Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZYs8m30VE5.exe

Overview

General Information

Sample name:ZYs8m30VE5.exe
renamed because original name is a hash value
Original sample name:fa5af574f7542f9f4c541c91b8c760bb.exe
Analysis ID:1581611
MD5:fa5af574f7542f9f4c541c91b8c760bb
SHA1:e91df22605ad5439ea57b27b06a39ca8a70e038a
SHA256:55cf43618fc916410807db3e835418cbbbba0176308235d65af4067cfbb73f97
Tags:exeuser-abuse_ch
Infos:

Detection

Phorpiex
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Phorpiex
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for dropped file
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ZYs8m30VE5.exe (PID: 5792 cmdline: "C:\Users\user\Desktop\ZYs8m30VE5.exe" MD5: FA5AF574F7542F9F4C541C91B8C760BB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ZYs8m30VE5.exeJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
    SourceRuleDescriptionAuthorStrings
    0.0.ZYs8m30VE5.exe.910000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
      0.2.ZYs8m30VE5.exe.910000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeReversingLabs: Detection: 68%
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeVirustotal: Detection: 73%Perma Link
        Source: ZYs8m30VE5.exeReversingLabs: Detection: 44%
        Source: ZYs8m30VE5.exeVirustotal: Detection: 43%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.4% probability
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeJoe Sandbox ML: detected

        Phishing

        barindex
        Source: Yara matchFile source: ZYs8m30VE5.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.ZYs8m30VE5.exe.910000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ZYs8m30VE5.exe.910000.0.unpack, type: UNPACKEDPE
        Source: ZYs8m30VE5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: ZYs8m30VE5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: ZYs8m30VE5.exe, 00000000.00000002.4056920379.0000000009FCC000.00000004.00000020.00020000.00000000.sdmp, ZYs8m30VE5.exe, 00000000.00000002.3998929066.00000000091AB000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: ntkrnlmp.pdbx6 source: ZYs8m30VE5.exe, 00000000.00000002.4056920379.0000000009FCC000.00000004.00000020.00020000.00000000.sdmp, ZYs8m30VE5.exe, 00000000.00000002.3998929066.00000000091AB000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeCode function: 0_2_00912990 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_00912990
        Source: integrator.exe.0.drString found in binary or memory: http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte
        Source: VC_redist.x64.exe.0.drString found in binary or memory: http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
        Source: integrator.exe.0.drString found in binary or memory: https://nexus.officeapps.live.comhttps://nexusrules.officeapps.live.com
        Source: integrator.exe.0.drString found in binary or memory: https://otelrules.azureedge.net/rules/.bundlesdxhelper.exeFailed
        Source: integrator.exe.0.drBinary or memory string: RegisterRawInputDevicesmemstr_15d13787-9

