Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TeikwYB2tm.exe

Overview

General Information

Sample name:TeikwYB2tm.exe
renamed because original name is a hash value
Original sample name:72b6b07175ef611ce7daa959a1248aae.exe
Analysis ID:1581418
MD5:72b6b07175ef611ce7daa959a1248aae
SHA1:bee9d33d83c98a7c2c3c9d0eb671fa1d53328378
SHA256:8e6ae3b356d2205296fec0761daa461a311190e50e0e611699ebb4aad6e6cd77
Tags:DanaBotexeuser-abuse_ch
Infos:

Detection

DanaBot
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DanaBot stealer dll
AI detected suspicious sample
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Queries information about the installed CPU (vendor, model number etc)
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer

Classification

  • System is w10x64
  • TeikwYB2tm.exe (PID: 3180 cmdline: "C:\Users\user\Desktop\TeikwYB2tm.exe" MD5: 72B6B07175EF611CE7DAA959A1248AAE)
    • cmd.exe (PID: 3652 cmdline: cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WMIC.exe (PID: 6036 cmdline: wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value MD5: E2DE6500DE1148C7F6027AD50AC8B891)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DanaBotProofpoints describes DanaBot as the latest example of malware focused on persistence and stealing useful information that can later be monetized rather than demanding an immediate ransom from victims. The social engineering in the low-volume DanaBot campaigns we have observed so far has been well-crafted, again pointing to a renewed focus on quality over quantity in email-based threats. DanaBots modular nature enables it to download additional components, increasing the flexibility and robust stealing and remote monitoring capabilities of this banker.
  • SCULLY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.danabot
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
    00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
        Process Memory Space: TeikwYB2tm.exe PID: 3180JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: TeikwYB2tm.exe PID: 3180JoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-27T15:20:07.246361+010020344651Malware Command and Control Activity Detected192.168.2.449772188.132.183.159443TCP
            2024-12-27T15:20:08.319027+010020344651Malware Command and Control Activity Detected192.168.2.449773206.206.125.221443TCP
            2024-12-27T15:20:09.414745+010020344651Malware Command and Control Activity Detected192.168.2.44977994.131.118.216443TCP
            2024-12-27T15:20:10.510034+010020344651Malware Command and Control Activity Detected192.168.2.449780188.132.183.159443TCP
            2024-12-27T15:21:12.075984+010020344651Malware Command and Control Activity Detected192.168.2.449917188.132.183.159443TCP
            2024-12-27T15:21:13.334248+010020344651Malware Command and Control Activity Detected192.168.2.449921206.206.125.221443TCP
            2024-12-27T15:21:14.422566+010020344651Malware Command and Control Activity Detected192.168.2.44992294.131.118.216443TCP
            2024-12-27T15:21:15.511492+010020344651Malware Command and Control Activity Detected192.168.2.449928188.132.183.159443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: TeikwYB2tm.exeAvira: detected
            Source: TeikwYB2tm.exeReversingLabs: Detection: 71%
            Source: Yara matchFile source: 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: TeikwYB2tm.exe PID: 3180, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 81.6% probability
            Source: TeikwYB2tm.exeJoe Sandbox ML: detected
            Source: TeikwYB2tm.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: 0_2_0303E190 FindFirstFileW,FindClose,0_2_0303E190
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: 0_2_0303DBC4 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,0_2_0303DBC4
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.4:49773 -> 206.206.125.221:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.4:49779 -> 94.131.118.216:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.4:49780 -> 188.132.183.159:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.4:49772 -> 188.132.183.159:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.4:49917 -> 188.132.183.159:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.4:49922 -> 94.131.118.216:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.4:49921 -> 206.206.125.221:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.4:49928 -> 188.132.183.159:443
            Source: Joe Sandbox ViewASN Name: PREMIERDC-VERI-MERKEZI-ANONIM-SIRKETIPREMIERDC-SHTR PREMIERDC-VERI-MERKEZI-ANONIM-SIRKETIPREMIERDC-SHTR
            Source: Joe Sandbox ViewASN Name: HYPEENT-SJUS HYPEENT-SJUS
            Source: Joe Sandbox ViewASN Name: NASSIST-ASGI NASSIST-ASGI
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 94.131.118.216
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 188.132.183.159
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: unknownTCP traffic detected without corresponding DNS query: 206.206.125.221
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://.css
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://.jpg
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://html4/loose.dtd
            Source: TeikwYB2tm.exe, 00000000.00000002.3530091663.0000000063469000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1726265084.000000007EB44000.00000004.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1727745159.000000007EB1A000.00000004.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000002.3531904093.000000006E66F000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/V
            Source: TeikwYB2tm.exe, 00000000.00000003.1725542855.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000002.3530091663.0000000063281000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
            Source: TeikwYB2tm.exe, 00000000.00000003.1725542855.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000002.3530091663.0000000063281000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.htmlRAND
            Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
            Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
            Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49917
            Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
            Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
            Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
            Source: unknownNetwork traffic detected: HTTP traffic on port 49917 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49928
            Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: TeikwYB2tm.exe PID: 3180, type: MEMORYSTR
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: 0_2_034F5340 LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory,0_2_034F5340
            Source: TeikwYB2tm.exeStatic PE information: Number of sections : 11 > 10
            Source: TeikwYB2tm.exe, 00000000.00000002.3528232186.0000000003854000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs TeikwYB2tm.exe
            Source: TeikwYB2tm.exe, 00000000.00000002.3530091663.0000000063469000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibeay32.dllH vs TeikwYB2tm.exe
            Source: TeikwYB2tm.exe, 00000000.00000003.1726265084.000000007EB44000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibeay32.dllH vs TeikwYB2tm.exe
            Source: TeikwYB2tm.exe, 00000000.00000002.3521693255.0000000002688000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs TeikwYB2tm.exe
            Source: TeikwYB2tm.exe, 00000000.00000003.1727745159.000000007EB1A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamessleay32.dllH vs TeikwYB2tm.exe
            Source: TeikwYB2tm.exe, 00000000.00000002.3531904093.000000006E66F000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamessleay32.dllH vs TeikwYB2tm.exe
            Source: TeikwYB2tm.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: classification engineClassification label: mal88.troj.evad.winEXE@6/0@0/3
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2008:120:WilError_03
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
            Source: TeikwYB2tm.exeReversingLabs: Detection: 71%
            Source: unknownProcess created: C:\Users\user\Desktop\TeikwYB2tm.exe "C:\Users\user\Desktop\TeikwYB2tm.exe"
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /valueJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /valueJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: mmdevapi.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: ksuser.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: avrt.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: audioses.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: midimap.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: avifil32.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: cryptui.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSection loaded: fwpolicyiomgr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocServer32Jump to behavior
            Source: TeikwYB2tm.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: TeikwYB2tm.exeStatic file information: File size 4277248 > 1048576
            Source: TeikwYB2tm.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3eca00
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: 0_2_034F5340 LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory,0_2_034F5340
            Source: TeikwYB2tm.exeStatic PE information: section name: .didata

