Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1223.exe

Overview

General Information

Sample name:1223.exe
Analysis ID:1581144
MD5:5947b96cc629ae7adec0e0878109a4a0
SHA1:a6e130a84067a0708ea817d8f43b3950f7e048db
SHA256:aecc448780d3cdda9613ec7f3b0fb9bfa0c7c23dd7893bd62dedcd43ce04b2f6
Tags:CobaltStrikeexeuser-lontze7
Infos:

Detection

Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 1223.exe (PID: 796 cmdline: "C:\Users\user\Desktop\1223.exe" MD5: 5947B96CC629AE7ADEC0E0878109A4A0)
  • cleanup
{"Type": "Metasploit Connect", "IP": "172.20.155.171", "Port": 4444}
SourceRuleDescriptionAuthorStrings
1223.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    1223.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      1223.exeWindows_Trojan_Metasploit_a6e956c9Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x1cc6:$a1: 60 89 E5 31 C0 64 8B 50 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61 7C 02 2C 20
      1223.exeWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0x1d89:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
      1223.exeMsfpayloads_msf_10Metasploit Payloads - file msf.exeFlorian Roth
      • 0x1cd1:$s1: 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61
      • 0x1d13:$s2: 01 C7 38 E0 75 F6 03 7D F8 3B 7D 24 75 E4 58 8B
      • 0x1d33:$s3: 01 D0 89 44 24 24 5B 5B 61 59 5A 51 FF E0 5F 5F
      SourceRuleDescriptionAuthorStrings
      00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_a6e956c9Identifies the API address lookup function leverage by metasploit shellcodeunknown
        • 0x6:$a1: 60 89 E5 31 C0 64 8B 50 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61 7C 02 2C 20
        00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
        • 0xc9:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
        00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_a6e956c9Identifies the API address lookup function leverage by metasploit shellcodeunknown
          • 0xcc6:$a1: 60 89 E5 31 C0 64 8B 50 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61 7C 02 2C 20
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          2.2.1223.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            2.2.1223.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
              2.2.1223.exe.400000.0.unpackWindows_Trojan_Metasploit_a6e956c9Identifies the API address lookup function leverage by metasploit shellcodeunknown
              • 0x1cc6:$a1: 60 89 E5 31 C0 64 8B 50 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61 7C 02 2C 20
              2.2.1223.exe.400000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
              • 0x1d89:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
              2.2.1223.exe.400000.0.unpackMsfpayloads_msf_10Metasploit Payloads - file msf.exeFlorian Roth
              • 0x1cd1:$s1: 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61
              • 0x1d13:$s2: 01 C7 38 E0 75 F6 03 7D F8 3B 7D 24 75 E4 58 8B
              • 0x1d33:$s3: 01 D0 89 44 24 24 5B 5B 61 59 5A 51 FF E0 5F 5F
              Click to see the 5 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 1223.exeAvira: detected
              Source: 1223.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "172.20.155.171", "Port": 4444}
              Source: 1223.exeVirustotal: Detection: 90%Perma Link
              Source: 1223.exeReversingLabs: Detection: 94%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
              Source: 1223.exeJoe Sandbox ML: detected
              Source: 1223.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: 1223.exe
              Source: C:\Users\user\Desktop\1223.exeCode function: 4x nop then xor ecx, dword ptr [edx]2_2_0040A340
              Source: C:\Users\user\Desktop\1223.exeCode function: 4x nop then xor ecx, dword ptr [edx]2_2_0040A344
              Source: C:\Users\user\Desktop\1223.exeCode function: 4x nop then xor ecx, dword ptr [edx]2_2_0040A328
              Source: Joe Sandbox ViewASN Name: ATT-INTERNET4US ATT-INTERNET4US
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_004B0088 WSASocketA,connect,recv,closesocket,2_2_004B0088
              Source: 1223.exeString found in binary or memory: http://www.apache.org/
              Source: 1223.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: 1223.exeString found in binary or memory: http://www.zeustech.net/