        Spam, unwanted Advertisements and Ransom Demands

        barindex
        Source: Yara matchFile source: ZYs8m30VE5.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.ZYs8m30VE5.exe.910000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ZYs8m30VE5.exe.910000.0.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeProcess Stats: CPU usage > 49%
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe 9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe 2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0
        Source: ZYs8m30VE5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: classification engineClassification label: mal84.troj.evad.winEXE@1/3@0/0
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeFile created: C:\Users\user\AppData\Roaming\windrx.txtJump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeMutant created: \Sessions\1\BaseNamedObjects\6436646754
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeCommand line argument: 64366467540_2_009110A0
        Source: ZYs8m30VE5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: integrator.exe.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
        Source: integrator.exe.0.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: ZYs8m30VE5.exeReversingLabs: Detection: 44%
        Source: ZYs8m30VE5.exeVirustotal: Detection: 43%
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: ZYs8m30VE5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: ZYs8m30VE5.exe, 00000000.00000002.4056920379.0000000009FCC000.00000004.00000020.00020000.00000000.sdmp, ZYs8m30VE5.exe, 00000000.00000002.3998929066.00000000091AB000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: ntkrnlmp.pdbx6 source: ZYs8m30VE5.exe, 00000000.00000002.4056920379.0000000009FCC000.00000004.00000020.00020000.00000000.sdmp, ZYs8m30VE5.exe, 00000000.00000002.3998929066.00000000091AB000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: ZYs8m30VE5.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: ZYs8m30VE5.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: ZYs8m30VE5.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: ZYs8m30VE5.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: ZYs8m30VE5.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: initial sampleStatic PE information: section where entry point is pointing to: .zero
        Source: integrator.exe.0.drStatic PE information: section name: .zero
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .wixburn
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .zero
        Source: chrome.exe.0.drStatic PE information: section name: .zero
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeCode function: 0_2_009132F1 push ecx; ret 0_2_00913304
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeFile created: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeWindow / User API: threadDelayed 376Jump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeWindow / User API: threadDelayed 8055Jump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeDropped PE file which has not been started: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeDropped PE file which has not been started: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exe TID: 5800Thread sleep count: 376 > 30Jump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exe TID: 5800Thread sleep time: -81216000000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exe TID: 5800Thread sleep count: 8055 > 30Jump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exe TID: 5800Thread sleep time: -1739880000000s >= -30000sJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeCode function: 0_2_00912990 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_00912990
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeThread delayed: delay time: 216000000Jump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeProcess Stats: CPU usage > 42% for more than 60s
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeCode function: 0_2_00913428 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00913428
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeCode function: 0_2_00911DD0 mov eax, dword ptr fs:[00000030h]0_2_00911DD0
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeCode function: 0_2_00913428 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00913428
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeCode function: 0_2_0091302D SetUnhandledExceptionFilter,0_2_0091302D
        Source: C:\Users\user\Desktop\ZYs8m30VE5.exeCode function: 0_2_00913358 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00913358

