Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
626wniisYq.exe

Overview

General Information

Sample name:626wniisYq.exe
renamed because original name is a hash value
Original sample name:9c1a27f56d54f300447cba07e1cd9ca0.exe
Analysis ID:1580911
MD5:9c1a27f56d54f300447cba07e1cd9ca0
SHA1:aeb004114db8a5de198ad82a58ab692bf380ec10
SHA256:de8812a7df877cec32ffc9e8467d523af409499ad421b388994b3c5fed768905
Tags:exeuser-abuse_ch
Infos:

Detection

Phorpiex
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Phorpiex
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for dropped file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 626wniisYq.exe (PID: 6584 cmdline: "C:\Users\user\Desktop\626wniisYq.exe" MD5: 9C1A27F56D54F300447CBA07E1CD9CA0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
626wniisYq.exeJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
    SourceRuleDescriptionAuthorStrings
    0.2.626wniisYq.exe.840000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
      0.0.626wniisYq.exe.840000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeReversingLabs: Detection: 68%
        Source: 626wniisYq.exeReversingLabs: Detection: 55%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 81.6% probability
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeJoe Sandbox ML: detected

        Phishing

        barindex
        Source: Yara matchFile source: 626wniisYq.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE
        Source: 626wniisYq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\626wniisYq.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: 626wniisYq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: ntkrnlmp.pdbx, source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4432186939.00000000095CB000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4326749282.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4362336367.0000000008305000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4551396025.000000000B825000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF8000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbd source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: ntkrnlmp.pdbp source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B82D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbB source: 626wniisYq.exe, 00000000.00000002.4432186939.00000000095CB000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B82D000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4326749282.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4362336367.0000000008305000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdbkB source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbz source: 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb} source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B825000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdb} source: 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbx source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF8000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbU source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: 626wniisYq.exe, 00000000.00000002.4171354761.00000000035B4000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdbe source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbhD source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\626wniisYq.exeCode function: 0_2_008428D0 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_008428D0
        Source: integrator.exe.0.drString found in binary or memory: http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte
        Source: VC_redist.x64.exe.0.drString found in binary or memory: http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
        Source: integrator.exe.0.drString found in binary or memory: https://nexus.officeapps.live.comhttps://nexusrules.officeapps.live.com
        Source: integrator.exe.0.drString found in binary or memory: https://otelrules.azureedge.net/rules/.bundlesdxhelper.exeFailed
        Source: integrator.exe.0.drBinary or memory string: RegisterRawInputDevicesmemstr_69c59d54-1

        Spam, unwanted Advertisements and Ransom Demands

        barindex
        Source: Yara matchFile source: 626wniisYq.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe 9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe 2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\chrome.exe 0BA09F85F26EB3E7B08C6DAAB34D160BDCC3E0898BD67C5D57635DE8B4EC23C4
        Source: 626wniisYq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: classification engineClassification label: mal84.troj.evad.winEXE@1/3@0/0
        Source: C:\Users\user\Desktop\626wniisYq.exeMutant created: \Sessions\1\BaseNamedObjects\6436646754
        Source: C:\Users\user\Desktop\626wniisYq.exeCommand line argument: 64366467540_2_00841000
        Source: 626wniisYq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\626wniisYq.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: integrator.exe.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
        Source: integrator.exe.0.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: 626wniisYq.exeReversingLabs: Detection: 55%
        Source: C:\Users\user\Desktop\626wniisYq.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: 626wniisYq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: ntkrnlmp.pdbx, source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4432186939.00000000095CB000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4326749282.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4362336367.0000000008305000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4551396025.000000000B825000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF8000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbd source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: ntkrnlmp.pdbp source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B82D000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbB source: 626wniisYq.exe, 00000000.00000002.4432186939.00000000095CB000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B82D000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4326749282.00000000078B0000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4362336367.0000000008305000.00000004.00000020.00020000.00000000.sdmp, 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdbkB source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbz source: 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb} source: 626wniisYq.exe, 00000000.00000002.4551396025.000000000B825000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdb} source: 626wniisYq.exe, 00000000.00000002.4524246824.000000000B074000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbx source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF8000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbU source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77B000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: 626wniisYq.exe, 00000000.00000002.4171354761.00000000035B4000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdbe source: 626wniisYq.exe, 00000000.00000002.4463342988.0000000009EF1000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdbhD source: 626wniisYq.exe, 00000000.00000002.4490763629.000000000A77E000.00000004.00000020.00020000.00000000.sdmp
        Source: 626wniisYq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: 626wniisYq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: 626wniisYq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: 626wniisYq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: 626wniisYq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: initial sampleStatic PE information: section where entry point is pointing to: .zero
        Source: integrator.exe.0.drStatic PE information: section name: .zero
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .wixburn
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .zero
        Source: chrome.exe.0.drStatic PE information: section name: .zero
        Source: C:\Users\user\Desktop\626wniisYq.exeCode function: 0_2_00843231 push ecx; ret 0_2_00843244
        Source: C:\Users\user\Desktop\626wniisYq.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\626wniisYq.exeFile created: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\626wniisYq.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\626wniisYq.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\626wniisYq.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\626wniisYq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exeWindow / User API: threadDelayed 1355Jump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exeWindow / User API: threadDelayed 7963Jump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exeDropped PE file which has not been started: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\626wniisYq.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\626wniisYq.exeDropped PE file which has not been started: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\626wniisYq.exe TID: 6632Thread sleep count: 1355 > 30Jump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exe TID: 6632Thread sleep time: -292680000000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exe TID: 6632Thread sleep count: 7963 > 30Jump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exe TID: 6632Thread sleep time: -1720008000000s >= -30000sJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\626wniisYq.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\626wniisYq.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\626wniisYq.exeCode function: 0_2_008428D0 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_008428D0
        Source: C:\Users\user\Desktop\626wniisYq.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\626wniisYq.exeThread delayed: delay time: 216000000Jump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\626wniisYq.exeProcess Stats: CPU usage > 42% for more than 60s
        Source: C:\Users\user\Desktop\626wniisYq.exeCode function: 0_2_00843368 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00843368
        Source: C:\Users\user\Desktop\626wniisYq.exeCode function: 0_2_00841D10 mov eax, dword ptr fs:[00000030h]0_2_00841D10
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\626wniisYq.exeCode function: 0_2_00843368 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00843368
        Source: C:\Users\user\Desktop\626wniisYq.exeCode function: 0_2_00843298 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00843298