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1722508242.000000007E870000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: torConnect
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT SerialNumber FROM Win32_DiskDrive WHERE DeviceID=\&apos;c:\&apos;
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT SerialNumber FROM Win32_DiskDrive WHERE DeviceID=\&apos;c:\&apos;
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeWindow / User API: threadDelayed 9923Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: 0_2_0303E190 FindFirstFileW,FindClose,0_2_0303E190
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: 0_2_0303DBC4 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,0_2_0303DBC4
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
            Source: TeikwYB2tm.exe, 00000000.00000003.1729787224.0000000000AEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: TeikwYB2tm.exe, 00000000.00000002.3520569510.0000000000A8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeAPI call chain: ExitProcess graph end nodegraph_0-2790
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: 0_2_034F5340 LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory,0_2_034F5340
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /valueJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /valueJump to behavior
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1722508242.000000007E870000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndTrayNotifyWndSysPagerToolbarWindow32U
            Source: TeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1722508242.000000007E870000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: explorer.exeShell_TrayWnd
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,0_2_0303E2C8
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0303D768
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeCode function: 0_2_034F5920 GetVersionExW,GetVersionExW,LoadLibraryW,0_2_034F5920
            Source: C:\Users\user\Desktop\TeikwYB2tm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: TeikwYB2tm.exe PID: 3180, type: MEMORYSTR
            Source: Yara matchFile source: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: TeikwYB2tm.exe PID: 3180, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: TeikwYB2tm.exe PID: 3180, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            12
            Process Injection
            1
            Virtualization/Sandbox Evasion
            OS Credential Dumping1
            System Time Discovery
            Remote ServicesData from Local System2
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            12
            Process Injection
            LSASS Memory11
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Multi-hop Proxy
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
            Process Discovery
            Distributed Component Object ModelInput Capture1
            Proxy
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
            System Owner/User Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync3
            File and Directory Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem153
            System Information Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            TeikwYB2tm.exe71%ReversingLabsWin32.Trojan.Danabot
            TeikwYB2tm.exe100%AviraTR/ATRAPS.Gen
            TeikwYB2tm.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://html4/loose.dtdTeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpfalse
              high
              http://www.openssl.org/support/faq.htmlRANDTeikwYB2tm.exe, 00000000.00000003.1725542855.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000002.3530091663.0000000063281000.00000040.00001000.00020000.00000000.sdmpfalse
                high
                http://.cssTeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpfalse
                  high
                  http://www.openssl.org/VTeikwYB2tm.exe, 00000000.00000002.3530091663.0000000063469000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1726265084.000000007EB44000.00000004.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1727745159.000000007EB1A000.00000004.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000002.3531904093.000000006E66F000.00000040.00001000.00020000.00000000.sdmpfalse
                    high
                    http://.jpgTeikwYB2tm.exe, 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmpfalse
                      high
                      http://www.openssl.org/support/faq.htmlTeikwYB2tm.exe, 00000000.00000003.1725542855.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, TeikwYB2tm.exe, 00000000.00000002.3530091663.0000000063281000.00000040.00001000.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        188.132.183.159
                        unknownTurkey
                        42910PREMIERDC-VERI-MERKEZI-ANONIM-SIRKETIPREMIERDC-SHTRtrue
                        206.206.125.221
                        unknownUnited States
                        13332HYPEENT-SJUStrue
                        94.131.118.216
                        unknownUkraine
                        29632NASSIST-ASGItrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1581418
                        Start date and time:2024-12-27 15:18:03 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 7s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Run name:Run with higher sleep bypass
                        Number of analysed new started processes analysed:8
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:TeikwYB2tm.exe
                        renamed because original name is a hash value
                        Original Sample Name:72b6b07175ef611ce7daa959a1248aae.exe
                        Detection:MAL
                        Classification:mal88.troj.evad.winEXE@6/0@0/3
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.63
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtEnumerateKey calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: TeikwYB2tm.exe
                        No simulations
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        188.132.183.159A4FY1OA97K.lnkGet hashmaliciousDanaBotBrowse
                          vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
                            206.206.125.221A4FY1OA97K.lnkGet hashmaliciousDanaBotBrowse
                              vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
                                94.131.118.216A4FY1OA97K.lnkGet hashmaliciousDanaBotBrowse
                                  vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    NASSIST-ASGIA4FY1OA97K.lnkGet hashmaliciousDanaBotBrowse
                                    • 94.131.118.216
                                    vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
                                    • 94.131.118.216
                                    https://reddsuth.outfitsrl.it/?46525SU=4TI90K00DGet hashmaliciousUnknownBrowse
                                    • 94.131.117.116
                                    tmpzNIZ0YQ.exeGet hashmaliciousScreenConnect ToolBrowse
                                    • 95.164.16.15
                                    H36NgltNe7.exeGet hashmaliciousScreenConnect ToolBrowse
                                    • 95.164.16.15
                                    lat0Kwfbuj.exeGet hashmaliciousScreenConnect ToolBrowse
                                    • 95.164.16.15
                                    Josho.m68k.elfGet hashmaliciousUnknownBrowse
                                    • 95.164.4.65
                                    J5uGzpvcAa.elfGet hashmaliciousUnknownBrowse
                                    • 95.164.4.65
                                    nPRmTlXhOT.elfGet hashmaliciousUnknownBrowse
                                    • 95.164.4.65
                                    HYPEENT-SJUSA4FY1OA97K.lnkGet hashmaliciousDanaBotBrowse
                                    • 206.206.125.221
                                    vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
                                    • 206.206.125.221
                                    YvITZPUmfd.ps1Get hashmaliciousUnknownBrowse
                                    • 206.206.127.152
                                    K05MQ5BcC8.lnkGet hashmaliciousDucktailBrowse
                                    • 206.206.126.252
                                    eQwUFcwrXk.lnkGet hashmaliciousDucktailBrowse
                                    • 206.206.126.252
                                    4YgQ2xN41W.lnkGet hashmaliciousRDPWrap Tool, DucktailBrowse
                                    • 206.206.126.252
                                    EERNI7eIS7.lnkGet hashmaliciousDucktailBrowse
                                    • 206.206.126.252
                                    cOOhDuNWt7.lnkGet hashmaliciousDucktailBrowse
                                    • 206.206.126.252
                                    O5PR3i6ILA.lnkGet hashmaliciousDucktailBrowse
                                    • 206.206.126.252
                                    PREMIERDC-VERI-MERKEZI-ANONIM-SIRKETIPREMIERDC-SHTRA4FY1OA97K.lnkGet hashmaliciousDanaBotBrowse
                                    • 188.132.183.159
                                    vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
                                    • 188.132.183.159
                                    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 78.135.74.199
                                    sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 78.135.115.141
                                    PO_63738373663838____________________________________________________________________________.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 188.132.193.46
                                    File07098.PDF.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 188.132.193.46
                                    Scan_20241030.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                    • 46.28.239.165
                                    dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 188.132.193.46
                                    nabm68k.elfGet hashmaliciousUnknownBrowse
                                    • 188.132.241.224
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):7.796835542143392
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.53%
                                    • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                    • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    File name:TeikwYB2tm.exe
                                    File size:4'277'248 bytes
                                    MD5:72b6b07175ef611ce7daa959a1248aae
                                    SHA1:bee9d33d83c98a7c2c3c9d0eb671fa1d53328378
                                    SHA256:8e6ae3b356d2205296fec0761daa461a311190e50e0e611699ebb4aad6e6cd77
                                    SHA512:56f0ee5ba99a55f05bfea0252b544d6dcac6cc22dbf430e228babd1520a14ea76429fcc8f67bcc0425f8d573211a1d1b47ba6164c136d8c2a85a26030cae9f52
                                    SSDEEP:98304:h+Dc6yHfpXZa1ZUVTZ2zsFi840WiRoYIUF4ZxStM3bQR:w9ylZIUVt2zd8rnH4jStM3bg
                                    TLSH:C016F122F64C667EE19F0E3A5477B590993F77A2A996DC1B47F00848CF358C0263A64F
                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x7eee00
                                    Entrypoint Section:.itext
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                    DLL Characteristics:
                                    Time Stamp:0x676939AA [Mon Dec 23 10:21:30 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:0
                                    File Version Major:5
                                    File Version Minor:0
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:0
                                    Import Hash:29e05b1fea10173c5bcc5ba6150988ec
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    add esp, FFFFFFE4h
                                    xor eax, eax
                                    mov dword ptr [ebp-1Ch], eax
                                    mov dword ptr [ebp-18h], eax
                                    mov eax, 007EA0C0h
                                    call 00007FC330B4FECDh
                                    xor eax, eax
                                    push ebp
                                    push 007EEF1Dh
                                    push dword ptr fs:[eax]
                                    mov dword ptr fs:[eax], esp
                                    call 00007FC330F28E2Eh
                                    cmp eax, 000000FAh
                                    jnl 00007FC330F2E8C2h
                                    call 00007FC330F28E7Ah
                                    cmp eax, 78h
                                    jnl 00007FC330F2E8B4h
                                    mov dword ptr [007FCFA0h], 00000001h
                                    mov dword ptr [007FCF9Ch], 001DBCD7h
                                    mov eax, dword ptr [007FCF9Ch]
                                    mov dword ptr [007FCFA4h], eax
                                    mov eax, dword ptr [007FCF9Ch]
                                    test eax, eax
                                    jl 00007FC330F2E81Eh
                                    inc eax
                                    mov dword ptr [ebp-14h], eax
                                    mov dword ptr [007FCF98h], 00000000h
                                    inc dword ptr [007FCFA0h]
                                    dec dword ptr [007FCFA4h]
                                    push 00000000h
                                    call 00007FC330B67EC9h
                                    inc dword ptr [007FCF98h]
                                    dec dword ptr [ebp-14h]
                                    jne 00007FC330F2E7D4h
                                    cmp dword ptr [007FCFA4h], FFFFFFFFh
                                    jne 00007FC330F2E854h
                                    lea edx, dword ptr [ebp-18h]
                                    mov ax, 0063h
                                    call 00007FC330F29155h
                                    mov eax, dword ptr [ebp-18h]
                                    mov edx, 007EEF38h
                                    call 00007FC330B4A3FCh
                                    je 00007FC330F2E839h
                                    call 00007FC330F29395h
                                    cmp eax, 0Ah
                                    jbe 00007FC330F2E82Fh
                                    call 00007FC330F393ABh
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x4000000x9a.edata
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x3fd0000x16c6.idata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x41d0000x3600.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4030000x191bc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x4020000x18.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x3fd4cc0x364.idata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3ff0000x278.didata
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x3ec91c0x3eca008a51d5ea5128862e1a11e09561809d2bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .itext0x3ee0000xf500x10003ff4032e721470ab7fd9881c45fc2fa7False0.55859375data6.1659912557301615IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .data0x3ef0000x7d680x7e0076a1a3204a87221df8dd865bb47ca72bFalse0.5639880952380952data6.352731899166621IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .bss0x3f70000x5fac0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .idata0x3fd0000x16c60x1800f83dfbc7a8d8169726b5b3aba8787951False0.3240559895833333data4.895786587173563IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .didata0x3ff0000x2780x4007a0cace727c21d6b42ac476919254aa3False0.26953125firmware 100 v0 (revision 2733719296) X\361? , version 54304.16640.10270 (region 2297446144), 0 bytes or less, UNKNOWN1 0x88f03f00, at 0 0 bytes , at 0 0 bytes , at 0x60524000 3629203456 bytes2.7239518130953684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .edata0x4000000x9a0x200a0c88ba38b9aab7813e23cf8cd967014False0.251953125data1.7841898411372727IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .tls0x4010000x200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rdata0x4020000x5c0x200610e9cb9d596ddf3f8481c9e9885e5feFalse0.1875data1.343433641850296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x4030000x191bc0x19200d5512eb7671fdcd3f815b8d69f577e2cFalse0.5867828824626866data6.708593676418638IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    .rsrc0x41d0000x36000x36004125734278c336b919f44073caff1eb1False0.2890625data3.700113224189507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_STRING0x41d3680x4e0data0.3333333333333333