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: ZYs8m30VE5.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.ZYs8m30VE5.exe.910000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.ZYs8m30VE5.exe.910000.0.unpack, type: UNPACKEDPE
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Masquerading
        11
        Input Capture
        1
        System Time Discovery
        Remote Services11
        Input Capture
        Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts122
        Virtualization/Sandbox Evasion
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        DLL Side-Loading
        Security Account Manager122
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        ZYs8m30VE5.exe45%ReversingLabsWin32.Ransomware.GandCrab
        ZYs8m30VE5.exe43%VirustotalBrowse
        SourceDetectionScannerLabelLink
        C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%AviraW32/Infector.Gen
        C:\Users\user\AppData\Local\Temp\chrome.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe68%ReversingLabsWin32.Ransomware.GandCrab
        C:\Users\user\AppData\Local\Temp\chrome.exe74%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporteintegrator.exe.0.drfalse
          high
          http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgorVC_redist.x64.exe.0.drfalse
            high
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1581611
            Start date and time:2024-12-28 09:52:45 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 49s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:ZYs8m30VE5.exe
            renamed because original name is a hash value
            Original Sample Name:fa5af574f7542f9f4c541c91b8c760bb.exe
            Detection:MAL
            Classification:mal84.troj.evad.winEXE@1/3@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 8
            • Number of non-executed functions: 2
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenFile calls found.
            TimeTypeDescription
            03:53:48API Interceptor5193437x Sleep call for process: ZYs8m30VE5.exe modified
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe626wniisYq.exeGet hashmaliciousPhorpiexBrowse
              td7aCkwbmN.exeGet hashmaliciousPhorpiexBrowse
                C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe626wniisYq.exeGet hashmaliciousPhorpiexBrowse
                  td7aCkwbmN.exeGet hashmaliciousPhorpiexBrowse
                    Process:C:\Users\user\Desktop\ZYs8m30VE5.exe
                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):4436200
                    Entropy (8bit):6.567497127479377
                    Encrypted:false
                    SSDEEP:98304:3lkkCqyDEY7+o3OBvfGVY+40yajyS+9s/pL:VkkCqaE68eV+0y8E6L
                    MD5:6912BC3CB531D369558F9B55A145773B
                    SHA1:4E2397CFA959CFDF9F7FF944BC1210DAF369D42A
                    SHA-256:9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4
                    SHA-512:07CDCE5B6E204FEED048D4B38550AF78C22F12ACB335FD04C4349FE9456ECC627A5CFD61813931D0C43FAEE8A397B627B9992C16ED205F8688636CD5EF1E96E1
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    Joe Sandbox View:
                    • Filename: 626wniisYq.exe, Detection: malicious, Browse
                    • Filename: td7aCkwbmN.exe, Detection: malicious, Browse
                    Reputation:low
                    Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........:V@.[8..[8..[8.{);..[8.{)=..[8..!<..[8..!;..[8..!=..[8.\.U..[8.\.E..[8.{)<..[8.{)>..[8.{)9..[8..[9..X8..!=..[8..!1.0^8..!...[8..[...[8..!:..[8.Rich.[8.................PE..L.................".... ..*..Z........C......`+...@...........................C..............................................=......p?..............RC..N....?.....<.=.8...................P.:..... .+.@.............+......j=......................text.....*.......*................. ..`.rdata........+.......*.............@..@.data.........=.......=.............@....rsrc........p?......F?.............@..@.reloc........?......R?.............@..B.zero.........C......RC................`........................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\ZYs8m30VE5.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):654688
                    Entropy (8bit):7.191321691914505
                    Encrypted:false
                    SSDEEP:12288:enMwHskY7gjcjhVIEhqgM7bWvcsi6aVUfIyaU40vy3W/ceKSHMsiFyY6XN:4MysZgjS1hqgSC/izkfJjymk4HM5yJ
                    MD5:2E4F3FFE6E1B1ADAD701D7205CE379F1
                    SHA1:03C0310CD0F7091AC4F9CF723B27C70B32C58135
                    SHA-256:2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0
                    SHA-512:7863E30C151B55164EFC584DD9E1F82087503B414FC68462237DAE03AD330FF2F7293D655DAA65BBBF3ABBD6606928D2D2E3B93710A2305EBA19F31E48CA9070
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Joe Sandbox View:
                    • Filename: 626wniisYq.exe, Detection: malicious, Browse
                    • Filename: td7aCkwbmN.exe, Detection: malicious, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c...'.u.'.u.'.u.......u.....[.u.....?.u...v.4.u...q.4.u...p...u.....".u....6.u.'.t.v.u...p.l.u....&.u.'..%.u...w.&.u.Rich'.u.........................PE..L............................v.......p............@..........................}...........................................................;..........(...8(...0...=.. t..T...................tt......@n..@...................$........................text.............................. ..`.rdata..............................@..@.data...@...........................@....wixburn8...........................@..@.tls................................@....gfids..............................@..@.rsrc....;.......<..................@..@.reloc...=...0...>..................@..B.zero........p.........................`................................................................................................................
                    Process:C:\Users\user\Desktop\ZYs8m30VE5.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):144896
                    Entropy (8bit):6.793947225132544
                    Encrypted:false
                    SSDEEP:3072:PZLWfp2KkvL5kdnQrWLuzeHpl18fCtnRPF9EVnb43jaI5gr/uHrC:hgkSdQ6mCtnRPF9cCGr/uH