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 626wniisYq.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.626wniisYq.exe.840000.0.unpack, type: UNPACKEDPE
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        122
        Virtualization/Sandbox Evasion
        11
        Input Capture
        1
        System Time Discovery
        Remote Services11
        Input Capture
        Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        DLL Side-Loading
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Obfuscated Files or Information
        Security Account Manager122
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        626wniisYq.exe55%ReversingLabsWin32.Ransomware.GandCrab
        SourceDetectionScannerLabelLink
        C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%AviraW32/Infector.Gen
        C:\Users\user\AppData\Local\Temp\chrome.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe68%ReversingLabsWin32.Ransomware.GandCrab
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporteintegrator.exe.0.drfalse
          high
          http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgorVC_redist.x64.exe.0.drfalse
            high
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1580911
            Start date and time:2024-12-26 13:06:16 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 48s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Sample name:626wniisYq.exe
            renamed because original name is a hash value
            Original Sample Name:9c1a27f56d54f300447cba07e1cd9ca0.exe
            Detection:MAL
            Classification:mal84.troj.evad.winEXE@1/3@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 7
            • Number of non-executed functions: 1
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenFile calls found.
            • VT rate limit hit for: 626wniisYq.exe
            TimeTypeDescription
            07:07:11API Interceptor9582356x Sleep call for process: 626wniisYq.exe modified
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exetd7aCkwbmN.exeGet hashmaliciousPhorpiexBrowse
              C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exetd7aCkwbmN.exeGet hashmaliciousPhorpiexBrowse
                C:\Users\user\AppData\Local\Temp\chrome.exetd7aCkwbmN.exeGet hashmaliciousPhorpiexBrowse
                  Process:C:\Users\user\Desktop\626wniisYq.exe
                  File Type:PE32 executable (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4436200
                  Entropy (8bit):6.567497127479377
                  Encrypted:false
                  SSDEEP:98304:3lkkCqyDEY7+o3OBvfGVY+40yajyS+9s/pL:VkkCqaE68eV+0y8E6L
                  MD5:6912BC3CB531D369558F9B55A145773B
                  SHA1:4E2397CFA959CFDF9F7FF944BC1210DAF369D42A
                  SHA-256:9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4
                  SHA-512:07CDCE5B6E204FEED048D4B38550AF78C22F12ACB335FD04C4349FE9456ECC627A5CFD61813931D0C43FAEE8A397B627B9992C16ED205F8688636CD5EF1E96E1
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  Joe Sandbox View:
                  • Filename: td7aCkwbmN.exe, Detection: malicious, Browse
                  Reputation:low
                  Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........:V@.[8..[8..[8.{);..[8.{)=..[8..!<..[8..!;..[8..!=..[8.\.U..[8.\.E..[8.{)<..[8.{)>..[8.{)9..[8..[9..X8..!=..[8..!1.0^8..!...[8..[...[8..!:..[8.Rich.[8.................PE..L.................".... ..*..Z........C......`+...@...........................C..............................................=......p?..............RC..N....?.....<.=.8...................P.:..... .+.@.............+......j=......................text.....*.......*................. ..`.rdata........+.......*.............@..@.data.........=.......=.............@....rsrc........p?......F?.............@..@.reloc........?......R?.............@..B.zero.........C......RC................`........................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\626wniisYq.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):654688
                  Entropy (8bit):7.191321691914505
                  Encrypted:false
                  SSDEEP:12288:enMwHskY7gjcjhVIEhqgM7bWvcsi6aVUfIyaU40vy3W/ceKSHMsiFyY6XN:4MysZgjS1hqgSC/izkfJjymk4HM5yJ
                  MD5:2E4F3FFE6E1B1ADAD701D7205CE379F1
                  SHA1:03C0310CD0F7091AC4F9CF723B27C70B32C58135
                  SHA-256:2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0
                  SHA-512:7863E30C151B55164EFC584DD9E1F82087503B414FC68462237DAE03AD330FF2F7293D655DAA65BBBF3ABBD6606928D2D2E3B93710A2305EBA19F31E48CA9070
