87->90 88->85 90->88
              APIs
              • GetLogicalDrives.KERNELBASE ref: 00672816
              • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00672864
              • RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00672891
              • RegCloseKey.KERNELBASE(?), ref: 006728AE
              Strings
              • NoDrives, xrefs: 00672888
              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, xrefs: 00672857
              Memory Dump Source
              • Source File: 00000000.00000002.3729734932.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
              • Associated: 00000000.00000002.3729682480.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729779005.0000000000674000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729823657.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_670000_td7aCkwbmN.jbxd
              Similarity
              • API ID: CloseDrivesLogicalOpenQueryValue
              • String ID: NoDrives$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
              • API String ID: 2666887985-3471754645
              • Opcode ID: 8837ce92007e7df2192edf1e6b3ce7f053ffd614b4594ca21ac566474abd6fc6
              • Instruction ID: 5b5cac0c5551744302c7b5e0de5212efcda27a39c4212e6bed86244f2c2fa416
              • Opcode Fuzzy Hash: 8837ce92007e7df2192edf1e6b3ce7f053ffd614b4594ca21ac566474abd6fc6
              • Instruction Fuzzy Hash: E211DAB1E4020ADBEB14CFD0D95ABEEB7B5FB44704F108148E619A7280D7B96A49CF91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 91 672790-6727b6 GetDriveTypeW 92 672805-67280b 91->92 93 6727b8-6727bf 91->93 94 6727c1-6727c8 93->94 95 6727cc-6727e4 QueryDosDeviceW 93->95 94->95 97 6727ca 94->97 95->92 96 6727e6-6727fc StrCmpNW 95->96 96->92 98 6727fe 96->98 97->92 98->92
              APIs
              • GetDriveTypeW.KERNELBASE(o'g), ref: 0067279D
              • QueryDosDeviceW.KERNELBASE(o'g,?,00000208), ref: 006727DC
              • StrCmpNW.KERNELBASE(?,\??\,00000004), ref: 006727F4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3729734932.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
              • Associated: 00000000.00000002.3729682480.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729779005.0000000000674000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729823657.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_670000_td7aCkwbmN.jbxd
              Similarity
              • API ID: DeviceDriveQueryType
              • String ID: \??\$o'g
              • API String ID: 1681518211-1418168579
              • Opcode ID: 86256ca77e989789821d099dc44c2cae126a1b86d31c6563d04ca20eef1a492d
              • Instruction ID: 3a5cc6e2475214b0aa422f4067e3767cfaab91544cb46b08b8e6013516a84964
              • Opcode Fuzzy Hash: 86256ca77e989789821d099dc44c2cae126a1b86d31c6563d04ca20eef1a492d
              • Instruction Fuzzy Hash: 4501447095020DDBCB24CF51CD48AD9B7B9AB04700F00C1E8AA0C97240EB359FC9CF65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 99 672b90-672ba5 call 672810 102 672bb0-672bb4 99->102 103 672bb6-672bd7 call 672730 102->103 104 672bef-672bf1 ExitThread 102->104 107 672bed 103->107 108 672bd9-672bdd 103->108 107->102 110 672be1-672be5 call 6728d0 108->110 111 672bdf 108->111 113 672bea 110->113 111->107 113->107
              APIs
                • Part of subcall function 00672810: GetLogicalDrives.KERNELBASE ref: 00672816
                • Part of subcall function 00672810: RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00672864
                • Part of subcall function 00672810: RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00672891
                • Part of subcall function 00672810: RegCloseKey.KERNELBASE(?), ref: 006728AE
              • ExitThread.KERNEL32 ref: 00672BF1
                • Part of subcall function 00672730: lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 00672783
                • Part of subcall function 006728D0: memset.MSVCR90 ref: 00672942
                • Part of subcall function 006728D0: memset.MSVCR90 ref: 00672958
                • Part of subcall function 006728D0: PathCombineW.SHLWAPI(?,perflogs,006753E0), ref: 00672970
                • Part of subcall function 006728D0: FindFirstFileW.KERNELBASE(?,?), ref: 00672984
                • Part of subcall function 006728D0: lstrcmpW.KERNEL32(?,006753E4), ref: 006729B4
                • Part of subcall function 006728D0: lstrcmpW.KERNEL32(?,006753E8), ref: 006729CA
                • Part of subcall function 006728D0: PathCombineW.SHLWAPI(?,perflogs,?), ref: 006729E6
                • Part of subcall function 006728D0: FindNextFileW.KERNELBASE(000000FF,?), ref: 00672B43
                • Part of subcall function 006728D0: CloseHandle.KERNELBASE(000000FF), ref: 00672B58
              Memory Dump Source
              • Source File: 00000000.00000002.3729734932.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
              • Associated: 00000000.00000002.3729682480.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729779005.0000000000674000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729823657.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_670000_td7aCkwbmN.jbxd
              Similarity
              • API ID: CloseCombineFileFindPathlstrcmpmemset$DrivesExitFirstHandleLogicalNextOpenQueryThreadValuelstrcpy
              • String ID:
              • API String ID: 717983626-0
              • Opcode ID: 197034b2739c15540ee3a56e829995cfb86ba4e53bd02a3e2e2f3b2e389d8bf7
              • Instruction ID: ff88de0c4d5316b7e341e95d7d48e2207f230996d0eed7b6a4bff53822a6f401
              • Opcode Fuzzy Hash: 197034b2739c15540ee3a56e829995cfb86ba4e53bd02a3e2e2f3b2e389d8bf7
              • Instruction Fuzzy Hash: 68013CB5D08209EFCB04DFE4C956ADEB7B6FB48708F24C0EAD51973201E6319A84DB56

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 114 672730-67274a 115 67274c-67276a call 672790 114->115 116 672789-67278f 114->116 118 67276f-672779 115->118 118->116 119 67277b-672783 lstrcpyW 118->119 119->116
              APIs
                • Part of subcall function 00672790: GetDriveTypeW.KERNELBASE(o'g), ref: 0067279D
              • lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 00672783
              Memory Dump Source
              • Source File: 00000000.00000002.3729734932.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
              • Associated: 00000000.00000002.3729682480.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729779005.0000000000674000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729823657.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_670000_td7aCkwbmN.jbxd
              Similarity
              • API ID: DriveTypelstrcpy
              • String ID:
              • API String ID: 3664088370-0
              • Opcode ID: 7e15818120b54a1f22c31a947f802952d7244c33d137270265e1c8575fc80ef9
              • Instruction ID: 821cf572dc1bb6b17922c7d26f77e90e017ac51f5980b6ace941b64c405baf40
              • Opcode Fuzzy Hash: 7e15818120b54a1f22c31a947f802952d7244c33d137270265e1c8575fc80ef9
              • Instruction Fuzzy Hash: B7F06775900208FBCB04DFA8D955BDDB7B5EF44300F00C0A8E8199B340E635AB18CB85
              Memory Dump Source
              • Source File: 00000000.00000002.3729734932.0000000000671000.00000020.00000001.01000000.00000003.sdmp, Offset: 00670000, based on PE: true
              • Associated: 00000000.00000002.3729682480.0000000000670000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729779005.0000000000674000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3729823657.0000000000677000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_670000_td7aCkwbmN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
              • Instruction ID: be7eecee3400b42b3e558a840de4aeb97e4223185f45bdd8b65d759b642826a8
              • Opcode Fuzzy Hash: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
              • Instruction Fuzzy Hash: 85A002321A5B8CC7C612A68DA651B51B3ECE348D54F440461A50D43E015659B9108495