                    MD5:6CE46EB4C85D086F06BA00DD19B56A5C
                    SHA1:DA45E3798D2581335C770A1EB3DF5EA2B6930D39
                    SHA-256:0BA09F85F26EB3E7B08C6DAAB34D160BDCC3E0898BD67C5D57635DE8B4EC23C4
                    SHA-512:109C5E563837B9A72C0455FCC7EC7B24CFFADF1EF4DAACD4C6B8B253FF2A16D0F458105AA46AE773B3A098DAE05129DA51B18F91224837BA84D0CD28505BCE5D
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 68%
                    • Antivirus: Virustotal, Detection: 74%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.T6...6...6...}...<...}.......}..."...............'......."...}...1...6...T.......7.....:.7...6.R.7.......7...Rich6...........PE..L......................#.....d.......`............@..........................m...............................................;..P....p.. ....................P......./..p............................/..@...............P............................text...3........................... ..`.rdata...c.......d..................@..@.data........P.......2..............@....rsrc... ....p.......<..............@..@.reloc.......P......................@..B.zero........`.......&.................`................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):5.879118224686358
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:ZYs8m30VE5.exe
                    File size:20'992 bytes
                    MD5:fa5af574f7542f9f4c541c91b8c760bb
                    SHA1:e91df22605ad5439ea57b27b06a39ca8a70e038a
                    SHA256:55cf43618fc916410807db3e835418cbbbba0176308235d65af4067cfbb73f97
                    SHA512:63f0b540f12609f4cdda1f7a2f63e24378b14a0f010da78ab1a4b7cfb85d2ed6a1c4f1a8b4413156d6ff061dbd69aaf70958448fefc653a2e3a7ec62c21b3bb2
                    SSDEEP:384:QI80WLc01PPz9ACtjUk4/ibYTJ4JVB00UySVR:Q15PPCCVUOYAvU
                    TLSH:7E921907A95A539BE8B2187053A32E25647E7E32231D84CFEF8009791670DD4FB3339A
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2H..S&..S&..S&..+...S&..+...S&..+...S&...]..S&..S'..S&..+...S&..+...S&.Rich.S&.................PE..L...g.og.................&.
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x402fe1
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x676F0267 [Fri Dec 27 19:39:19 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:6b83de4ceb63660d6d26de5acd910549
                    Instruction
                    call 00007FAFE0DF1FA7h
                    jmp 00007FAFE0DF196Bh
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    mov eax, dword ptr [ebp+08h]
                    mov eax, dword ptr [eax]
                    cmp dword ptr [eax], E06D7363h
                    jne 00007FAFE0DF1C5Ch
                    cmp dword ptr [eax+10h], 03h
                    jne 00007FAFE0DF1C56h
                    mov eax, dword ptr [eax+14h]
                    cmp eax, 19930520h
                    je 00007FAFE0DF1C47h
                    cmp eax, 19930521h
                    je 00007FAFE0DF1C40h
                    cmp eax, 19930522h
                    je 00007FAFE0DF1C39h
                    cmp eax, 01994000h
                    jne 00007FAFE0DF1C37h
                    call 00007FAFE0DF1FFCh
                    xor eax, eax
                    pop ebp
                    retn 0004h
                    push 00402FEBh
                    call dword ptr [00404034h]
                    xor eax, eax
                    ret
                    int3
                    jmp dword ptr [0040410Ch]
                    push 00000014h
                    push 00405500h
                    call 00007FAFE0DF1E93h
                    push dword ptr [00406384h]
                    mov esi, dword ptr [004040B4h]
                    call esi
                    pop ecx
                    mov dword ptr [ebp-1Ch], eax
                    cmp eax, FFFFFFFFh
                    jne 00007FAFE0DF1C3Eh
                    push dword ptr [ebp+08h]
                    call dword ptr [004040B8h]
                    pop ecx
                    jmp 00007FAFE0DF1C99h
                    push 00000008h
                    call 00007FAFE0DF1FBDh
                    pop ecx
                    and dword ptr [ebp-04h], 00000000h
                    push dword ptr [00406384h]
                    call esi
                    mov dword ptr [ebp-1Ch], eax
                    push dword ptr [00406380h]
                    call esi
                    pop ecx
                    pop ecx
                    mov dword ptr [ebp-20h], eax
                    lea eax, dword ptr [ebp-20h]
                    push eax
                    lea eax, dword ptr [ebp-1Ch]
                    push eax
                    push dword ptr [ebp+08h]
                    mov esi, dword ptr [004040D0h]
                    call esi
                    Programming Language:
                    • [IMP] VS2008 SP1 build 30729
                    • [ASM] VS2008 SP1 build 30729
                    • [ C ] VS2008 SP1 build 30729
                    • [IMP] VS2005 build 50727
                    • [C++] VS2008 SP1 build 30729
                    • [LNK] VS2008 SP1 build 30729
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x553c0x78.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x2b0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x204.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x54780x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x40000x140.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x25340x2600d4917631992c2aed5f2fe0ede765880cFalse0.5333059210526315data6.13700428489782IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x40000x1c140x1e00d0eb964f0b6fe0a6c830cb88dc8fb50bFalse0.4356770833333333data5.298121792359817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x60000x38c0x200202a0f14ba4a024e6a35d5895669b769False0.060546875data0.35275948821577235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x70000x2b00x40058a3970c5ba6bee8bcaf23ee7343f378False0.3623046875data5.190213072505898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x80000x2880x4006ecda98b7ea9563b7b8359087d3e91cdFalse0.4970703125data3.95524783850785IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_MANIFEST0x70580x256ASCII text, with CRLF line terminatorsEnglishUnited States0.5100334448160535