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  Joe Sandbox View:
                  • Filename: td7aCkwbmN.exe, Detection: malicious, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c...'.u.'.u.'.u.......u.....[.u.....?.u...v.4.u...q.4.u...p...u.....".u....6.u.'.t.v.u...p.l.u....&.u.'..%.u...w.&.u.Rich'.u.........................PE..L............................v.......p............@..........................}...........................................................;..........(...8(...0...=.. t..T...................tt......@n..@...................$........................text.............................. ..`.rdata..............................@..@.data...@...........................@....wixburn8...........................@..@.tls................................@....gfids..............................@..@.rsrc....;.......<..................@..@.reloc...=...0...>..................@..B.zero........p.........................`................................................................................................................
                  Process:C:\Users\user\Desktop\626wniisYq.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):144896
                  Entropy (8bit):6.793947225132544
                  Encrypted:false
                  SSDEEP:3072:PZLWfp2KkvL5kdnQrWLuzeHpl18fCtnRPF9EVnb43jaI5gr/uHrC:hgkSdQ6mCtnRPF9cCGr/uH
                  MD5:6CE46EB4C85D086F06BA00DD19B56A5C
                  SHA1:DA45E3798D2581335C770A1EB3DF5EA2B6930D39
                  SHA-256:0BA09F85F26EB3E7B08C6DAAB34D160BDCC3E0898BD67C5D57635DE8B4EC23C4
                  SHA-512:109C5E563837B9A72C0455FCC7EC7B24CFFADF1EF4DAACD4C6B8B253FF2A16D0F458105AA46AE773B3A098DAE05129DA51B18F91224837BA84D0CD28505BCE5D
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 68%
                  Joe Sandbox View:
                  • Filename: td7aCkwbmN.exe, Detection: malicious, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.T6...6...6...}...<...}.......}..."...............'......."...}...1...6...T.......7.....:.7...6.R.7.......7...Rich6...........PE..L......................#.....d.......`............@..........................m...............................................;..P....p.. ....................P......./..p............................/..@...............P............................text...3........................... ..`.rdata...c.......d..................@..@.data........P.......2..............@....rsrc... ....p.......<..............@..@.reloc.......P......................@..B.zero........`.......&.................`................................................................................................................................................................................................................................................................
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):5.908278452165618
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:626wniisYq.exe
                  File size:20'480 bytes
                  MD5:9c1a27f56d54f300447cba07e1cd9ca0
                  SHA1:aeb004114db8a5de198ad82a58ab692bf380ec10
                  SHA256:de8812a7df877cec32ffc9e8467d523af409499ad421b388994b3c5fed768905
                  SHA512:04590b909d0193c141849752d76259cb8fc01ea655971236292667890c2e575df2149123d4b5c695050fda414ebcbefb795dd608e5d7337422959dcca3e91425
                  SSDEEP:384:z10WLc01P9+IKzPiVUA7q/ibYTJ4JVB00NtMSKRJh:L5P9rKOVUm/YAvNt4
                  TLSH:71921A06A95A535BE9762870A3B36D21643D7E32631D85CFFF8005391660EE4FB3335A
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2H..S&..S&..S&..+...S&..+...S&..+...S&...]..S&..S'..S&..+...S&..+...S&.Rich.S&.................PE..L.....jg.................&.
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x402f1b
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x676AC7FB [Tue Dec 24 14:40:59 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:b7e474d9c974e50792d097344350bef6
                  Instruction
                  call 00007FBE707D58CDh
                  jmp 00007FBE707D528Bh
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  mov eax, dword ptr [eax]
                  cmp dword ptr [eax], E06D7363h
                  jne 00007FBE707D557Ch
                  cmp dword ptr [eax+10h], 03h
                  jne 00007FBE707D5576h
                  mov eax, dword ptr [eax+14h]
                  cmp eax, 19930520h
                  je 00007FBE707D5567h
                  cmp eax, 19930521h
                  je 00007FBE707D5560h