              System Summary

              barindex
              Source: 1223.exe, type: SAMPLEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 1223.exe, type: SAMPLEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
              Source: 1223.exe, type: SAMPLEMatched rule: Metasploit Payloads - file msf.exe Author: Florian Roth
              Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
              Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Metasploit Payloads - file msf.exe Author: Florian Roth
              Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
              Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Metasploit Payloads - file msf.exe Author: Florian Roth
              Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
              Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
              Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
              Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
              Source: 1223.exe, 00000002.00000002.3428998356.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs 1223.exe
              Source: 1223.exeBinary or memory string: OriginalFilenameab.exeF vs 1223.exe
              Source: 1223.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: 1223.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
              Source: 1223.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
              Source: 1223.exe, type: SAMPLEMatched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
              Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
              Source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
              Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
              Source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
              Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
              Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
              Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
              Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
              Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
              Source: 1223.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: classification engineClassification label: mal96.troj.winEXE@1/0@0/1
              Source: 1223.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\1223.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 1223.exeVirustotal: Detection: 90%
              Source: 1223.exeReversingLabs: Detection: 94%
              Source: C:\Users\user\Desktop\1223.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\1223.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\1223.exeSection loaded: mswsock.dllJump to behavior
              Source: 1223.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: 1223.exe
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_00403287 push eax; iretd 2_2_00403340
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_004054AD push ebp; retf 2_2_004054AE
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_004046B5 push eax; retf 000Eh2_2_00404701
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_004054B6 push ds; retf 2_2_004054E4
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_00401323 push edx; retf 2_2_004013F8
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_0040132E push edx; retf 2_2_004013F8
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_004035F3 push ebp; retf 2_2_004035F4
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_00405583 push ds; retf 2_2_004054E4
              Source: C:\Users\user\Desktop\1223.exeCode function: 2_2_004013B4 push edx; retf 2_2_004013F8
              Source: 1223.exeStatic PE information: section name: .text entropy: 7.014800590230539
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: 1223.exe, 00000002.00000002.3429144781.000000000067E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 1223.exe, type: SAMPLE
              Source: Yara matchFile source: 2.2.1223.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.1223.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              1
              DLL Side-Loading
              2
              Software Packing
              OS Credential Dumping1
              Security Software Discovery
              Remote ServicesData from Local System1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              DLL Side-Loading
              LSASS Memory1
              System Information Discovery
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
              Obfuscated Files or Information
              Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              1223.exe90%VirustotalBrowse
              1223.exe95%ReversingLabsWin32.Trojan.Swrort
              1223.exe100%AviraTR/Patched.Gen2
              1223.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.zeustech.net/0%Avira URL Cloudsafe
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.apache.org/licenses/LICENSE-2.01223.exefalse
                high
                http://www.apache.org/1223.exefalse
                  high
                  http://www.zeustech.net/1223.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  172.20.155.171
                  unknownReserved
                  7018ATT-INTERNET4UStrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1581144
                  Start date and time:2024-12-27 06:00:12 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 3m 51s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:23
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:1223.exe
                  Detection:MAL
                  Classification:mal96.troj.winEXE@1/0@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 4
                  • Number of non-executed functions: 3
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 20.190.147.11, 13.107.246.63, 20.74.47.205, 2.16.158.88, 150.171.27.10, 2.16.158.27, 184.30.17.174, 4.175.87.197, 20.31.169.57, 2.16.158.179
                  • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, tse1.mm.bing.net, ctldl.windowsupdate.com, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com
                  No simulations
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ATT-INTERNET4USdb0fa4b8db0333367e9bda3ab68b8042.x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 108.66.20.44
                  xd.mips.elfGet hashmaliciousMiraiBrowse
                  • 12.241.236.239
                  xd.arm7.elfGet hashmaliciousMiraiBrowse
                  • 45.17.20.126
                  xd.x86.elfGet hashmaliciousMiraiBrowse
                  • 63.194.166.245
                  xd.ppc.elfGet hashmaliciousMiraiBrowse
                  • 70.244.221.199
                  xd.sh4.elfGet hashmaliciousMiraiBrowse
                  • 108.213.195.86
                  xd.mpsl.elfGet hashmaliciousMiraiBrowse
                  • 67.114.58.190
                  telnet.ppc.elfGet hashmaliciousUnknownBrowse
                  • 12.252.186.137
                  telnet.arm.elfGet hashmaliciousUnknownBrowse
                  • 172.4.169.212
                  telnet.sh4.elfGet hashmaliciousUnknownBrowse
                  • 99.1.72.108
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.320972261774991
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:1223.exe
                  File size:73'802 bytes
                  MD5:5947b96cc629ae7adec0e0878109a4a0
                  SHA1:a6e130a84067a0708ea817d8f43b3950f7e048db
                  SHA256:aecc448780d3cdda9613ec7f3b0fb9bfa0c7c23dd7893bd62dedcd43ce04b2f6
                  SHA512:9ba03c55772a5f17df65cd0f9dba1d14f379b7eb29c0ea4ca5d969d30ed10b670d7ade22caec5259d6c93c3dfc924f037cba61fc3189e222662e20356fcb8fab
                  SSDEEP:1536:IJLHbEm5pBGMAIuP3kpewcJJNMMb+KR0Nc8QsJq39:Yb5pCP3/JJ6e0Nc8QsC9
                  TLSH:7673C042E5C45535C162123D67393AF69974F6FB3102C28EB68CCAE5DBC1CB0A22B3C6
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L...3H\J...........
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x4085ba
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  DLL Characteristics:
                  Time Stamp:0x4A5C4833 [Tue Jul 14 08:56:19 2009 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:481f47bbb2c9c21e108d65f52b04c448
                  Instruction
                  aaa
                  nop
                  std
                  inc eax
                  cwde
                  aas
                  inc edx