                    DLLImport
                    SHLWAPI.dllPathFileExistsW, StrCmpNW, PathCombineW, PathMatchSpecW
                    MSVCR90.dll_crt_debugger_hook, _controlfp_s, _invoke_watson, _except_handler4_common, _decode_pointer, _onexit, _lock, __dllonexit, _unlock, ?terminate@@YAXXZ, __set_app_type, _encode_pointer, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _configthreadlocale, _initterm_e, _initterm, _acmdln, exit, _ismbblead, _XcptFilter, _exit, _cexit, __getmainargs, _amsg_exit, wcsstr, memcpy, memset, wcscat
                    KERNEL32.dllIsDebuggerPresent, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, SetUnhandledExceptionFilter, GetStartupInfoA, InterlockedCompareExchange, InterlockedExchange, ExitThread, FindFirstFileW, lstrcmpW, FindNextFileW, GetLogicalDrives, GetDriveTypeW, QueryDosDeviceW, lstrcpyW, GetFileSize, CreateFileMappingA, MapViewOfFile, FlushViewOfFile, UnmapViewOfFile, SetFilePointer, SetEndOfFile, Sleep, CreateMutexA, GetLastError, ExitProcess, CloseHandle, CreateFileW, ExpandEnvironmentStringsW, CreateThread
                    USER32.dllCharLowerW
                    ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegCloseKey
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:03:53:40
                    Start date:28/12/2024
                    Path:C:\Users\user\Desktop\ZYs8m30VE5.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\ZYs8m30VE5.exe"
                    Imagebase:0x910000
                    File size:20'992 bytes
                    MD5 hash:FA5AF574F7542F9F4C541C91B8C760BB
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:21.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:21.3%
                      Total number of Nodes:136
                      Total number of Limit Nodes:4
                      execution_graph 536 912d21 557 9132ac 536->557 538 912d2d GetStartupInfoA 539 912d5b InterlockedCompareExchange 538->539 540 912d6d 539->540 541 912d69 539->541 543 912d97 540->543 544 912d8d _amsg_exit 540->544 541->540 542 912d74 Sleep 541->542 542->539 545 912dc0 543->545 546 912da0 _initterm_e 543->546 544->545 548 912dea 545->548 549 912dcf _initterm 545->549 546->545 547 912dbb __onexit 546->547 550 912dee InterlockedExchange 548->550 552 912df6 __IsNonwritableInCurrentImage 548->552 549->548 550->552 551 912e85 _ismbblead 551->552 552->551 554 912eca 552->554 555 912e6f exit 552->555 558 9110a0 Sleep CreateMutexA GetLastError 552->558 554->547 556 912ed3 _cexit 554->556 555->552 556->547 557->538 559 9110d6 558->559 560 9110ce ExitProcess 558->560 566 911000 memset ExpandEnvironmentStringsW wcscat PathFileExistsW 559->566 563 9110e2 Sleep 564 9110ed CreateThread 563->564 565 911102 Sleep 564->565 570 912c50 564->570 565->565 567 911061 CreateFileW 566->567 568 91105b 566->568 567->568 569 91108c CloseHandle 567->569 568->563 568->564 569->568 576 9128d0 GetLogicalDrives 570->576 572 912caf ExitThread 574 912c5b 574->572 582 9127f0 574->582 588 912990 memset memset PathCombineW FindFirstFileW 574->588 577 9128fd 576->577 578 912976 577->578 579 91290c RegOpenKeyExW 577->579 581 91296a RegCloseKey 577->581 578->574 579->577 580 91292e RegQueryValueExW 579->580 580->577 580->581 581->577 583 912849 582->583 584 91280c 582->584 583->574 602 912850 GetDriveTypeW 584->602 587 91283b lstrcpyW 587->583 589 912c11 CloseHandle 588->589 598 912a5d 588->598 589->574 590 912ac0 CharLowerW 590->598 591 912a68 lstrcmpW 592 912a7e lstrcmpW 591->592 591->598 593 912a94 PathCombineW 592->593 592->598 596 912990 18 API calls 593->596 594 912bf5 FindNextFileW 594->589 594->598 595 912b3c PathMatchSpecW 595->594 597 912b56 PathCombineW 595->597 596->598 607 912c30 wcsstr 597->607 598->590 598->591 598->594 598->595 600 912c30 wcsstr 598->600 608 9124f0 CreateFileW 598->608 600->598 603 91282f 602->603 604 912878 602->604 603->583 603->587 604->603 605 91288c QueryDosDeviceW 604->605 605->603 606 9128a6 StrCmpNW 605->606 606->603 607->598 609 912522 GetFileSize 608->609 610 91251b 608->610 609->610 611 91253e CreateFileMappingA 609->611 610->598 613 9125a9 MapViewOfFile 611->613 614 912598 CloseHandle 611->614 615 9125c7 CloseHandle CloseHandle 613->615 616 9125e2 613->616 614->610 615->610 618 912649 616->618 620 912666 616->620 624 9125f5 6 API calls 616->624 625 912130 618->625 620->624 631 912290 620->631 623 912721 memcpy 623->624 624->610 626 912223 625->626 627 91215e 625->627 626->624 627->626 635 911ed0 627->635 630 9121fc memcpy 630->626 632 9122aa 631->632 633 9122b1 631->633 632->623 632->624 633->632 634 912467 memcpy 633->634 634->632 636 911eea 635->636 637 911ef1 635->637 636->626 636->630 637->636 638 9120a7 memcpy 637->638 638->636 657 912fe1 660 913358 657->660 659 912fe6 659->659 661 91338a GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 660->661 662 91337d 660->662 663 913381 661->663 662->661 662->663 663->659 664 912f00 665 912f0e __set_app_type _encode_pointer __p__fmode __p__commode 664->665 667 912fad _pre_c_init __RTC_Initialize 665->667 668 912fc7 667->668 669 912fbb __setusermatherr 667->669 674 91332a _controlfp_s 668->674 669->668 672 912fd5 _configthreadlocale 673 912fde 672->673 675 912fcc 674->675 676 913346 _invoke_watson 674->676 675->672 675->673 676->675 677 911120 682 911129 677->682 680 91188b 681 91113d 686 911dd0 GetPEB 681->686 682->681 683 911de0 682->683 687 911dd0 GetPEB 683->687 685 911df2 685->682 686->680 687->685 688 913305 _except_handler4_common 689 913428 IsDebuggerPresent _crt_debugger_hook SetUnhandledExceptionFilter UnhandledExceptionFilter 690 913512 _crt_debugger_hook 689->690 691 91351a GetCurrentProcess TerminateProcess 689->691 690->691 639 912e9b _XcptFilter 640 912cdb 645 9130e7 640->645 643 912d20 644 912d18 _amsg_exit 644->643 648 913042 645->648 647 912ce0 __getmainargs 647->643 647->644 655 9132ac 648->655 650 91304e _decode_pointer 651 913071 7 API calls 650->651 652 913065 _onexit 650->652 656 9130de _unlock 651->656 653 9130d5 __onexit 652->653 653->647 655->650 656->653 692 912feb 693 913027 692->693 694 912ffd 692->694 694->693 695 913022 ?terminate@ 694->695 695->693 696 91302d SetUnhandledExceptionFilter 697 912eaf 698 912ec3 _exit 697->698 699 912eca 697->699 698->699 700 912ed3 _cexit 699->700 701 912ed9 __onexit 699->701 700->701