                  cmp eax, 19930522h
                  je 00007FBE707D5559h
                  cmp eax, 01994000h
                  jne 00007FBE707D5557h
                  call 00007FBE707D5922h
                  xor eax, eax
                  pop ebp
                  retn 0004h
                  push 00402F25h
                  call dword ptr [00404034h]
                  xor eax, eax
                  ret
                  int3
                  jmp dword ptr [00404108h]
                  int3
                  push 00000014h
                  push 00405500h
                  call 00007FBE707D57B8h
                  push dword ptr [00406384h]
                  mov esi, dword ptr [004040B0h]
                  call esi
                  pop ecx
                  mov dword ptr [ebp-1Ch], eax
                  cmp eax, FFFFFFFFh
                  jne 00007FBE707D555Eh
                  push dword ptr [ebp+08h]
                  call dword ptr [004040B4h]
                  pop ecx
                  jmp 00007FBE707D55B9h
                  push 00000008h
                  call 00007FBE707D58E2h
                  pop ecx
                  and dword ptr [ebp-04h], 00000000h
                  push dword ptr [00406384h]
                  call esi
                  mov dword ptr [ebp-1Ch], eax
                  push dword ptr [00406380h]
                  call esi
                  pop ecx
                  pop ecx
                  mov dword ptr [ebp-20h], eax
                  lea eax, dword ptr [ebp-20h]
                  push eax
                  lea eax, dword ptr [ebp-1Ch]
                  push eax
                  push dword ptr [ebp+08h]
                  mov esi, dword ptr [004040CCh]
                  call esi
                  Programming Language:
                  • [IMP] VS2008 SP1 build 30729
                  • [ASM] VS2008 SP1 build 30729
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2005 build 50727
                  • [C++] VS2008 SP1 build 30729
                  • [LNK] VS2008 SP1 build 30729
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x553c0x78.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x2b0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x1f4.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x54700x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x40000x134.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x24740x26007da0e0c97891634a8c380c310c9a8655False0.5229235197368421data6.068979751498372IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x40000x1bd00x1c004f942f4843ec7d2bde46d7b6ea8617f2False0.46163504464285715data5.4966875545786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x60000x38c0x200202a0f14ba4a024e6a35d5895669b769False0.060546875data0.35275948821577235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x70000x2b00x40058a3970c5ba6bee8bcaf23ee7343f378False0.3623046875data5.190213072505898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x80000x2860x400c8fa5b8fd5c02bda24289e233a3ef470False0.482421875data3.8290081872091606IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_MANIFEST0x70580x256ASCII text, with CRLF line terminatorsEnglishUnited States0.5100334448160535
                  DLLImport
                  SHLWAPI.dllStrCmpNW, PathCombineW, PathMatchSpecW
                  MSVCR90.dll_crt_debugger_hook, _controlfp_s, _invoke_watson, _except_handler4_common, _decode_pointer, _onexit, _lock, __dllonexit, _unlock, ?terminate@@YAXXZ, __set_app_type, _encode_pointer, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _configthreadlocale, _initterm_e, _initterm, _acmdln, exit, _ismbblead, _XcptFilter, _exit, _cexit, __getmainargs, _amsg_exit, wcsstr, memcpy, memset
                  KERNEL32.dllIsDebuggerPresent, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, SetUnhandledExceptionFilter, GetStartupInfoA, InterlockedCompareExchange, InterlockedExchange, ExitThread, FindFirstFileW, lstrcmpW, FindNextFileW, GetLogicalDrives, GetDriveTypeW, QueryDosDeviceW, lstrcpyW, GetFileSize, CreateFileMappingA, MapViewOfFile, FlushViewOfFile, UnmapViewOfFile, SetFilePointer, SetEndOfFile, CreateFileW, CloseHandle, Sleep, CreateThread, ExitProcess, GetLastError, CreateMutexA
                  USER32.dllCharLowerW
                  ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegCloseKey
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:07:07:09
                  Start date:26/12/2024
                  Path:C:\Users\user\Desktop\626wniisYq.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\626wniisYq.exe"