                  inc eax
                  lahf
                  wait
                  cld
                  daa
                  aaa
                  das
                  clc
                  cmc
                  inc ebx
                  inc eax
                  dec eax
                  std
                  das
                  aaa
                  das
                  nop
                  xchg eax, ecx
                  aas
                  std
                  wait
                  dec eax
                  salc
                  cld
                  aaa
                  stc
                  cld
                  dec ecx
                  clc
                  salc
                  inc eax
                  xchg eax, edx
                  dec edx
                  salc
                  dec ecx
                  xchg eax, ecx
                  das
                  inc ecx
                  std
                  inc ebx
                  inc ecx
                  aas
                  cmc
                  cwde
                  xchg eax, edx
                  aas
                  xchg eax, ecx
                  inc eax
                  daa
                  xchg eax, ebx
                  dec eax
                  cdq
                  cld
                  stc
                  stc
                  dec ebx
                  dec eax
                  lahf
                  wait
                  aas
                  dec ecx
                  xchg eax, ecx
                  salc
                  aaa
                  daa
                  dec ecx
                  aas
                  nop
                  inc ebx
                  dec ecx
                  stc
                  xchg eax, ebx
                  clc
                  aas
                  dec eax
                  inc ecx
                  das
                  std
                  std
                  lahf
                  dec ecx
                  inc eax
                  dec ecx
                  xchg eax, edx
                  stc
                  lahf
                  inc eax
                  daa
                  cwde
                  xchg eax, ebx
                  aas
                  std
                  dec ebx
                  wait
                  stc
                  xchg eax, edx
                  lahf
                  stc
                  dec edx
                  cmc
                  lahf
                  cwde
                  das
                  inc eax
                  cdq
                  aas
                  inc eax
                  inc ebx
                  cdq
                  cdq
                  salc
                  inc ecx
                  clc
                  aaa
                  inc edx
                  nop
                  salc
                  std
                  clc
                  inc edx
                  inc ebx
                  inc edx
                  inc eax
                  dec edx
                  dec edx
                  dec edx
                  std
                  dec eax
                  dec ecx
                  cmc
                  salc
                  nop
                  dec edx
                  daa
                  daa
                  inc ecx
                  aaa
                  stc
                  cmc
                  xchg eax, ecx
                  dec eax
                  dec edx
                  nop
                  aaa
                  dec ecx
                  inc ebx
                  cwde
                  lahf
                  inc ecx
                  dec ebx
                  daa
                  aas
                  aas
                  aas
                  aaa
                  daa
                  wait
                  cwde
                  std
                  dec eax
                  dec ebx
                  stc
                  dec eax
                  salc
                  xchg eax, edx
                  dec ebx
                  salc
                  inc edx
                  inc edx
                  xchg eax, ebx
                  inc ecx
                  salc
                  dec eax
                  inc ebx
                  cmc
                  daa
                  cwde
                  dec edx
                  daa
                  salc
                  dec ebx
                  xchg eax, edx
                  xchg eax, ebx
                  xchg eax, edx
                  cmc
                  jmp 00007F561507CC5Ah
                  nop
                  push ebp
                  Programming Language:
                  • [EXP] VC++ 6.0 SP5 build 8804
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xa9660xb000f65bddcea3f92f79e6c533e44bbfdccbFalse0.8151633522727273data7.014800590230539IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
                  DLLImport
                  MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                  KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                  ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                  WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                  WS2_32.dllWSARecv, WSASend
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 27, 2024 06:01:12.974805117 CET497154444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:01:13.094399929 CET444449715172.20.155.171192.168.2.6
                  Dec 27, 2024 06:01:13.094511032 CET497154444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:01:35.032721043 CET444449715172.20.155.171192.168.2.6
                  Dec 27, 2024 06:01:35.032794952 CET497154444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:01:35.033252001 CET497154444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:01:35.034764051 CET497784444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:01:35.152694941 CET444449715172.20.155.171192.168.2.6
                  Dec 27, 2024 06:01:35.154212952 CET444449778172.20.155.171192.168.2.6
                  Dec 27, 2024 06:01:35.154334068 CET497784444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:01:57.126784086 CET444449778172.20.155.171192.168.2.6
                  Dec 27, 2024 06:01:57.126852989 CET497784444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:01:57.127268076 CET497784444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:01:57.128215075 CET498224444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:01:57.247786045 CET444449778172.20.155.171192.168.2.6
                  Dec 27, 2024 06:01:57.248357058 CET444449822172.20.155.171192.168.2.6
                  Dec 27, 2024 06:01:57.248429060 CET498224444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:02:19.149120092 CET444449822172.20.155.171192.168.2.6
                  Dec 27, 2024 06:02:19.149188042 CET498224444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:02:19.149643898 CET498224444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:02:19.150619030 CET498744444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:02:19.269082069 CET444449822172.20.155.171192.168.2.6
                  Dec 27, 2024 06:02:19.270118952 CET444449874172.20.155.171192.168.2.6
                  Dec 27, 2024 06:02:19.270209074 CET498744444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:02:41.165115118 CET444449874172.20.155.171192.168.2.6
                  Dec 27, 2024 06:02:41.165194988 CET498744444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:02:41.165771961 CET498744444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:02:41.166867018 CET499214444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:02:41.285183907 CET444449874172.20.155.171192.168.2.6
                  Dec 27, 2024 06:02:41.286323071 CET444449921172.20.155.171192.168.2.6
                  Dec 27, 2024 06:02:41.286418915 CET499214444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:03:03.237302065 CET444449921172.20.155.171192.168.2.6
                  Dec 27, 2024 06:03:03.237451077 CET499214444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:03:03.237849951 CET499214444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:03:03.238845110 CET499714444192.168.2.6172.20.155.171
                  Dec 27, 2024 06:03:03.357244968 CET444449921172.20.155.171192.168.2.6
                  Dec 27, 2024 06:03:03.358284950 CET444449971172.20.155.171192.168.2.6
                  Dec 27, 2024 06:03:03.358381987 CET499714444192.168.2.6172.20.155.171