                                    RT_STRING0x41d8480x310data0.35331632653061223
                                    RT_STRING0x41db580x330data0.39215686274509803
                                    RT_STRING0x41de880x4c4data0.3983606557377049
                                    RT_STRING0x41e34c0x4acdata0.32274247491638797
                                    RT_STRING0x41e7f80x3b4data0.3628691983122363
                                    RT_STRING0x41ebac0x440data0.38235294117647056
                                    RT_STRING0x41efec0x21cdata0.40555555555555556
                                    RT_STRING0x41f2080xbcdata0.6542553191489362
                                    RT_STRING0x41f2c40x100data0.62890625
                                    RT_STRING0x41f3c40x338data0.4223300970873786
                                    RT_STRING0x41f6fc0x478data0.29895104895104896
                                    RT_STRING0x41fb740x354data0.4107981220657277
                                    RT_STRING0x41fec80x2b8data0.4367816091954023
                                    RT_RCDATA0x4201800x10data1.5
                                    RT_RCDATA0x4201900x3a4data0.6030042918454935
                                    DLLImport
                                    oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                    advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                    user32.dllCharNextW, LoadStringW
                                    kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, GetStdHandle, CloseHandle
                                    kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
                                    user32.dllCreateWindowExW, UpdateWindow, TranslateMessage, SystemParametersInfoW, ShowWindow, RegisterClassW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, GetMessageW, EndPaint, DispatchMessageW, DefWindowProcW, CharUpperBuffW, CharUpperW, CharLowerBuffW, BeginPaint
                                    gdi32.dllSetBkColor, Rectangle
                                    version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
                                    kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, UnmapViewOfFile, SwitchToThread, SuspendThread, Sleep, SetThreadPriority, SetLastError, SetFileTime, SetFilePointer, SetEvent, SetEndOfFile, ResumeThread, ResetEvent, ReleaseSemaphore, ReadFile, RaiseException, QueryDosDeviceW, IsDebuggerPresent, MapViewOfFile, LocalFree, LoadLibraryA, LoadLibraryW, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GetVolumeInformationW, GetVersionExW, GetTimeZoneInformation, GetTickCount64, GetTickCount, GetThreadPriority, GetThreadLocale, GetSystemInfo, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLogicalDrives, GetLogicalDriveStringsW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesExW, GetFileAttributesW, GetExitCodeThread, GetDriveTypeW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeLibrary, FormatMessageW, FlushInstructionCache, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitProcess, EnumSystemLocalesW, EnumCalendarInfoW, EnterCriticalSection, DeleteCriticalSection, CreateSemaphoreA, CreateProcessW, CreatePipe, CreateFileMappingW, CreateFileW, CreateEventA, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle
                                    kernel32.dllSleep
                                    netapi32.dllNetApiBufferFree, NetWkstaGetInfo
                                    oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                    oleaut32.dllGetErrorInfo, SysFreeString
                                    ole32.dllCoCreateInstance, CoUninitialize, CoInitialize
                                    msvcrt.dllmemset, memmove, memcpy
                                    msvcrt.dll_beginthreadex
                                    winmm.dllwaveOutGetVolume
                                    NameOrdinalAddress
                                    TMethodImplementationIntercept30x782574
                                    __dbk_fcall_wrapper20x4103c4
                                    dbkFCallWrapperAddr10x7fa630
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-12-27T15:20:07.246361+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.449772188.132.183.159443TCP
                                    2024-12-27T15:20:08.319027+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.449773206.206.125.221443TCP
                                    2024-12-27T15:20:09.414745+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.44977994.131.118.216443TCP
                                    2024-12-27T15:20:10.510034+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.449780188.132.183.159443TCP
                                    2024-12-27T15:21:12.075984+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.449917188.132.183.159443TCP
                                    2024-12-27T15:21:13.334248+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.449921206.206.125.221443TCP
                                    2024-12-27T15:21:14.422566+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.44992294.131.118.216443TCP
                                    2024-12-27T15:21:15.511492+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.449928188.132.183.159443TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 27, 2024 15:19:01.670161963 CET49730443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:19:01.670274973 CET44349730188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:19:01.670485020 CET49730443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:19:01.736696005 CET49730443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:19:01.736759901 CET44349730188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:19:01.736819983 CET44349730188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:19:02.810554981 CET49731443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:19:02.810623884 CET44349731206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:19:02.810708046 CET49731443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:19:02.975316048 CET49731443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:19:02.975367069 CET44349731206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:19:02.975428104 CET44349731206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:19:03.989809036 CET49732443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:19:03.989857912 CET4434973294.131.118.216192.168.2.4
                                    Dec 27, 2024 15:19:03.990012884 CET49732443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:19:04.091602087 CET49732443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:19:04.091662884 CET4434973294.131.118.216192.168.2.4
                                    Dec 27, 2024 15:19:04.091726065 CET4434973294.131.118.216192.168.2.4
                                    Dec 27, 2024 15:19:04.091730118 CET49732443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:19:04.091753960 CET4434973294.131.118.216192.168.2.4
                                    Dec 27, 2024 15:19:05.114425898 CET49733443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:19:05.114494085 CET44349733188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:19:05.114821911 CET49733443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:19:05.197654963 CET49733443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:19:05.197684050 CET44349733188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:19:05.197695971 CET49733443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:19:05.197701931 CET44349733188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:19:05.197741032 CET44349733188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:07.161627054 CET49772443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:07.161649942 CET44349772188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:07.161746025 CET49772443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:07.246361017 CET49772443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:07.246372938 CET44349772188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:07.246433020 CET44349772188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:07.246447086 CET49772443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:07.246455908 CET44349772188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:08.255049944 CET49773443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:20:08.255094051 CET44349773206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:20:08.255153894 CET49773443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:20:08.319026947 CET49773443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:20:08.319046974 CET44349773206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:20:08.319078922 CET44349773206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:20:08.319099903 CET49773443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:20:08.319113016 CET44349773206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:20:09.333028078 CET49779443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:20:09.333066940 CET4434977994.131.118.216192.168.2.4
                                    Dec 27, 2024 15:20:09.333142996 CET49779443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:20:09.414745092 CET49779443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:20:09.414782047 CET4434977994.131.118.216192.168.2.4
                                    Dec 27, 2024 15:20:09.414809942 CET4434977994.131.118.216192.168.2.4
                                    Dec 27, 2024 15:20:09.414854050 CET49779443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:20:09.414869070 CET4434977994.131.118.216192.168.2.4
                                    Dec 27, 2024 15:20:10.432426929 CET49780443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.432481050 CET44349780188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.432576895 CET49780443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.510034084 CET49780443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.510054111 CET44349780188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.510092020 CET44349780188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.520472050 CET49781443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.520482063 CET44349781188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.520555973 CET49781443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.591244936 CET49781443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.591262102 CET44349781188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.591280937 CET49781443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.591284990 CET44349781188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.591290951 CET44349781188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.599145889 CET49782443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:20:10.599186897 CET44349782206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:20:10.599262953 CET49782443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:20:10.658435106 CET49782443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:20:10.658447027 CET44349782206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:20:10.658463955 CET49782443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:20:10.658473015 CET44349782206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:20:10.658485889 CET44349782206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:20:10.666424036 CET49783443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:20:10.666440964 CET4434978394.131.118.216192.168.2.4
                                    Dec 27, 2024 15:20:10.666517973 CET49783443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:20:10.728101015 CET49783443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:20:10.728112936 CET4434978394.131.118.216192.168.2.4
                                    Dec 27, 2024 15:20:10.728143930 CET4434978394.131.118.216192.168.2.4
                                    Dec 27, 2024 15:20:10.736293077 CET49784443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.736304045 CET44349784188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.736387014 CET49784443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.799280882 CET49784443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.799289942 CET44349784188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.799320936 CET44349784188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:20:10.799324989 CET49784443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:20:10.799331903 CET44349784188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:21:11.992747068 CET49917443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:21:11.992775917 CET44349917188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:21:11.992924929 CET49917443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:21:12.075984001 CET49917443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:21:12.076003075 CET44349917188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:21:12.076041937 CET44349917188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:21:12.076062918 CET49917443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:21:12.076075077 CET44349917188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:21:13.286688089 CET49921443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:21:13.286724091 CET44349921206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:21:13.286814928 CET49921443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:21:13.334248066 CET49921443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:21:13.334269047 CET44349921206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:21:13.334311962 CET44349921206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:21:13.334351063 CET49921443192.168.2.4206.206.125.221
                                    Dec 27, 2024 15:21:13.334366083 CET44349921206.206.125.221192.168.2.4
                                    Dec 27, 2024 15:21:14.349611044 CET49922443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:21:14.349648952 CET4434992294.131.118.216192.168.2.4
                                    Dec 27, 2024 15:21:14.349725962 CET49922443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:21:14.422565937 CET49922443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:21:14.422584057 CET4434992294.131.118.216192.168.2.4
                                    Dec 27, 2024 15:21:14.422637939 CET4434992294.131.118.216192.168.2.4
                                    Dec 27, 2024 15:21:14.422647953 CET49922443192.168.2.494.131.118.216
                                    Dec 27, 2024 15:21:14.422660112 CET4434992294.131.118.216192.168.2.4
                                    Dec 27, 2024 15:21:15.442734003 CET49928443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:21:15.442764044 CET44349928188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:21:15.442874908 CET49928443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:21:15.511492014 CET49928443192.168.2.4188.132.183.159
                                    Dec 27, 2024 15:21:15.511502981 CET44349928188.132.183.159192.168.2.4
                                    Dec 27, 2024 15:21:15.511553049 CET44349928188.132.183.159192.168.2.4