                  Imagebase:0x840000
                  File size:20'480 bytes
                  MD5 hash:9C1A27F56D54F300447CBA07E1CD9CA0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:19.8%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:19.4%
                    Total number of Nodes:129
                    Total number of Limit Nodes:4
                    execution_graph 622 842f25 623 842f61 622->623 624 842f37 622->624 624->623 625 842f5c ?terminate@ 624->625 625->623 626 843245 _except_handler4_common 646 842c15 651 843022 646->651 649 842c52 _amsg_exit 650 842c5a 649->650 654 842f7d 651->654 653 842c1a __getmainargs 653->649 653->650 661 8431ec 654->661 656 842f89 _decode_pointer 657 842fa0 _onexit 656->657 658 842fac 7 API calls 656->658 659 843010 __onexit 657->659 662 843019 _unlock 658->662 659->653 661->656 662->659 663 842dd5 _XcptFilter 627 841060 632 841069 627->632 629 84107d 636 841d10 GetPEB 629->636 631 8417cb 632->629 633 841d20 632->633 637 841d10 GetPEB 633->637 635 841d32 635->632 636->631 637->635 638 843368 IsDebuggerPresent _crt_debugger_hook SetUnhandledExceptionFilter UnhandledExceptionFilter 639 843452 _crt_debugger_hook 638->639 640 84345a GetCurrentProcess TerminateProcess 638->640 639->640 641 842de9 642 842e04 641->642 643 842dfd _exit 641->643 644 842e0d _cexit 642->644 645 842e13 __onexit 642->645 643->642 644->645 664 842e3a 666 842e48 __set_app_type _encode_pointer __p__fmode __p__commode 664->666 667 842ee7 _pre_c_init __RTC_Initialize 666->667 668 842ef5 __setusermatherr 667->668 669 842f01 667->669 668->669 674 84326a _controlfp_s 669->674 672 842f0f _configthreadlocale 673 842f18 672->673 675 843286 _invoke_watson 674->675 676 842f06 674->676 675->676 676->672 676->673 527 842c5b 548 8431ec 527->548 529 842c67 GetStartupInfoA 530 842c95 InterlockedCompareExchange 529->530 531 842ca3 530->531 532 842ca7 530->532 531->532 533 842cae Sleep 531->533 534 842cc7 _amsg_exit 532->534 535 842cd1 532->535 533->530 536 842cfa 534->536 535->536 537 842cda _initterm_e 535->537 538 842d24 536->538 539 842d09 _initterm 536->539 537->536 541 842cf5 __onexit 537->541 540 842d28 InterlockedExchange 538->540 543 842d30 __IsNonwritableInCurrentImage 538->543 539->538 540->543 542 842dbf _ismbblead 542->543 543->542 545 842e04 543->545 546 842da9 exit 543->546 549 841000 Sleep CreateMutexA GetLastError 543->549 545->541 547 842e0d _cexit 545->547 546->543 547->541 548->529 550 841036 CreateThread 549->550 551 84102e ExitProcess 549->551 552 84104b Sleep 550->552 553 842b90 550->553 552->552 559 842810 GetLogicalDrives 553->559 555 842bef ExitThread 557 842b9b 557->555 565 842730 557->565 571 8428d0 memset memset PathCombineW FindFirstFileW 557->571 560 84283d 559->560 561 8428b6 560->561 562 84284c RegOpenKeyExW 560->562 564 8428aa RegCloseKey 560->564 561->557 562->560 563 84286e RegQueryValueExW 562->563 563->560 563->564 564->560 566 84274c 565->566 567 842789 565->567 585 842790 GetDriveTypeW 566->585 567->557 570 84277b lstrcpyW 570->567 572 842b51 CloseHandle 571->572 582 84299d 571->582 572->557 573 842a00 CharLowerW 573->582 574 8429a8 lstrcmpW 575 8429be lstrcmpW 574->575 574->582 576 8429d4 PathCombineW 575->576 575->582 578 8428d0 18 API calls 576->578 577 842b35 FindNextFileW 577->572 577->582 578->582 579 842a7c PathMatchSpecW 579->577 580 842a96 PathCombineW 579->580 590 842b70 wcsstr 580->590 582->573 582->574 582->577 582->579 583 842b70 wcsstr 582->583 591 842430 CreateFileW 582->591 583->582 586 84276f 585->586 587 8427b8 585->587 586->567 586->570 587->586 588 8427cc QueryDosDeviceW 587->588 588->586 589 8427e6 StrCmpNW 588->589 589->586 590->582 592 842462 GetFileSize 591->592 593 84245b 591->593 592->593 594 84247e CreateFileMappingA 592->594 593->582 596 8424d8 CloseHandle 594->596 597 8424e9 MapViewOfFile 594->597 596->593 598 842507 CloseHandle CloseHandle 597->598 600 842522 597->600 598->593 601 842589 600->601 603 8425a6 600->603 607 842535 6 API calls 600->607 608 842070 601->608 603->607 614 8421d0 603->614 606 842661 memcpy 606->607 607->593 609 842163 608->609 610 84209e 608->610 609->607 610->609 618 841e10 610->618 613 84213c memcpy 613->609 615 8421ea 614->615 616 8421f1 614->616 615->606 615->607 616->615 617 8423a7 memcpy 616->617 617->615 619 841e2a 618->619 620 841e31 618->620 619->609 619->613 620->619 621 841fe7 memcpy 620->621 621->619 677 842f1b 680 843298 677->680 679 842f20 679->679 681 8432bd 680->681 682 8432ca GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 680->682 681->682 683 8432c1 681->683 682->683 683->679