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:2
                  Start time:00:01:12
                  Start date:27/12/2024
                  Path:C:\Users\user\Desktop\1223.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\1223.exe"
                  Imagebase:0x400000
                  File size:73'802 bytes
                  MD5 hash:5947B96CC629AE7ADEC0E0878109A4A0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Metasploit_a6e956c9, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Metasploit_a6e956c9, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Metasploit_a6e956c9, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000002.00000000.2182326465.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:1.4%
                    Dynamic/Decrypted Code Coverage:37%
                    Signature Coverage:29.6%
                    Total number of Nodes:27
                    Total number of Limit Nodes:2
                    execution_graph 1207 40a720 1208 40a71b 1207->1208 1208->1207 1209 40a773 _isctype 1208->1209 1210 40a784 1208->1210 1209->1208 1209->1210 1199 401ae8 1200 401af8 VirtualAlloc 1199->1200 1202 401b7d 1200->1202 1211 4013f9 1212 4013fe WSAStartup 1211->1212 1181 4b0000 1184 4b0088 1181->1184 1183 4b0006 1183->1183 1185 4b009b 1184->1185 1186 4b00ad WSASocketA 1185->1186 1187 4b00c9 connect 1186->1187 1188 4b00e2 recv 1187->1188 1190 4b00d8 1187->1190 1189 4b012a closesocket 1188->1189 1188->1190 1189->1186 1190->1187 1190->1188 1190->1189 1191 4b0142 1190->1191 1191->1183 1192 401b2d 1193 401b50 VirtualAlloc 1192->1193 1195 401b7d 1193->1195 1196 40123d atoi 1197 401265 WSAStartup 1196->1197 1203 401b1f 1204 401b37 VirtualAlloc 1203->1204 1206 401b7d 1204->1206 1206->1206