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:09:18:53
                                    Start date:27/12/2024
                                    Path:C:\Users\user\Desktop\TeikwYB2tm.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\TeikwYB2tm.exe"
                                    Imagebase:0x400000
                                    File size:4'277'248 bytes
                                    MD5 hash:72B6B07175EF611CE7DAA959A1248AAE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Borland Delphi
                                    Yara matches:
                                    • Rule: JoeSecurity_DanaBot_stealer_dll, Description: Yara detected DanaBot stealer dll, Source: 00000000.00000003.1723260670.000000007E960000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_DanaBot_stealer_dll, Description: Yara detected DanaBot stealer dll, Source: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Target ID:1
                                    Start time:09:18:57
                                    Start date:27/12/2024
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value
                                    Imagebase:0x240000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:09:18:57
                                    Start date:27/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:09:18:57
                                    Start date:27/12/2024
                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                    Wow64 process (32bit):true
                                    Commandline:wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value
                                    Imagebase:0x650000
                                    File size:427'008 bytes
                                    MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:17.1%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:6.8%
                                      Total number of Nodes:570
                                      Total number of Limit Nodes:17
                                      execution_graph 2595 3519234 WSAStartup GetLastError 3083 31dfbf8 3084 31dfc17 3083->3084 3085 31dfc02 3083->3085 3086 31dfc09 3085->3086 3087 31dfc27 3085->3087 3086->3084 3090 31df1d4 3086->3090 3095 31dfb08 3087->3095 3091 31df1e2 VariantClear 3090->3091 3093 31df1ef 3090->3093 3092 31df1ed 3091->3092 3092->3084 3093->3092 3094 31df25a VariantClear VariantInit 3093->3094 3094->3092 3096 31dfb17 3095->3096 3097 31dfb1e 3095->3097 3098 31df1d4 3 API calls 3096->3098 3099 31dfb2e VariantCopy 3097->3099 3100 31dfb3f 3097->3100 3098->3097 3102 31dfb3a 3099->3102 3101 31dfbe7 VariantCopy 3100->3101 3100->3102 3101->3102 3102->3084 2601 34ea408 2602 34ea44b 2601->2602 2603 34ea4a4 RegisterServiceCtrlHandlerExW 2602->2603 2604 34ea4b8 SetServiceStatus 2603->2604 2605 34ea519 2603->2605 2611 3039d58 2604->2611 2615 3039ee0 2605->2615 2608 34ea4ff 2610 34ea506 Sleep 2608->2610 2610->2605 2610->2610 2612 3039d75 2611->2612 2613 3039d94 CreateThread 2612->2613 2614 3039dbd 2613->2614 2618 3039d20 2613->2618 2614->2608 2616 3039ee6 SysFreeString 2615->2616 2617 3039ef4 2615->2617 2616->2617 2619 3039d28 2618->2619 3049 3039704 3050 3039715 3049->3050 3052 3039776 3049->3052 3051 303971e UnhandledExceptionFilter 3050->3051 3053 3039664 3050->3053 3051->3052 3051->3053 3053->3052 3056 3036fe0 3053->3056 3057 3039cbc 11 API calls 3056->3057 3058 3036feb 3057->3058 3059 303974a 3060 3039664 3059->3060 3061 3039776 3059->3061 3060->3061 3062 3036fe0 11 API calls 3060->3062 3063 30396fe 3062->3063 3103 303f568 3106 303eea8 3103->3106 3105 303f57f 3107 303ee3c 13 API calls 3106->3107 3108 303eed8 3107->3108 3109 303ef35 3108->3109 3110 303ef4f 3108->3110 3111 303ef09 3108->3111 3112 303cd60 32 API calls 3109->3112 3113 303cd60 32 API calls 3110->3113 3111->3105 3114 303ef4a 3112->3114 3113->3114 3115 303ee54 2 API calls 3114->3115 3115->3111 3116 34f5824 3120 30378e8 3116->3120 3119 34f58a5 3121 30378ef VerSetConditionMask VerifyVersionInfoW 3120->3121 3121->3119 3122 3036268 3123 30359d4 10 API calls 3122->3123 3124 3036274 3123->3124 2819 34f5340 LoadLibraryA GetProcAddress 2824 303cd60 2819->2824 2821 34f5393 2827 34f51e8 2821->2827 2830 303cab8 2824->2830 2826 303cd6a 2826->2821 3015 34f5180 2827->3015 2831 303caf6 2830->2831 2837 303cadb 2830->2837 2832 303cb64 2831->2832 2835 303cc31 2831->2835 2836 303cbcb 2832->2836 2841 303ca74 2832->2841 2834 303cb7c 2834->2836 2851 303bfd8 2834->2851 2835->2836 2858 303c100 2835->2858 2836->2837 2839 303cab8 32 API calls 2836->2839 2837->2826 2839->2836 2842 30411f8 11 API calls 2841->2842 2843 303ca7d 2842->2843 2844 303ca85 2843->2844 2846 303ca93 2843->2846 2845 30411f8 11 API calls 2844->2845 2847 303ca8a 2845->2847 2848 30411f8 11 API calls 2846->2848 2847->2834 2849 303caa1 2848->2849 2850 30411f8 11 API calls 2849->2850 2850->2847 2852 303bff4 2851->2852 2854 303c038 2851->2854 2853 303c0a1 2852->2853 2852->2854 2855 303c072 2852->2855 2853->2854 2862 303bcfc 2853->2862 2854->2836 2855->2854 2857 303bfd8 32 API calls 2855->2857 2857->2855 2859 303c111 2858->2859 2860 303c109 2858->2860 2859->2836 2991 303bec0 2860->2991 2863 303be9b 2862->2863 2866 303bd1f 2862->2866 2863->2853 2864 303bfd8 32 API calls 2864->2866 2865 303bcfc 32 API calls 2865->2866 2866->2863 2866->2864 2866->2865 2869 303f908 2866->2869 2875 303f8dc 2866->2875 2870 303f91a 2869->2870 2871 303f8dc 14 API calls 2870->2871 2872 303f92f 2871->2872 2879 303f870 2872->2879 2874 303f946 2874->2866 2876 303f901 2875->2876 2877 303f8e7 2875->2877 2876->2866 2980 303f8a8 2877->2980 2880 303f8a3 2879->2880 2881 303f87b 2879->2881 2880->2874 2883 303f4b0 2881->2883 2884 303f4d4 2883->2884 2885 303f4cc 2883->2885 2906 303f1f0 2884->2906 2895 303f34c 2885->2895 2888 303f4fc 2894 303f53f 2888->2894 2910 303f2b8 2888->2910 2921 303f258 2894->2921 2896 303f401 2895->2896 2897 303f365 2895->2897 2896->2884 2898 303f376 2897->2898 2925 30388d4 2897->2925 2929 3038a30 2898->2929 2901 303f3d4 2947 3038bc8 2901->2947 2905 303f3a5 2905->2901 2944 303f1dc 2905->2944 2907 303f203 2906->2907 2908 303f1f9 2906->2908 2907->2888 2909 3038a30 13 API calls 2908->2909 2909->2907 2911 303f2c0 2910->2911 2912 303f2c9 2911->2912 2976 303ed88 2911->2976 2914 303f06c 2912->2914 2915 303f086 2914->2915 2916 303f08f 2915->2916 2918 303f0a9 2915->2918 2917 303cd60 32 API calls 2916->2917 2920 303f0a4 2917->2920 2919 303cd60 32 API calls 2918->2919 2918->2920 2919->2920 2920->2894 2922 303f261 2921->2922 2923 303f268 2921->2923 2924 3038bc8 2 API calls 2922->2924 2923->2880 2924->2923 2926 30388dd 2925->2926 2928 30388e2 2925->2928 2952 30387a8 GetModuleHandleW GetProcAddress 2926->2952 2928->2898 2931 3038a3e 2929->2931 2932 3038a67 GetTickCount 2931->2932 2933 3038ad9 GetTickCount 2931->2933 2934 3038b10 GetTickCount 2931->2934 2935 3038a7f GetTickCount 2931->2935 2936 3038a8c 2931->2936 2938 3038aae GetCurrentThreadId 2931->2938 2958 3038ebc GetCurrentThreadId 2931->2958 2963 30386ec 2931->2963 2932->2931 2933->2931 2933->2936 2970 3038c28 2934->2970 2935->2931 2935->2936 2936->2905 2938->2936 2940 3038b3a GetTickCount 2941 3038b20 2940->2941 2941->2934 2941->2940 2942 3038ba4 2941->2942 2942->2936 2943 3038baa GetCurrentThreadId 2942->2943 2943->2936 2945 30388d4 5 API calls 2944->2945 2946 303f1e4 2945->2946 2946->2905 2974 30388bc GetCurrentThreadId 2947->2974 2949 3038bd3 2950 3038c28 Sleep 2949->2950 2951 3038bff 2949->2951 2950->2951 2951->2884 2953 30387d0 GetLogicalProcessorInformation 2952->2953 2957 3038818 2952->2957 2954 30387df GetLastError 2953->2954 2953->2957 2955 30387e9 2954->2955 2954->2957 2956 30387f1 GetLogicalProcessorInformation 2955->2956 2956->2957 2957->2928 2959 3038ed0 2958->2959 2960 3038ec9 2958->2960 2961 3038ef7 2959->2961 2962 3038ee4 GetCurrentThreadId 2959->2962 2960->2931 2961->2931 2962->2961 2964 30386f7 2963->2964 2965 3038745 2964->2965 2966 3038726 2964->2966 2967 303871d Sleep 2964->2967 2965->2931 2968 3038735 Sleep 2966->2968 2969 303873e SwitchToThread 2966->2969 2967->2965 2968->2965 2969->2965 2971 3038c81 2970->2971 2973 3038c3a 2970->2973 2971->2941 2972 3038c68 Sleep 2972->2973 2973->2971 2973->2972 2975 30388c9 2974->2975 2975->2949 2977 303ed93 2976->2977 2978 30388d4 5 API calls 2977->2978 2979 303ed9a 2978->2979 2979->2912 2981 303f8b9 2980->2981 2982 303f8ac 2980->2982 2981->2876 2984 303f588 2982->2984 2985 303f634 2984->2985 2986 303f5a8 2984->2986 2985->2981 2987 303f1f0 13 API calls 2986->2987 2988 303f5d0 2987->2988 2989 303f258 2 API calls 2988->2989 2990 303f60f 2989->2990 2990->2981 2992 303bed5 2991->2992 3000 303bef2 2991->3000 2993 303beda 2992->2993 2995 303bf26 2992->2995 2996 303bf65 2993->2996 2997 303bee9 2993->2997 2993->3000 2995->3000 3001 303a2ec 2995->3001 2998 303bec0 32 API calls 2996->2998 2996->3000 2997->3000 3008 303bb54 2997->3008 2998->2996 3000->2859 3002 303a313 3001->3002 3003 303a2f0 3001->3003 3002->2995 3004 3039e78 3003->3004 3007 303a303 SysReAllocStringLen 3003->3007 3005 3039ee6 SysFreeString 3004->3005 3006 3039ef4 3004->3006 3005->3006 3006->2995 3007->3002 3007->3004 3011 303bb79 3008->3011 3012 303bce3 3008->3012 3009 303f908 32 API calls 3009->3011 3010 303a2ec 2 API calls 3010->3011 3011->3009 3011->3010 3011->3012 3013 303bec0 32 API calls 3011->3013 3014 303bb54 32 API calls 3011->3014 3012->2997 3013->3011 3014->3011 3020 31dbf68 3015->3020 3017 34f51d5 3018 34f51a3 3018->3017 3019 31dbf68 14 API calls 3018->3019 3019->3017 3021 31dbf8e 3020->3021 3026 31dc878 3021->3026 3023 31dbfa0 3024 31dbfbd 3023->3024 3025 31dbfa4 VirtualProtect 3023->3025 3024->3018 3025->3024 3027 31dc88f 3026->3027 3028 31dca24 3027->3028 3030 31dc93c LoadLibraryW 3027->3030 3031 31dc958 LoadLibraryW 3027->3031 3032 31dc9db LoadLibraryW 3027->3032 3033 31dc974 LoadLibraryW 3027->3033 3034 31dc9f4 LoadLibraryW 3027->3034 3035 31dc990 LoadLibraryW 3027->3035 3036 31dca0d LoadLibraryW 3027->3036 3037 31dc9a9 LoadLibraryW 3027->3037 3038 31dc8e8 LoadLibraryW 3027->3038 3039 31dc904 LoadLibraryW 3027->3039 3040 31dc920 LoadLibraryW 3027->3040 3041 31dc9c2 LoadLibraryW 3027->3041 3029 31dca2c 3028->3029 3043 31dca4a 3028->3043 3045 31dcb90 3029->3045 3030->3028 3031->3028 3032->3028 3033->3028 3034->3028 3035->3028 3036->3028 3037->3028 3038->3028 3039->3028 3040->3028 3041->3028 3043->3023 3044 31dca37 3044->3043 3048 31dcbac 3045->3048 3046 31dcca3 LoadLibraryW 3046->3048 3047 31dccc8 3047->3044 3048->3046 3048->3047 3125 34f5920 3126 