                    Callgraph

                    Control-flow Graph

                    APIs
                    • memset.MSVCR90 ref: 00842942
                    • memset.MSVCR90 ref: 00842958
                    • PathCombineW.SHLWAPI(?,perflogs,00845410), ref: 00842970
                    • FindFirstFileW.KERNELBASE(?,?), ref: 00842984
                    • lstrcmpW.KERNEL32(?,00845414), ref: 008429B4
                    • lstrcmpW.KERNEL32(?,00845418), ref: 008429CA
                    • PathCombineW.SHLWAPI(?,perflogs,?), ref: 008429E6
                    • CharLowerW.USER32(?), ref: 00842A1A
                    • PathMatchSpecW.SHLWAPI(?,*.exe), ref: 00842A88
                    • PathCombineW.SHLWAPI(?,perflogs,?), ref: 00842AA8
                    • FindNextFileW.KERNELBASE(000000FF,?), ref: 00842B43
                    • CloseHandle.KERNELBASE(000000FF), ref: 00842B58
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4144240396.0000000000841000.00000020.00000001.01000000.00000003.sdmp, Offset: 00840000, based on PE: true
                    • Associated: 00000000.00000002.4144222178.0000000000840000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144258675.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144280809.0000000000847000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_840000_626wniisYq.jbxd
                    Similarity
                    • API ID: Path$Combine$FileFindlstrcmpmemset$CharCloseFirstHandleLowerMatchNextSpec
                    • String ID: $recycle.bin$*.exe$DriveSec$VolDri$appdata$application data$boot$config$default$intel$msocache$perflogs$program files$programdata$sys$system$win$windows$wup
                    • API String ID: 1416314416-1168010690
                    • Opcode ID: 5e873c016c464d2fd7c34bc131a72eb30bd29e28e30223fcb9074f8a1d5411df
                    • Instruction ID: aa4b0cb9deea332d881d6f630a021917fa07998c4ee8056aad65f631d4a518be
                    • Opcode Fuzzy Hash: 5e873c016c464d2fd7c34bc131a72eb30bd29e28e30223fcb9074f8a1d5411df
                    • Instruction Fuzzy Hash: A661C0F590061C9BCB20DFA0DC89BEEB778FB0A745F804598F609E6241E7749A88CF55

                    Control-flow Graph

                    APIs
                    • Sleep.KERNELBASE(000007D0), ref: 00841009
                    • CreateMutexA.KERNELBASE(00000000,00000000,6436646754), ref: 00841018
                    • GetLastError.KERNEL32 ref: 00841021
                    • ExitProcess.KERNEL32 ref: 00841030
                    • CreateThread.KERNELBASE(00000000,00000000,Function_00002B90,00000000,00000000,00000000), ref: 00841045
                    • Sleep.KERNELBASE(0CDFE600), ref: 00841050
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4144240396.0000000000841000.00000020.00000001.01000000.00000003.sdmp, Offset: 00840000, based on PE: true
                    • Associated: 00000000.00000002.4144222178.0000000000840000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144258675.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144280809.0000000000847000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_840000_626wniisYq.jbxd
                    Similarity
                    • API ID: CreateSleep$ErrorExitLastMutexProcessThread
                    • String ID: 6436646754
                    • API String ID: 3579745883-3290978236
                    • Opcode ID: 4c65db3231615607ab75d8e4f2c8845f7c09e0a9c9956e3e00fb5703cef2cc74
                    • Instruction ID: b57babe4e6a406a1c43df9e1012d50f79ef86668717fdb14fd22f3873b5b4430
                    • Opcode Fuzzy Hash: 4c65db3231615607ab75d8e4f2c8845f7c09e0a9c9956e3e00fb5703cef2cc74
                    • Instruction Fuzzy Hash: 1FE09235688B08F7F6A01BE09D0FF183A65F715F56F111400F30DF95D086E46494CA19