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_00912990 0->0 12 Function_00912C30 0->12 42 Function_009124F0 0->42 1 Function_00912290 11 Function_009118B0 1->11 2 Function_00911B90 2->2 35 Function_00911AC0 2->35 37 Function_00911A40 2->37 38 Function_00911B40 2->38 43 Function_009118F0 2->43 3 Function_00913190 4 Function_00912E9B 5 Function_00911000 6 Function_00911A80 7 Function_00912F00 21 Function_0091332A 7->21 31 Function_00913355 7->31 46 Function_009130FE 7->46 8 Function_00913305 9 Function_00913406 10 Function_0091110F 13 Function_00912130 29 Function_00911ED0 13->29 14 Function_00912CB7 15 Function_00912D21 16 Function_009110A0 15->16 23 Function_009132AC 15->23 40 Function_009132F1 15->40 49 Function_009131E0 15->49 16->5 26 Function_00912C50 16->26 17 Function_009119A0 18 Function_00911120 18->2 18->6 18->11 30 Function_00911DD0 18->30 44 Function_00911AF0 18->44 48 Function_00911DE0 18->48 19 Function_00913124 20 Function_00913428 22 Function_0091302D 24 Function_00912EAF 24->40 25 Function_00913150 26->0 28 Function_009128D0 26->28 41 Function_009127F0 26->41 27 Function_00912850 29->11 32 Function_00913358 33 Function_00912CDB 50 Function_009130E7 33->50 34 Function_009130DE 35->6 35->37 36 Function_00911EC0 39 Function_00913042 39->23 39->34 39->40 41->27 42->1 42->13 45 Function_0091327F 47 Function_00912FE1 47->32 48->17 48->30 49->3 49->25 50->39 51 Function_00912EE7 52 Function_00912FEB 53 Function_00912EEB 53->40 54 Function_0091326B