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 4b0088-4b00ab 3 4b00ad-4b00c8 WSASocketA 0->3 4 4b00c9-4b00d6 connect 3->4 5 4b00d8-4b00db 4->5 6 4b00e2-4b00f2 recv 4->6 5->4 7 4b00dd call 4b0143 5->7 8 4b012a-4b0137 closesocket 6->8 9 4b00f4-4b0108 6->9 7->6 8->3 12 4b0109-4b0118 9->12 14 4b011a-4b0123 12->14 15 4b013c-4b0140 12->15 14->8 15->12 16 4b0142 15->16
                    APIs
                    • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,5C110002,AB9B14AC,0000000A,?,?,5F327377,00003233), ref: 004B00C6
                    • connect.WS2_32(6174A599,?,?,00000010,?,?,5F327377,00003233), ref: 004B00D2
                    • recv.WS2_32(5FC8D902,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 004B00ED
                    • closesocket.WS2_32(614D6E75,?,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 004B0130
                    Memory Dump Source
                    • Source File: 00000002.00000002.3429041346.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_4b0000_1223.jbxd
                    Yara matches
                    Similarity
                    • API ID: Socketclosesocketconnectrecv
                    • String ID:
                    • API String ID: 2083937939-0
                    • Opcode ID: 9025efb25eb4823f8684353c94efbd3828cc56f25dc0f9469f600f69c3f77865
                    • Instruction ID: 44343a34ed602982a83ae764b21cde1215f4e626dc3b458f95b11d8b192542b0
                    • Opcode Fuzzy Hash: 9025efb25eb4823f8684353c94efbd3828cc56f25dc0f9469f600f69c3f77865
                    • Instruction Fuzzy Hash: 5C1180B0A812583EF5302666AC07FBB795CCF42BA9F110466FB41EA0C5D9969C4081FE

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 17 401ae8-401ba9 VirtualAlloc call 401cbb 29 401baa 17->29 29->29
                    APIs
                    • VirtualAlloc.KERNELBASE(E553A458,00000000,0000014D,00001000,00000040), ref: 00401B69
                    Memory Dump Source
                    • Source File: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000002.00000002.3428907804.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428951127.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428973101.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428998356.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_1223.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 98d56f40c1b8b4cc053863efd67ceee16a416733e15dc4514dc52395a317d546
                    • Instruction ID: 8b4b6778ecfc0c63c8ba77c10b564c165d30f8ea60c4994b9a6e1b0efe2d0958
                    • Opcode Fuzzy Hash: 98d56f40c1b8b4cc053863efd67ceee16a416733e15dc4514dc52395a317d546
                    • Instruction Fuzzy Hash: F6E0BD20ACE109E2D50011A00886FF271AC071F781E303877A25F7A1F2BABC7803326F