                    Control-flow Graph

                    APIs
                    • CreateFileW.KERNELBASE(00842B32,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 0084244C
                    • GetFileSize.KERNEL32(000000FF,00000000), ref: 00842468
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4144240396.0000000000841000.00000020.00000001.01000000.00000003.sdmp, Offset: 00840000, based on PE: true
                    • Associated: 00000000.00000002.4144222178.0000000000840000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144258675.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144280809.0000000000847000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_840000_626wniisYq.jbxd
                    Similarity
                    • API ID: File$CreateSize
                    • String ID: .zero
                    • API String ID: 2791376181-843663606
                    • Opcode ID: 8ae363a4d1faf6954517575af85c767e24afe30230595db3be4325c104d00f0e
                    • Instruction ID: 853cd2c27cf4b115957c06dd58646d8ba299281158b40ca658dacec40e7d8124
                    • Opcode Fuzzy Hash: 8ae363a4d1faf6954517575af85c767e24afe30230595db3be4325c104d00f0e
                    • Instruction Fuzzy Hash: BDA1D374E0420DEFCB04CFA4D995BAEBBB5FF58704F608159EA01AB390D774A981CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 81 842810-84283b GetLogicalDrives 82 842846-84284a 81->82 83 8428b6-8428c1 82->83 84 84284c-84286c RegOpenKeyExW 82->84 85 8428b4 84->85 86 84286e-842899 RegQueryValueExW 84->86 85->82 88 8428aa-8428ae RegCloseKey 86->88 89 84289b-84289f 86->89 88->85 89->88 90 8428a1-8428a7 89->90 90->88
                    APIs
                    • GetLogicalDrives.KERNELBASE ref: 00842816
                    • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00842864
                    • RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00842891
                    • RegCloseKey.KERNELBASE(?), ref: 008428AE
                    Strings
                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, xrefs: 00842857
                    • NoDrives, xrefs: 00842888
                    Memory Dump Source
                    • Source File: 00000000.00000002.4144240396.0000000000841000.00000020.00000001.01000000.00000003.sdmp, Offset: 00840000, based on PE: true
                    • Associated: 00000000.00000002.4144222178.0000000000840000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144258675.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144280809.0000000000847000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_840000_626wniisYq.jbxd
                    Similarity
                    • API ID: CloseDrivesLogicalOpenQueryValue
                    • String ID: NoDrives$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
                    • API String ID: 2666887985-3471754645
                    • Opcode ID: 33740b417c685831cccee976fb284f4196ca09c3c53118f6130947db16444180
                    • Instruction ID: a9ecc96590b8ae34efe5493bbf9cc038dffc1fbb708010356b7fdc17001525e4
                    • Opcode Fuzzy Hash: 33740b417c685831cccee976fb284f4196ca09c3c53118f6130947db16444180
                    • Instruction Fuzzy Hash: EA110AB5E0020E9BEB10CFD0D94ABEEBBB4FB08304F504159E611A7281D7B86A45CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 91 842790-8427b6 GetDriveTypeW 92 842805-84280b 91->92 93 8427b8-8427bf 91->93 94 8427c1-8427c8 93->94 95 8427cc-8427e4 QueryDosDeviceW 93->95 94->95 96 8427ca 94->96 95->92 97 8427e6-8427fc StrCmpNW 95->97 96->92 97->92 98 8427fe 97->98 98->92
                    APIs
                    • GetDriveTypeW.KERNELBASE(0084276F), ref: 0084279D
                    • QueryDosDeviceW.KERNELBASE(0084276F,?,00000208), ref: 008427DC
                    • StrCmpNW.KERNELBASE(?,\??\,00000004), ref: 008427F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4144240396.0000000000841000.00000020.00000001.01000000.00000003.sdmp, Offset: 00840000, based on PE: true
                    • Associated: 00000000.00000002.4144222178.0000000000840000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144258675.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144280809.0000000000847000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_840000_626wniisYq.jbxd
                    Similarity
                    • API ID: DeviceDriveQueryType
                    • String ID: \??\
                    • API String ID: 1681518211-3047946824
                    • Opcode ID: bb01ba73791de6122233e6bb80bc97d21178af46c5190f4b0fd86b86dc1f318d
                    • Instruction ID: d3ec3d6e6692334d2f15452816e81278e0ef52a7800a1a017a44bc7fe6557a51
                    • Opcode Fuzzy Hash: bb01ba73791de6122233e6bb80bc97d21178af46c5190f4b0fd86b86dc1f318d
                    • Instruction Fuzzy Hash: 6A01FFB494421CDBCB20CFA5CC49ADDB7B4FB09754F4180B9AA05E7240E6749AC9CFA4