30378e8 3125->3126 3127 34f593e GetVersionExW 3126->3127 3128 34f597d 3127->3128 3129 34f5959 3127->3129 3131 34f59aa LoadLibraryW 3128->3131 3133 34f59cd 3128->3133 3130 34f5968 GetVersionExW 3129->3130 3130->3128 3134 3043758 3131->3134 3135 3043780 GetProcAddress 3134->3135 3137 304378c 3134->3137 3136 30437d8 3135->3136 3136->3133 3138 30437b1 GetProcAddress 3137->3138 3139 30437d0 3138->3139 3139->3133 2490 3035f50 2491 3035f60 2490->2491 2492 3035fe8 2490->2492 2495 3035fa4 2491->2495 2496 3035f6d 2491->2496 2493 3035ff1 2492->2493 2494 3035888 2492->2494 2499 3036009 2493->2499 2512 3036118 2493->2512 2498 3036263 2494->2498 2503 303598b 2494->2503 2504 30358ac VirtualQuery 2494->2504 2500 30359d4 10 API calls 2495->2500 2497 3035f78 2496->2497 2501 30359d4 10 API calls 2496->2501 2507 303602c 2499->2507 2513 30360f0 2499->2513 2532 3036010 2499->2532 2517 3035fbb 2500->2517 2520 3035f85 2501->2520 2502 303617c 2506 30359d4 10 API calls 2502->2506 2526 3036195 2502->2526 2505 303593e 2503->2505 2510 30359d4 10 API calls 2503->2510 2514 3035953 2504->2514 2515 30358e5 2504->2515 2529 303622c 2506->2529 2519 303606c Sleep 2507->2519 2507->2532 2508 3035fe1 2530 30359a2 2510->2530 2511 3035f9d 2512->2502 2518 3036154 Sleep 2512->2518 2512->2526 2516 30359d4 10 API calls 2513->2516 2540 30359d4 2514->2540 2515->2514 2525 3035912 VirtualAlloc 2515->2525 2533 30360f9 2516->2533 2517->2508 2522 3035d58 10 API calls 2517->2522 2518->2502 2523 303616e Sleep 2518->2523 2524 3036084 Sleep 2519->2524 2519->2532 2520->2511 2527 3035d58 10 API calls 2520->2527 2522->2508 2523->2512 2524->2507 2525->2514 2531 3035928 VirtualAlloc 2525->2531 2527->2511 2528 3036111 2529->2526 2534 3035d58 10 API calls 2529->2534 2530->2505 2537 3035d58 10 API calls 2530->2537 2531->2505 2531->2514 2533->2528 2535 3035d58 10 API calls 2533->2535 2536 3036250 2534->2536 2535->2528 2537->2505 2538 303595a 2538->2505 2564 3035d58 2538->2564 2541 3035c34 2540->2541 2542 30359ec 2540->2542 2543 3035bf8 2541->2543 2544 3035d4c 2541->2544 2551 30359fe 2542->2551 2554 3035a89 Sleep 2542->2554 2553 3035c12 Sleep 2543->2553 2555 3035c52 2543->2555 2545 3035780 VirtualAlloc 2544->2545 2546 3035d55 2544->2546 2548 30357bb 2545->2548 2549 30357ab 2545->2549 2546->2538 2547 3035a0d 2547->2538 2548->2538 2584 3035734 2549->2584 2551->2547 2552 3035aec 2551->2552 2558 3035acd Sleep 2551->2558 2563 3035af8 2552->2563 2589 30356b8 2552->2589 2553->2555 2556 3035c28 Sleep 2553->2556 2554->2551 2557 3035a9f Sleep 2554->2557 2559 30356b8 VirtualAlloc 2555->2559 2560 3035c70 2555->2560 2556->2543 2557->2542 2558->2552 2562 3035ae3 Sleep 2558->2562 2559->2560 2560->2538 2562->2551 2563->2538 2565 3035e50 2564->2565 2566 3035d6d 2564->2566 2567 30357e4 2565->2567 2568 3035d73 2565->2568 2566->2568 2571 3035dea Sleep 2566->2571 2569 3035f4a 2567->2569 2572 3035734 2 API calls 2567->2572 2570 3035d7c 2568->2570 2574 3035e2e Sleep 2568->2574 2578 3035e65 2568->2578 2569->2505 2570->2505 2571->2568 2573 3035e04 Sleep 2571->2573 2575 30357f5 2572->2575 2573->2566 2574->2578 2579 3035e44 Sleep 2574->2579 2576 3035825 2575->2576 2577 303580b VirtualFree 2575->2577 2580 303581c 2576->2580 2581 303582e VirtualQuery VirtualFree 2576->2581 2577->2580 2582 3035ee4 VirtualFree 2578->2582 2583 3035e88 2578->2583 2579->2568 2580->2505 2581->2576 2581->2580 2582->2505 2583->2505 2585 303573d 2584->2585 2586 303577c 2584->2586 2585->2586 2587 3035748 Sleep 2585->2587 2586->2548 2587->2586 2588 3035762 Sleep 2587->2588 2588->2585 2593 303564c 2589->2593 2591 30356c1 VirtualAlloc 2592 30356d8 2591->2592 2592->2563 2594 30355ec 2593->2594 2594->2591 3064 303f617 3065 303f634 3064->3065 3066 303f61d 3064->3066 3066->3065 3068 303ef98 3066->3068 3074 303ee3c 3068->3074 3073 303effc 3073->3065 3075 303ee50 3074->3075 3076 303ee45 3074->3076 3075->3073 3078 303ee54 3075->3078 3077 3038a30 13 API calls 3076->3077 3077->3075 3079 303ee65 3078->3079 3080 303ee5d 3078->3080 3079->3065 3081 3038bc8 2 API calls 3080->3081 3081->3079 3140 30417b0 3141 30417db 3140->3141 3142 304184c RaiseException 3141->3142 3152 3041874 3141->3152 3144 30418e1 3142->3144 3143 3041a13 3143->3144 3151 3041a17 GetLastError 3143->3151 3145 3041914 3148 3041963 3145->3148 3149 3041918 GetLastError 3145->3149 3146 3041909 LoadLibraryA 3146->3145 3147 3041987 3147->3143 3147->3144 3150 3041a07 GetProcAddress 3147->3150 3156 30419a4 FreeLibrary 3148->3156 3157 3041971 3148->3157 3153 3041929 3149->3153 3150->3143 3158 3041a28 3151->3158 3152->3144 3152->3145 3152->3146 3152->3147 3153->3148 3155 304193b RaiseException 3153->3155 3154 3041a3a RaiseException 3154->3144 3155->3144 3156->3147 3157->3147 3159 3041977 LocalAlloc 3157->3159 3158->3144 3158->3154 3159->3147 2596 352d444 2599 3041764 GetModuleHandleW 2596->2599 2598 352d454 2600 304179f 2599->2600 2600->2598 2620 31debe4 2625 304007c 2620->2625 2622 31dec04 2630 3039558 2622->2630 2627 3040084 2625->2627 2626 30400d1 2626->2622 2627->2626 2636 303d28c 2627->2636 2629 30400c0 LoadStringW 2629->2626 2631 3039566 2630->2631 2632 303955c 2630->2632 2635 30395a4 2631->2635 2776 3036fd4 2631->2776 2773 3039cc8 2632->2773 2637 303d29a 2636->2637 2638 303d2b9 2636->2638 2637->2638 2641 303d244 2637->2641 2638->2629 2642 303d254 GetModuleFileNameW 2641->2642 2643 303d270 2641->2643 2645 303e4b8 GetModuleFileNameW 2642->2645 2643->2629 2646 303e506 2645->2646 2651 303e394 2646->2651 2648 303e532 2649 303e544 LoadLibraryExW 2648->2649 2650 303e54c 2648->2650 2649->2650 2650->2643 2654 303e3b5 2651->2654 2652 303e43d 2652->2648 2654->2652 2669 303e0d0 2654->2669 2655 303e42a 2656 303e430 2655->2656 2657 303e43f GetUserDefaultUILanguage 2655->2657 2659 303e1fc 2 API calls 2656->2659 2673 303da80 EnterCriticalSection 2657->2673 2659->2652 2660 303e44c 2693 303e1fc 2660->2693 2662 303e459 2663 303e481 2662->2663 2664 303e467 GetSystemDefaultUILanguage 2662->2664 2663->2652 2697 303e2c8 2663->2697 2665 303da80 17 API calls 2664->2665 2667 303e474 2665->2667 2668 303e1fc 2 API calls 2667->2668 2668->2663 2670 303e0f2 2669->2670 2671 303e0fc 2669->2671 2705 303ddb4 2670->2705 2671->2655 2674 303dacc LeaveCriticalSection 2673->2674 2675 303daac 2673->2675 2742 3039e98 2674->2742 2677 303dabd LeaveCriticalSection 2675->2677 2681 303db6e 2677->2681 2678 303dadd IsValidLocale 2679 303db3b EnterCriticalSection 2678->2679 2680 303daec 2678->2680 2684 303db53 2679->2684 2682 303db00 2680->2682 2683 303daf5 2680->2683 2681->2660 2757 303d768 2682->2757 2744 303d964 GetThreadUILanguage 2683->2744 2688 303db64 LeaveCriticalSection 2684->2688 2687 303db09 GetSystemDefaultUILanguage 2687->2679 2689 303db13 2687->2689 2688->2681 2690 303db24 GetSystemDefaultUILanguage 2689->2690 2691 303d768 3 API calls 2690->2691 2692 303dafe 2691->2692 2692->2679 2695 303e21a 2693->2695 2694 303e295 2694->2662 2695->2694 2766 303e190 2695->2766 2771 3039f7c 2697->2771 2700 303e318 2701 303e190 2 API calls 2700->2701 2702 303e32c 2701->2702 2703 303e35a 2702->2703 2704 303e190 2 API calls 2702->2704 2703->2652 2704->2703 2706 303ddcb 2705->2706 2707 303dddf GetModuleFileNameW 2706->2707 2708 303ddf4 2706->2708 2707->2708 2709 303dfc3 2708->2709 2710 303de1c RegOpenKeyExW 2708->2710 2709->2671 2711 303de43 RegOpenKeyExW 2710->2711 2712 303dedd 2710->2712 2711->2712 2713 303de61 RegOpenKeyExW 2711->2713 2726 303dbc4 GetModuleHandleW 2712->2726 2713->2712 2715 303de7f RegOpenKeyExW 2713->2715 2715->2712 2717 303de9d RegOpenKeyExW 2715->2717 2716 303defb RegQueryValueExW 2718 303df4c RegQueryValueExW 2716->2718 2722 303df19 2716->2722 2717->2712 2721 303debb RegOpenKeyExW 2717->2721 2719 303df4a 2718->2719 2720 303df68 2718->2720 2724 303dfb2 RegCloseKey 2719->2724 2725 303df70 RegQueryValueExW 2720->2725 2721->2709 2721->2712 2723 303df21 RegQueryValueExW 2722->2723 2723->2719 2724->2671 2725->2719 2727 303dbfd 2726->2727 2728 303dbec GetProcAddress 2726->2728 2729 303dc13 2727->2729 2734 303dc5f 2727->2734 2738 303dba0 2727->2738 2728->2727 2729->2716 2732 303dba0 CharNextW 2732->2734 2733 303dba0 CharNextW 2733->2734 2734->2729 2734->2733 2735 303dce4 FindFirstFileW 2734->2735 2737 303dd4e lstrlenW 2734->2737 2735->2729 2736 303dd00 FindClose lstrlenW 2735->2736 2736->2729 2736->2734 2737->2734 2739 303dbae 2738->2739 2740 303dbbc 2739->2740 2741 303dba6 CharNextW 2739->2741 2740->2729 2740->2732 2741->2739 2743 3039e9e 2742->2743 2743->2678 2745 303d980 2744->2745 2746 303d9d9 2744->2746 2762 303d920 GetThreadPreferredUILanguages 2745->2762 2747 303d920 2 API calls 2746->2747 2754 303d9e1 2747->2754 2749 303d988 2749->2749 2751 303d9bd SetThreadPreferredUILanguages 2749->2751 2750 303da28 SetThreadPreferredUILanguages 2752 303d920 2 API calls 2750->2752 2751->2746 2753 303da3e 2752->2753 2755 303da59 SetThreadPreferredUILanguages 2753->2755 2756 303da69 2753->2756 2754->2750 2754->2756 2755->2756 2756->2692 2760 303d7a3 2757->2760 2758 303d80c IsValidLocale 2759 303d81f GetLocaleInfoW GetLocaleInfoW 2758->2759 2761 303d85a 2758->2761 2759->2761 2760->2758 2760->2761 2761->2687 2763 303d941 2762->2763 2764 303d95a 2762->2764 2765 303d94a GetThreadPreferredUILanguages 2763->2765 2764->2749 2765->2764 2767 303e1a5 2766->2767 2768 303e1c2 FindFirstFileW 2767->2768 2769 303e1d2 FindClose 2768->2769 2770 303e1d8 2768->2770 2769->2770 2770->2695 2772 3039f80 GetUserDefaultUILanguage GetLocaleInfoW 2771->2772 2772->2700 2779 3039cbc 2773->2779 2800 30411f8 2776->2800 2778 3036fd9 2778->2635 2782 3039b8c 2779->2782 2783 3039bb2 2782->2783 2784 3039ba8 2782->2784 2785 3039bc2 GetCurrentThreadId 2783->2785 2787 3039bcf 2783->2787 2792 3039af4 2784->2792 2785->2787 2788 3036fa0 8 API calls 2787->2788 2789 3039c5f FreeLibrary 2787->2789 2790 3039c87 ExitProcess 2787->2790 2788->2787 2789->2787 2793 3039b5b 2792->2793 2794 3039afe GetStdHandle WriteFile 2792->2794 2793->2783 2798 303a91c 2794->2798 2797 3039b4b GetStdHandle WriteFile 2797->2783 2799 303a922 2798->2799 2799->2797 2801 3041207 2800->2801 2802 304122d TlsGetValue 2800->2802 2801->2778 2803 3041237 2802->2803 2804 3041212 2802->2804 2803->2778 2808 30411b4 2804->2808 2807 3041226 2807->2778 2810 30411ba 2808->2810 2809 30411d3 2818 30411a0 LocalAlloc 2809->2818 2810->2809 2811 3039cc8 10 API calls 2810->2811 2817 30411e8 TlsGetValue 2810->2817 2811->2809 2813 30411da 2814 30411de 2813->2814 2815 30411ea TlsSetValue 2813->2815 2816 3039cc8 10 API calls 2814->2816 2815->2817 2816->2817 2817->2807 2818->2813 3082 31dc800 LoadLibraryW LoadLibraryW LoadLibraryW