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 30 401b1f-401ba9 VirtualAlloc call 401cbb 39 401baa 30->39 39->39
                    APIs
                    • VirtualAlloc.KERNELBASE(E553A458,00000000,0000014D,00001000,00000040), ref: 00401B69
                    Memory Dump Source
                    • Source File: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000002.00000002.3428907804.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428951127.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428973101.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428998356.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_1223.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: f542c1701f9caf43b3cb826a3e9e8b2e999eb41b7147c42f174edadfc07df051
                    • Instruction ID: 7008a56d4289cee9aaf322143563fc612be1803f54b93b90f5ca4d1107b08a78
                    • Opcode Fuzzy Hash: f542c1701f9caf43b3cb826a3e9e8b2e999eb41b7147c42f174edadfc07df051
                    • Instruction Fuzzy Hash: 65D0672468E149D5D50051601892FF5716C0B6F781F743877A19BBA2F3FABCB503221E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 40 401b2d-401b6c VirtualAlloc 43 401b7d-401ba9 call 401cbb 40->43 48 401baa 43->48 48->48
                    APIs
                    • VirtualAlloc.KERNELBASE(E553A458,00000000,0000014D,00001000,00000040), ref: 00401B69
                    Memory Dump Source
                    • Source File: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000002.00000002.3428907804.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428951127.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428973101.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428998356.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_1223.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 44e0535be959269d3eda8d775794056483161f527d577cc7563c6d73bdf69efb
                    • Instruction ID: 5560e52603e4df6b3d5ab234aace2d60f7da42f35de2a381f665205d4b4fa66e
                    • Opcode Fuzzy Hash: 44e0535be959269d3eda8d775794056483161f527d577cc7563c6d73bdf69efb
                    • Instruction Fuzzy Hash: 89E08C2064E2489FC20196304896AB5767A5F0F340B2824BB818BBB1F3EB7C6407625E
                    Memory Dump Source
                    • Source File: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000002.00000002.3428907804.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428951127.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428973101.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428998356.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_1223.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cf6e29fd57e2c7ae9c02fdcf698b42b8f75bb9db132b6657e08377f4a9055c40
                    • Instruction ID: e113513813ed77a78255ed95d97c82acbba6c80f5430a6e6d1355c2f7543a2e9
                    • Opcode Fuzzy Hash: cf6e29fd57e2c7ae9c02fdcf698b42b8f75bb9db132b6657e08377f4a9055c40
                    • Instruction Fuzzy Hash: 6301267190D2E89EDB25C678D8655EABFE49B27320F0815EBD8C4B7283C3698415C34B
                    Memory Dump Source
                    • Source File: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000002.00000002.3428907804.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428951127.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428973101.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428998356.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_1223.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c621847178e84fea230a23f341f6aadb0361574d27daba3876c1c260c9401046
                    • Instruction ID: ededa4f1fef95805fccf399930aa406433bafa45eb6526739ff2b6fe6dc0a7af
                    • Opcode Fuzzy Hash: c621847178e84fea230a23f341f6aadb0361574d27daba3876c1c260c9401046
                    • Instruction Fuzzy Hash: 8D01D87190939986D720D67CC8459AEFBD09E63324B1C426FC9A0AB2D2C7398451D34B
                    Memory Dump Source
                    • Source File: 00000002.00000002.3428931562.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000002.00000002.3428907804.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428951127.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428973101.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000002.00000002.3428998356.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_1223.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ad3bf679cba38e4fd2358c5562275fc4c83380e5e7007a15cd567f5e54bb7ca9
                    • Instruction ID: 76729f8cadef2b0442d0e8af4d1ec599d7a774ee33aeb64a606d0f70a69e2481
                    • Opcode Fuzzy Hash: ad3bf679cba38e4fd2358c5562275fc4c83380e5e7007a15cd567f5e54bb7ca9
                    • Instruction Fuzzy Hash: ACF0A771909345AAD714CE68C845969FBA4AB33314B18596AD891E72C2C738C155C74F