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 99 842b90-842ba5 call 842810 102 842bb0-842bb4 99->102 103 842bb6-842bd7 call 842730 102->103 104 842bef-842bf1 ExitThread 102->104 107 842bed 103->107 108 842bd9-842bdd 103->108 107->102 110 842be1-842be5 call 8428d0 108->110 111 842bdf 108->111 113 842bea 110->113 111->107 113->107
                    APIs
                      • Part of subcall function 00842810: GetLogicalDrives.KERNELBASE ref: 00842816
                      • Part of subcall function 00842810: RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00842864
                      • Part of subcall function 00842810: RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00842891
                      • Part of subcall function 00842810: RegCloseKey.KERNELBASE(?), ref: 008428AE
                    • ExitThread.KERNEL32 ref: 00842BF1
                      • Part of subcall function 00842730: lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 00842783
                      • Part of subcall function 008428D0: memset.MSVCR90 ref: 00842942
                      • Part of subcall function 008428D0: memset.MSVCR90 ref: 00842958
                      • Part of subcall function 008428D0: PathCombineW.SHLWAPI(?,perflogs,00845410), ref: 00842970
                      • Part of subcall function 008428D0: FindFirstFileW.KERNELBASE(?,?), ref: 00842984
                      • Part of subcall function 008428D0: lstrcmpW.KERNEL32(?,00845414), ref: 008429B4
                      • Part of subcall function 008428D0: lstrcmpW.KERNEL32(?,00845418), ref: 008429CA
                      • Part of subcall function 008428D0: PathCombineW.SHLWAPI(?,perflogs,?), ref: 008429E6
                      • Part of subcall function 008428D0: FindNextFileW.KERNELBASE(000000FF,?), ref: 00842B43
                      • Part of subcall function 008428D0: CloseHandle.KERNELBASE(000000FF), ref: 00842B58
                    Memory Dump Source
                    • Source File: 00000000.00000002.4144240396.0000000000841000.00000020.00000001.01000000.00000003.sdmp, Offset: 00840000, based on PE: true
                    • Associated: 00000000.00000002.4144222178.0000000000840000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144258675.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144280809.0000000000847000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_840000_626wniisYq.jbxd
                    Similarity
                    • API ID: CloseCombineFileFindPathlstrcmpmemset$DrivesExitFirstHandleLogicalNextOpenQueryThreadValuelstrcpy
                    • String ID:
                    • API String ID: 717983626-0
                    • Opcode ID: c46cb3c901dd31b24319904ea3952ac691ab14b2743e487d854b3be8c98c0f37
                    • Instruction ID: a45bdedef23183c3fcf35f07b84aee38e082ad5f2dd67299081ccb8fac3d8d17
                    • Opcode Fuzzy Hash: c46cb3c901dd31b24319904ea3952ac691ab14b2743e487d854b3be8c98c0f37
                    • Instruction Fuzzy Hash: 87011D75D0C20CEBCB00DFE8C946ADDB7B4FB08318F5040AAE501F3201E6359A44DB56

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 114 842730-84274a 115 84274c-84276a call 842790 114->115 116 842789-84278f 114->116 118 84276f-842779 115->118 118->116 119 84277b-842783 lstrcpyW 118->119 119->116
                    APIs
                      • Part of subcall function 00842790: GetDriveTypeW.KERNELBASE(0084276F), ref: 0084279D
                    • lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 00842783
                    Memory Dump Source
                    • Source File: 00000000.00000002.4144240396.0000000000841000.00000020.00000001.01000000.00000003.sdmp, Offset: 00840000, based on PE: true
                    • Associated: 00000000.00000002.4144222178.0000000000840000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144258675.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144280809.0000000000847000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_840000_626wniisYq.jbxd
                    Similarity
                    • API ID: DriveTypelstrcpy
                    • String ID:
                    • API String ID: 3664088370-0
                    • Opcode ID: cf6425dd46c6f252067755c5709ef8cdf6b387534790369e411cb1d084bc7f77
                    • Instruction ID: aa76dd33705cb14eb59aed4529aa503a762f0d9f9a27a13dcf8c230e3edbf17f
                    • Opcode Fuzzy Hash: cf6425dd46c6f252067755c5709ef8cdf6b387534790369e411cb1d084bc7f77
                    • Instruction Fuzzy Hash: 75F0177591420CFBDB00DFA8D855B9DB7B4FF44304F04C5A9E8199B241E635AB18CB85
                    Memory Dump Source
                    • Source File: 00000000.00000002.4144240396.0000000000841000.00000020.00000001.01000000.00000003.sdmp, Offset: 00840000, based on PE: true
                    • Associated: 00000000.00000002.4144222178.0000000000840000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144258675.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.4144280809.0000000000847000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_840000_626wniisYq.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                    • Instruction ID: be7eecee3400b42b3e558a840de4aeb97e4223185f45bdd8b65d759b642826a8
                    • Opcode Fuzzy Hash: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                    • Instruction Fuzzy Hash: 85A002321A5B8CC7C612A68DA651B51B3ECE348D54F440461A50D43E015659B9108495