                                      Control-flow Graph

                                      APIs
                                      • LoadLibraryA.KERNEL32(ntdll.dll,NtQueryVirtualMemory), ref: 034F535F
                                      • GetProcAddress.KERNEL32(00000000,ntdll.dll), ref: 034F5365
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: NtQueryVirtualMemory$ntdll.dll
                                      • API String ID: 2574300362-2623246514
                                      • Opcode ID: 7a7c80ee2de3e67a5f0eb4382ecf8c470ddccc159ac6d352839aab539016dd50
                                      • Instruction ID: d8784494bc42891a93fe8b68c5b471c337deb9b318040d0f6bc5fa2e128d1db3
                                      • Opcode Fuzzy Hash: 7a7c80ee2de3e67a5f0eb4382ecf8c470ddccc159ac6d352839aab539016dd50
                                      • Instruction Fuzzy Hash: C901A2B9A053049FD300EFA9F842E8A77E2A786200F1541A5D9009F7A9E7716906AF49

                                      Control-flow Graph

                                      APIs
                                      • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0303E388,?,?), ref: 0303E2FA
                                      • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0303E388,?,?), ref: 0303E303
                                        • Part of subcall function 0303E190: FindFirstFileW.KERNEL32(00000000,?,00000000,0303E1EE,?,00000001), ref: 0303E1C3
                                        • Part of subcall function 0303E190: FindClose.KERNEL32(00000000,00000000,?,00000000,0303E1EE,?,00000001), ref: 0303E1D3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                                      • String ID:
                                      • API String ID: 3216391948-0
                                      • Opcode ID: f827545e91c86f2c4c5fccaba2e42f40a3e809ade8904788966eceb1f1aae8f4
                                      • Instruction ID: 1b7ead4b2e0572ee8530dbda34ad6c12ee9ee0e0306a0fcededfbbe5a0452860
                                      • Opcode Fuzzy Hash: f827545e91c86f2c4c5fccaba2e42f40a3e809ade8904788966eceb1f1aae8f4
                                      • Instruction Fuzzy Hash: 6D117F79A05309AFDF00EFA8C991AEEB3BCEF86300F504575A915EB250DB745E04C665

                                      Control-flow Graph

                                      APIs
                                      • FindFirstFileW.KERNEL32(00000000,?,00000000,0303E1EE,?,00000001), ref: 0303E1C3
                                      • FindClose.KERNEL32(00000000,00000000,?,00000000,0303E1EE,?,00000001), ref: 0303E1D3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID:
                                      • API String ID: 2295610775-0
                                      • Opcode ID: 054b51e589a99371e38cf556ae0ea6699220a5ab169a7a12f1dbeb9972c43dc4
                                      • Instruction ID: 60eccd7c5bad8cb4ac5c3b286f408a3c6687a23ff9dfe9e22a518ab066e23e29
                                      • Opcode Fuzzy Hash: 054b51e589a99371e38cf556ae0ea6699220a5ab169a7a12f1dbeb9972c43dc4
                                      • Instruction Fuzzy Hash: AFF0E276502308AFCB50EBB8CC019DEF3FCEB8B31075106B0A814D7560EB349E009510

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0303DFD9,?,?), ref: 0303DDED
                                      • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0303DFD9,?,?), ref: 0303DE36
                                      • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0303DFD9,?,?), ref: 0303DE58
                                      • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0303DE76
                                      • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 0303DE94
                                      • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 0303DEB2
                                      • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 0303DED0
                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,0303DFBC,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0303DFD9), ref: 0303DF10
                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,0303DFBC,?,80000001), ref: 0303DF3B
                                      • RegCloseKey.ADVAPI32(?,0303DFC3,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,0303DFBC,?,80000001,Software\Embarcadero\Locales), ref: 0303DFB6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Open$QueryValue$CloseFileModuleName
                                      • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                                      • API String ID: 2701450724-3496071916
                                      • Opcode ID: c9000b965acb0c2b1794624cd1cceca7af3ec15e0d271a1ef3b67763ae1e4731
                                      • Instruction ID: 87d260e556bdc7e5b19a7a6e956225402b2c4cc08668f586a08d183932587dd3
                                      • Opcode Fuzzy Hash: c9000b965acb0c2b1794624cd1cceca7af3ec15e0d271a1ef3b67763ae1e4731
                                      • Instruction Fuzzy Hash: DD512179A4630CBEEB10EAA4CC81FEEB7FCEB4A704F500465B614EA191D6B09A44CA54

                                      Control-flow Graph

                                      APIs
                                      • Sleep.KERNEL32(00000000,?,?,00000000,030359CA), ref: 03035DEE
                                      • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,030359CA), ref: 03035E08
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: 49fc9990b3c1809f0ba52e288cb235bd2d3f251027d30ef21656a92a73245639
                                      • Instruction ID: 7c590631880fdbc82c43f0a74cd5bc5221875dae44eae1ebfe5d3ba72cd25c10
                                      • Opcode Fuzzy Hash: 49fc9990b3c1809f0ba52e288cb235bd2d3f251027d30ef21656a92a73245639
                                      • Instruction Fuzzy Hash: 6971C0756073008FD759DF28CD84B6ABBDDAF87310F1886AAD8848B3B5D6B09845CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 91 3035f50-3035f5a 92 3035f60-3035f6b 91->92 93 3035fe8-3035feb 91->93 96 3035fa4-3035fbd call 30359d4 92->96 97 3035f6d-3035f76 92->97 94 3035ff1-3036003 93->94 95 3036258-303625d 93->95 102 3036009-303600e 94->102 103 3036118-303611d 94->103 100 3036263-3036265 95->100 101 3035888-30358a6 95->101 120 3035fe3-3035fe6 96->120 121 3035fbf-3035fc5 96->121 98 3035f78-3035f7a 97->98 99 3035f7c-3035f87 call 30359d4 97->99 127 3035f89-3035f9d call 3035590 call 3035d58 99->127 128 3035f9f-3035fa1 99->128 111 303598b-303598f 101->111 112 30358ac-30358b5 101->112 108 3036010-3036014 102->108 109 3036018-303601e 102->109 106 3036123-303612b 103->106 107 3036210-303622f call 30359d4 103->107 106->107 116 3036131-3036138 106->116 150 3036202-3036206 107->150 151 3036231-3036237 107->151 118 3036020-3036026 109->118 119 3036035-3036050 109->119 113 3035991-3035999 111->113 114 303599b-30359a6 call 30359d4 111->114 122 30358b7-30358b9 112->122 123 30358bb 112->123 125 30359ca-30359d3 113->125 114->125 154 30359a8-30359ae 114->154 129 3036195-303619a 116->129 130 303613a-3036147 116->130 132 30360f0-30360fb call 30359d4 118->132 133 303602c-3036033 118->133 134 3036052-303605f 119->134 135 3036098-30360a5 119->135 136 3035fc7 121->136 137 3035fca-3035fe1 call 3035d58 121->137 124 30358bd-30358e3 VirtualQuery 122->124 123->124 145 3035953-303595e call 30359d4 124->145 146 30358e5-30358f7 124->146 127->128 141 30361a7-30361cb 129->141 142 303619c-30361a6 call 30355ac 129->142 139 3036149-3036152 130->139 140 303617c-3036189 130->140 185 3036113-3036117 132->185 186 30360fd-3036111 call 3035590 call 3035d58 132->186 133->108 133->119 143 3036061-303606a 134->143 144 3036090-3036095 134->144 147 30360b0-30360bf 135->147 148 30360a7-30360ad 135->148 136->137 137->120 139->130 155 3036154-303616c Sleep 139->155 156 303618b-3036193 140->156 157 3036209 140->157 160 30361d8-30361eb 141->160 161 30361cd-30361d4 141->161 142->141 143->134 159 303606c-3036082 Sleep 143->159 144->135 145->125 195 3035960-3035966 145->195 146->145 162 30358f9-303590e 146->162 163 30360c6-30360d6 147->163 164 30360c1 call 30355ac 147->164 148->163 167 3036239 151->167 168 303623c-3036256 call 3035560 call 3035d58 151->168 171 30359b0-30359b5 154->171 172 30359b8-30359c5 call 3035590 call 3035d58 154->172 155->140 173 303616e-3036179 Sleep 155->173 156->129 156->157 157->107 159->144 175 3036084-303608d Sleep 159->175 176 30361f4-3036200 160->176 179 30361ed-30361ef call 30355ec 160->179 161->176 177 3035912-3035926 VirtualAlloc 162->177 178 3035910 162->178 182 30360e2-30360ef 163->182 183 30360d8-30360dd call 30355ec 163->183 164->163 167->168 171->172 172->125 173->130 175->134 176->150 177->145 191 3035928-303593c VirtualAlloc 177->191 178->177 179->176 183->182 186->185 191->145 200 303593e-3035951 191->200 201 3035970-3035989 call 3035560 call 3035d58 195->201 202 3035968-303596d 195->202 200->125 201->125 202->201
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8ac5d97c4ed717f0289373e6e80ab9366db5a5a1b2b948655e74882c2918dfef
                                      • Instruction ID: e49a4e13dc8af8822bcf1136631420fb6775ef7675569dfb2cc64d1eb645ac13
                                      • Opcode Fuzzy Hash: 8ac5d97c4ed717f0289373e6e80ab9366db5a5a1b2b948655e74882c2918dfef
                                      • Instruction Fuzzy Hash: 81C103667127081BD714EA7C9CC47AEB3CE9BC7221F1C863AE654CF3A5DBA5D8468340

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 211 30359d4-30359e6 212 3035c34-3035c39 211->212 213 30359ec-30359fc 211->213 214 3035c3f-3035c50 212->214 215 3035d4c-3035d4f 212->215 216 3035a54-3035a5d 213->216 217 30359fe-3035a0b 213->217 218 3035c52-3035c6e 214->218 219 3035bf8-3035c05 214->219 220 3035780-30357a9 VirtualAlloc 215->220 221 3035d55-3035d57 215->221 216->217 224 3035a5f-3035a6b 216->224 222 3035a24-3035a30 217->222 223 3035a0d-3035a1a 217->223 226 3035c70-3035c78 218->226 227 3035c7c-3035c8b 218->227 219->218 232 3035c07-3035c10 219->232 228 30357db-30357e1 220->228 229 30357ab-30357d8 call 3035734 220->229 233 3035a32-3035a40 222->233 234 3035aa8-3035ab1 222->234 230 3035a44-3035a51 223->230 231 3035a1c-3035a20 223->231 224->217 225 3035a6d-3035a79 224->225 225->217 235 3035a7b-3035a87 225->235 236 3035cd8-3035cee 226->236 238 3035ca4-3035cac 227->238 239 3035c8d-3035ca1 227->239 229->228 232->219 242 3035c12-3035c26 Sleep 232->242 240 3035ab3-3035ac0 234->240 241 3035aec-3035af6 234->241 235->216 243 3035a89-3035a99 Sleep 235->243 250 3035cf0-3035cfe 236->250 251 3035d07-3035d13 236->251 245 3035cc8-3035cca call 30356b8 238->245 246 3035cae-3035cc6 238->246 239->236 240->241 247 3035ac2-3035acb 240->247 248 3035b68-3035b74 241->248 249 3035af8-3035b23 241->249 242->218 252 3035c28-3035c2f Sleep 242->252 243->217 255 3035a9f-3035aa6 Sleep 243->255 256 3035ccf-3035cd7 245->256 246->256 247->240 257 3035acd-3035ae1 Sleep 247->257 253 3035b76-3035b88 248->253 254 3035b9c-3035bab call 30356b8 248->254 259 3035b25-3035b33 249->259 260 3035b3c-3035b4a 249->260 250->251 261 3035d00 250->261 262 3035d15-3035d28 251->262 263 3035d34 251->263 252->219 264 3035b8a 253->264 265 3035b8c-3035b9a 253->265 274 3035bbd-3035bf6 254->274 279 3035bad-3035bb7 254->279 255->216 257->241 268 3035ae3-3035aea Sleep 257->268 259->260 269 3035b35 259->269 270 3035bb8 260->270 271 3035b4c-3035b66 call 30355ec 260->271 261->251 266 3035d39-3035d4b 262->266 272 3035d2a-3035d2f call 30355ec 262->272 263->266 264->265 265->274 268->240 269->260 270->274 271->274 272->266
                                      APIs
                                      • Sleep.KERNEL32(00000000,FFFFFFDC,030359A2), ref: 03035A8B
                                      • Sleep.KERNEL32(0000000A,00000000,FFFFFFDC,030359A2), ref: 03035AA1
                                      • Sleep.KERNEL32(00000000,?,?,FFFFFFDC,030359A2), ref: 03035ACF
                                      • Sleep.KERNEL32(0000000A,00000000,?,?,FFFFFFDC,030359A2), ref: 03035AE5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: c3041564ef0f372f77f9ec4fc52fe788069362273baf28f78e4f3f811e45bf48
                                      • Instruction ID: 070dcb4f9d68577dfb11fedd311fc0773e92d10b5580b0542ea69a616bd23930
                                      • Opcode Fuzzy Hash: c3041564ef0f372f77f9ec4fc52fe788069362273baf28f78e4f3f811e45bf48
                                      • Instruction Fuzzy Hash: 5EC117726037518FC715DF2DDC84B59BBE8AB87310F0882AED4958F3A9C7B0944ADB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 287 31dbf68-31dbfa2 call 303a364 call 31dc878 292 31dbfbd-31dbfd2 call 3039ebc 287->292 293 31dbfa4-31dbfba VirtualProtect 287->293 293->292
                                      APIs
                                      • VirtualProtect.KERNEL32(?,?,?,?,00000000,031DBFD3), ref: 031DBFB4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: VirtualProtect
                                      • API String ID: 544645111-268857135
                                      • Opcode ID: 4bdec769fbf6c133dc8f91e0e9c16393c6610e3a7b6ae3c27e1d0055b6f534bf
                                      • Instruction ID: 858a9da7283ee16e2d6c2e5bc44df6a2f205672bce434702fa34978da86f69ad
                                      • Opcode Fuzzy Hash: 4bdec769fbf6c133dc8f91e0e9c16393c6610e3a7b6ae3c27e1d0055b6f534bf
                                      • Instruction Fuzzy Hash: E3F03C7A608308AFCB00EFA8D850D9EBBEDEB4E210B518464F915DB790D7309A10CF95

                                      Control-flow Graph

                                      APIs
                                      • GetUserDefaultUILanguage.KERNEL32(00000000,0303E4AB,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0303E532,00000000,?,00000105), ref: 0303E43F
                                      • GetSystemDefaultUILanguage.KERNEL32(00000000,0303E4AB,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0303E532,00000000,?,00000105), ref: 0303E467
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: DefaultLanguage$SystemUser
                                      • String ID:
                                      • API String ID: 384301227-0
                                      • Opcode ID: 31f20ce23028f4b926e3b29c3d09689a09c2f029af737b09829e63497193ed99
                                      • Instruction ID: cc36092d8a7af8e37d416bf88cf1ce8976819f9bcf41a7c8e6dc9556417c380e
                                      • Opcode Fuzzy Hash: 31f20ce23028f4b926e3b29c3d09689a09c2f029af737b09829e63497193ed99
                                      • Instruction Fuzzy Hash: 68314139A163199FDF10EB98C880BEEB7FDEF8A300F504A65D401AB650D774AD81CB91

                                      Control-flow Graph

                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0303E572,?,00400000,0352EC1C,?,0303D270,00400000,?,0000020A,00400000,0352EC1C,0303D2B0), ref: 0303E4F4
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0303E572,?,00400000,0352EC1C,?,0303D270,00400000,?,0000020A), ref: 0303E545
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileLibraryLoadModuleName
                                      • String ID:
                                      • API String ID: 1159719554-0
                                      • Opcode ID: 206b741c62a37bf84fad333a77457f1f4d58289bf67cf3d187f96ff13f3645d6
                                      • Instruction ID: 9443ff2b8363d47f1b5135c1674007e3179555070e0745258d50ed050b7c78e6
                                      • Opcode Fuzzy Hash: 206b741c62a37bf84fad333a77457f1f4d58289bf67cf3d187f96ff13f3645d6
                                      • Instruction Fuzzy Hash: 96119E75A4131C9FDB10EB64CC85BDEB3BCEB86300F5141A5A408AB290EBB05F84CEA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 382 3519234-3519259 WSAStartup GetLastError
                                      APIs
                                      • WSAStartup.WS2_32(00000101,?), ref: 03519249
                                      • GetLastError.KERNEL32(?,03520B4F,00000000,03520EDA), ref: 0351924E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorLastStartup
                                      • String ID:
                                      • API String ID: 1235836516-0
                                      • Opcode ID: d0ae1a61364f19c51dbc86b56a314533f706d8ca4255612c41436a9af4e94cd5
                                      • Instruction ID: 00f26a3b2b9017410001618dcde286dde1cf5852962f77fe7c70ac03220d070c
                                      • Opcode Fuzzy Hash: d0ae1a61364f19c51dbc86b56a314533f706d8ca4255612c41436a9af4e94cd5
                                      • Instruction Fuzzy Hash: 03C0807495130C6BDB50EAD85C029D9B35C8740300F0001F25E0CCA242F9F15F5006E2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 383 3039d58-3039d73 384 3039d83-3039d91 call 3036edc 383->384 385 3039d75-3039d81 383->385 389 3039d94-3039dbb CreateThread 384->389 385->389 390 3039dc4-3039dcc 389->390 391 3039dbd-3039dbf call 3036ef8 389->391 391->390
                                      APIs
                                      • CreateThread.KERNEL32(?,?,03039D20,00000000,?,?), ref: 03039DB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateThread
                                      • String ID:
                                      • API String ID: 2422867632-0
                                      • Opcode ID: c6d1da81cfff620c06ad70b8f4dba22db1f8f1893efa614a394137d94adbdf26
                                      • Instruction ID: 174df1e67bde71c57343014bdc216a318dd56c28182050fe2a7bad51abad760c
                                      • Opcode Fuzzy Hash: c6d1da81cfff620c06ad70b8f4dba22db1f8f1893efa614a394137d94adbdf26
                                      • Instruction Fuzzy Hash: D301A272B06218AFCB10DB9CD881B9EB7ECEB4A260F044066F508DB390D7B1DD05C7A0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 393 303d244-303d252 394 303d254-303d26b GetModuleFileNameW call 303e4b8 393->394 395 303d27f-303d28a 393->395 397 303d270-303d277 394->397 397->395 398 303d279-303d27c 397->398 398->395
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00400000,?,0000020A,00400000,0352EC1C,0303D2B0,?,?,030400C0), ref: 0303D262
                                        • Part of subcall function 0303E4B8: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0303E572,?,00400000,0352EC1C,?,0303D270,00400000,?,0000020A,00400000,0352EC1C,0303D2B0), ref: 0303E4F4
                                        • Part of subcall function 0303E4B8: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0303E572,?,00400000,0352EC1C,?,0303D270,00400000,?,0000020A), ref: 0303E545
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileModuleName$LibraryLoad
                                      • String ID:
                                      • API String ID: 4113206344-0
                                      • Opcode ID: 7c1ee64858cc89b131c1bcaaf4c5d23a408bec5d341bc7def07cd761b0403ce4
                                      • Instruction ID: 04b0caaf119848ebc12afa8df296a9fd0da261879702cf59f32db42bcfc93459
                                      • Opcode Fuzzy Hash: 7c1ee64858cc89b131c1bcaaf4c5d23a408bec5d341bc7def07cd761b0403ce4
                                      • Instruction Fuzzy Hash: 0EE06DB1A053108BCF10DE6CC8C0A8633ECAB1A650F040690EC28CF346D370C91087E1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 399 30356b8-30356d6 call 303564c VirtualAlloc 402 3035726-3035731 399->402 403 30356d8-3035725 399->403
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,03035CCF,FFFFFFDC,030359A2), ref: 030356CF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: a1dbebc14b1cf82cefcdd298b4fbff3809571e9ddc89c1972bcf4e1c8f9e948f
                                      • Instruction ID: 9f166e00d8c7891c941157d93fc849b57a91c80c3fcf7c9d74c672c8a4b23481
                                      • Opcode Fuzzy Hash: a1dbebc14b1cf82cefcdd298b4fbff3809571e9ddc89c1972bcf4e1c8f9e948f
                                      • Instruction Fuzzy Hash: 91F08CF2B013014BD714EF7CAE40B42BBD4A74A350F10413EE989EB7A8D7B088069780
                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,0303DEFB,00000000,0303DFBC,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0303DFD9), ref: 0303DBE1
                                      • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0303DBF2
                                      • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?,?,0303DEFB,00000000,0303DFBC,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?), ref: 0303DCF2
                                      • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?,?,0303DEFB,00000000,0303DFBC,?,80000001,Software\Embarcadero\Locales,00000000,000F0019), ref: 0303DD04
                                      • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?,?,0303DEFB,00000000,0303DFBC,?,80000001,Software\Embarcadero\Locales,00000000), ref: 0303DD10
                                      • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?,?,0303DEFB,00000000,0303DFBC,?,80000001,Software\Embarcadero\Locales), ref: 0303DD55
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                      • String ID: GetLongPathNameW$\$kernel32.dll
                                      • API String ID: 1930782624-3908791685
                                      • Opcode ID: 0d23aaefe6f25a056b6beafa3495d6553f1a85efaebc51c047767e52c346556a
                                      • Instruction ID: c7e37dc8f8f00e112f3fa18d479a33ed06d739d8563a9fe631ac6d1183a3967d
                                      • Opcode Fuzzy Hash: 0d23aaefe6f25a056b6beafa3495d6553f1a85efaebc51c047767e52c346556a
                                      • Instruction Fuzzy Hash: E341B275E02619DBCB10EFA8CC84BEDB3FDAF87310F1885A5D404EB254E7B59E458A84
                                      APIs
                                      • GetVersionExW.KERNEL32(?,?,?,?,?,034F5B9D), ref: 034F594B
                                      • GetVersionExW.KERNEL32(?,?,?,?,?,?,034F5B9D), ref: 034F5975
                                      • LoadLibraryW.KERNEL32(ntdll.dll,RtlGetVersion,00000000,034F5AD5,?,?,?,?,?,?,034F5B9D), ref: 034F59C2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Version$LibraryLoad
                                      • String ID: RtlGetVersion$ntdll.dll
                                      • API String ID: 192404683-1489217083
                                      • Opcode ID: 02e7297d7c1aff95bbbee10ec2976115df64d2bdbb44b4052ea0c0b9f4aab662
                                      • Instruction ID: 57f7acb4ca9db25b105b82fdc623df26f4a1bd301f0e2a56e16928cbf18daaf1
                                      • Opcode Fuzzy Hash: 02e7297d7c1aff95bbbee10ec2976115df64d2bdbb44b4052ea0c0b9f4aab662
                                      • Instruction Fuzzy Hash: 5A51BF78A04218EFCB14DBA8C585ADEBBF5EF4A310F6984E6E508AB351D3309F40DB54
                                      APIs
                                      • IsValidLocale.KERNEL32(?,00000002,00000000,0303D8CD,?,?,?,00000000), ref: 0303D812
                                      • GetLocaleInfoW.KERNEL32(00000000,00000059,?,00000055,?,00000002,00000000,0303D8CD,?,?,?,00000000), ref: 0303D82E
                                      • GetLocaleInfoW.KERNEL32(00000000,0000005A,?,00000055,00000000,00000059,?,00000055,?,00000002,00000000,0303D8CD,?,?,?,00000000), ref: 0303D83F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$Info$Valid
                                      • String ID:
                                      • API String ID: 1826331170-0
                                      • Opcode ID: bf8c1d3b34de2e4a6edcaba678793317009f63928f2891bb9921bc2a87231bcb
                                      • Instruction ID: 861e3cf6341f69476fa17ae50d1ecca5e161ea8b5f45a204c5a4712edf694636
                                      • Opcode Fuzzy Hash: bf8c1d3b34de2e4a6edcaba678793317009f63928f2891bb9921bc2a87231bcb
                                      • Instruction Fuzzy Hash: 41319C34A05708AFDB21EB64CC85BDFB7BDFB86701F0104A5A509AB260D7346E85CE10
                                      APIs
                                      • LoadLibraryW.KERNEL32(user32.dll), ref: 031DC8ED
                                      • LoadLibraryW.KERNEL32(ntdll.dll,user32.dll), ref: 031DC909
                                      • LoadLibraryW.KERNEL32(advapi32.dll,ntdll.dll,user32.dll), ref: 031DC925
                                      • LoadLibraryW.KERNEL32(shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031DC941
                                      • LoadLibraryW.KERNEL32(ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031DC95D
                                      • LoadLibraryW.KERNEL32(ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031DC979
                                      • LoadLibraryW.KERNEL32(wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031DC995
                                      • LoadLibraryW.KERNEL32(wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031DC9AE
                                      • LoadLibraryW.KERNEL32(crypt32.dll,wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031DC9C7
                                      • LoadLibraryW.KERNEL32(PSAPI.dll,crypt32.dll,wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031DC9E0
                                      • LoadLibraryW.KERNEL32(gdi32.dll,PSAPI.dll,crypt32.dll,wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031DC9F9
                                      • LoadLibraryW.KERNEL32(Iphlpapi.dll,gdi32.dll,PSAPI.dll,crypt32.dll,wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031DCA12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: Iphlpapi.dll$PSAPI.dll$advapi32.dll$crypt32.dll$gdi32.dll$ntdll.dll$ole32.dll$shell32.dll$user32.dll$wininet.dll$ws2_32.dll$wtsapi32.dll
                                      • API String ID: 1029625771-1098239973
                                      • Opcode ID: 3975d3c85268dbc9ea8c80ad758cf0f04acbbf7a41f100d43bd856217bfc2e53
                                      • Instruction ID: 64ac4ea21f1e0b87623313255f61217087712a5a630b22e09ac74a41a7925013
                                      • Opcode Fuzzy Hash: 3975d3c85268dbc9ea8c80ad758cf0f04acbbf7a41f100d43bd856217bfc2e53
                                      • Instruction Fuzzy Hash: 9A4116B8945319EFCB40EFA8D540A9CBBF4EB4F300F1068A6D406A7394E3309A55EF91
                                      APIs
                                      • EnterCriticalSection.KERNEL32(0356EC14,00000000,0303DB84,?,?,?,00000000,?,0303E44C,00000000,0303E4AB,?,?,00000000,00000000,00000000), ref: 0303DA9E
                                      • LeaveCriticalSection.KERNEL32(0356EC14,0356EC14,00000000,0303DB84,?,?,?,00000000,?,0303E44C,00000000,0303E4AB,?,?,00000000,00000000), ref: 0303DAC2
                                      • LeaveCriticalSection.KERNEL32(0356EC14,0356EC14,00000000,0303DB84,?,?,?,00000000,?,0303E44C,00000000,0303E4AB,?,?,00000000,00000000), ref: 0303DAD1
                                      • IsValidLocale.KERNEL32(00000000,00000002,0356EC14,0356EC14,00000000,0303DB84,?,?,?,00000000,?,0303E44C,00000000,0303E4AB), ref: 0303DAE3
                                      • EnterCriticalSection.KERNEL32(0356EC14,00000000,00000002,0356EC14,0356EC14,00000000,0303DB84,?,?,?,00000000,?,0303E44C,00000000,0303E4AB), ref: 0303DB40
                                      • LeaveCriticalSection.KERNEL32(0356EC14,0356EC14,00000000,00000002,0356EC14,0356EC14,00000000,0303DB84,?,?,?,00000000,?,0303E44C,00000000,0303E4AB), ref: 0303DB69
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CriticalSection$Leave$Enter$LocaleValid
                                      • String ID: en-GB,en,en-US,
                                      • API String ID: 975949045-3021119265
                                      • Opcode ID: c55af10da9e914e28344fa1917252de1a03df9edcfc06cb00968efc688560789
                                      • Instruction ID: 4204d036d54b1269eb7f58d8c8a8a8b28b253dd14dc526d382801f667232c25b
                                      • Opcode Fuzzy Hash: c55af10da9e914e28344fa1917252de1a03df9edcfc06cb00968efc688560789
                                      • Instruction Fuzzy Hash: B421AF2C7077409EEB21F67CAE52ADE72DCABC7A04F544821A4009F265DBB48D4292A7
                                      APIs
                                      • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 030387BD
                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 030387C3
                                      • GetLogicalProcessorInformation.KERNEL32(00000000,?,GetLogicalProcessorInformation), ref: 030387D6
                                      • GetLastError.KERNEL32(00000000,?,GetLogicalProcessorInformation), ref: 030387DF
                                      • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,03038856,?,00000000,?,GetLogicalProcessorInformation), ref: 0303880A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                                      • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                                      • API String ID: 1184211438-79381301
                                      • Opcode ID: a97eb33e81b90b21f46402a9fde91b1531bcbb16ead26c9a26fefc0f943a32c9
                                      • Instruction ID: e7f3f5fbc3e3ca5d96950c051b862651597016a5edc2054b39b8de9b8ea97066
                                      • Opcode Fuzzy Hash: a97eb33e81b90b21f46402a9fde91b1531bcbb16ead26c9a26fefc0f943a32c9
                                      • Instruction Fuzzy Hash: 63119A74D06208AFDB50EBE5D844AADB7FCEB83604F18C4E5E8249B241D6B88A48CB10
                                      APIs
                                      • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 03041868
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionRaise
                                      • String ID:
                                      • API String ID: 3997070919-0
                                      • Opcode ID: cead995a3e7ff42fc1488a61f7a585b1b53761eb4037c2d5bb98cb403747b57b
                                      • Instruction ID: 4cb2eba6ca95f50877edfc2510dae6017a237c33a2d1c455e6cc295b38a94d46
                                      • Opcode Fuzzy Hash: cead995a3e7ff42fc1488a61f7a585b1b53761eb4037c2d5bb98cb403747b57b
                                      • Instruction Fuzzy Hash: DEA151B6D023099FDB18DFE8D980BEEB7F5BF88310F144129E515AB294D770AA85CB50
                                      APIs
                                        • Part of subcall function 03038EBC: GetCurrentThreadId.KERNEL32 ref: 03038EBF
                                      • GetTickCount.KERNEL32 ref: 03038A67
                                      • GetTickCount.KERNEL32 ref: 03038A7F
                                      • GetCurrentThreadId.KERNEL32 ref: 03038AAE
                                      • GetTickCount.KERNEL32 ref: 03038AD9
                                      • GetTickCount.KERNEL32 ref: 03038B10
                                      • GetTickCount.KERNEL32 ref: 03038B3A
                                      • GetCurrentThreadId.KERNEL32 ref: 03038BAA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CountTick$CurrentThread
                                      • String ID:
                                      • API String ID: 3968769311-0
                                      • Opcode ID: 334de6b1ea59f430219e0b9565897576ea6be5c1f1578cde0f0c576637bf975a
                                      • Instruction ID: dea2836f4fefc0e7fb395f1e3e5f0b19582613d27afa0061088d7529f9c5190a
                                      • Opcode Fuzzy Hash: 334de6b1ea59f430219e0b9565897576ea6be5c1f1578cde0f0c576637bf975a
                                      • Instruction Fuzzy Hash: 4841867020A7429EE761DE7CC88435EBBD9AF87250F1CCDACE4E887291E77494888752
                                      APIs
                                      • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,03039BB2,?,?,00000000,00000000,03039CC6,03039CE0,?,?,030411E8), ref: 03039B2D
                                      • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,03039BB2,?,?,00000000,00000000,03039CC6,03039CE0), ref: 03039B33
                                      • GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,03039BB2,?,?,00000000), ref: 03039B4E
                                      • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,03039BB2,?,?), ref: 03039B54
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileHandleWrite
                                      • String ID: Error$Runtime error at 00000000
                                      • API String ID: 3320372497-2970929446
                                      • Opcode ID: 29997cdf5f33c274c0fbf3f8a66432380616ef38b5d42a003f00f6829c5999b8
                                      • Instruction ID: 20f5604dc83098d87eb75368693cb3217db80cad082955f38ddca83e25cfcf86
                                      • Opcode Fuzzy Hash: 29997cdf5f33c274c0fbf3f8a66432380616ef38b5d42a003f00f6829c5999b8
                                      • Instruction Fuzzy Hash: 0CF0F6A57463447DE610F36C9D47FAE269CA7CBE10F580646F2A0AE0F9C7F44488A661
                                      APIs
                                      • LoadLibraryW.KERNEL32(user32.dll,03520B3B,00000000,03520EDA), ref: 031DC805
                                      • LoadLibraryW.KERNEL32(kernel32.dll,user32.dll,03520B3B,00000000,03520EDA), ref: 031DC814
                                      • LoadLibraryW.KERNEL32(ntdll.dll,kernel32.dll,user32.dll,03520B3B,00000000,03520EDA), ref: 031DC823
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: kernel32.dll$ntdll.dll$user32.dll
                                      • API String ID: 1029625771-3818928520
                                      • Opcode ID: 2746eddd6e31c8e1d280b80fcc1a878c400e93500d151ddf92a1191c000f7ee9
                                      • Instruction ID: 2f6d080cadefe45eaec877a989b5ccf18006278f127056fe67860f0e98a5adfd
                                      • Opcode Fuzzy Hash: 2746eddd6e31c8e1d280b80fcc1a878c400e93500d151ddf92a1191c000f7ee9
                                      • Instruction Fuzzy Hash: 30C002F89C23006FDE90FB645402C6C2694E686A02B4025A99419AB269DB700535EBD2
                                      APIs
                                      • GetThreadUILanguage.KERNEL32(?,00000000), ref: 0303D975
                                      • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 0303D9D3
                                      • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 0303DA30
                                      • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 0303DA63
                                        • Part of subcall function 0303D920: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,0303D9E1), ref: 0303D937
                                        • Part of subcall function 0303D920: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,0303D9E1), ref: 0303D954
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3523801989.0000000003031000.00000040.00001000.00020000.00000000.sdmp, Offset: 03030000, based on PE: true
                                      • Associated: 00000000.00000002.3523781650.0000000003030000.00000004.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003049000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.0000000003571000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000002.3523801989.000000000357D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3030000_TeikwYB2tm.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Thread$LanguagesPreferred$Language
                                      • String ID:
                                      • API String ID: 2255706666-0
                                      • Opcode ID: 12b70224aa3aa58a575249c87bc94fc6c8d178ff65c1095b8b4a92774ed71286
                                      • Instruction ID: bb25dac6c3f43f14fcd2e288cf97e13e6419ad030ac22753cff763891fb5de1d
                                      • Opcode Fuzzy Hash: 12b70224aa3aa58a575249c87bc94fc6c8d178ff65c1095b8b4a92774ed71286
                                      • Instruction Fuzzy Hash: C7315C75A0521EABDB10EFE8D884AEEB3FCFF45300F044566E555EB290DB749A09CB50