                      Control-flow Graph

                      APIs
                      • memset.MSVCR90 ref: 00912A02
                      • memset.MSVCR90 ref: 00912A18
                      • PathCombineW.SHLWAPI(?,perflogs,00915418), ref: 00912A30
                      • FindFirstFileW.KERNELBASE(?,?), ref: 00912A44
                      • lstrcmpW.KERNEL32(?,0091541C), ref: 00912A74
                      • lstrcmpW.KERNEL32(?,00915420), ref: 00912A8A
                      • PathCombineW.SHLWAPI(?,perflogs,?), ref: 00912AA6
                      • CharLowerW.USER32(?), ref: 00912ADA
                      • PathMatchSpecW.SHLWAPI(?,*.exe), ref: 00912B48
                      • PathCombineW.SHLWAPI(?,perflogs,?), ref: 00912B68
                      • FindNextFileW.KERNELBASE(000000FF,?), ref: 00912C03
                      • CloseHandle.KERNELBASE(000000FF), ref: 00912C18
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID: Path$Combine$FileFindlstrcmpmemset$CharCloseFirstHandleLowerMatchNextSpec
                      • String ID: $recycle.bin$*.exe$DriveSec$VolDri$appdata$application data$boot$config$default$intel$msocache$perflogs$program files$programdata$sys$system$win$windows$wup
                      • API String ID: 1416314416-1168010690
                      • Opcode ID: b003c38127f841eb6da1ca974b6223af7514fd9f20bd9132a22f0406221eb80a
                      • Instruction ID: 874cfeeb67a72ccceeecd8c0496da3b8b5caeae2737f1bc8a7aacf2e4f9f5d13
                      • Opcode Fuzzy Hash: b003c38127f841eb6da1ca974b6223af7514fd9f20bd9132a22f0406221eb80a
                      • Instruction Fuzzy Hash: DA6183B1B1431CDBCB20EF60DC89BEE77B8AB89305F018598E619A7140E7749AD8CF55

                      Control-flow Graph

                      APIs
                      • Sleep.KERNELBASE(000007D0), ref: 009110A9
                      • CreateMutexA.KERNELBASE(00000000,00000000,6436646754), ref: 009110B8
                      • GetLastError.KERNEL32 ref: 009110C1
                      • ExitProcess.KERNEL32 ref: 009110D0
                      • Sleep.KERNELBASE(00001388), ref: 009110E7
                      • CreateThread.KERNELBASE(00000000,00000000,Function_00002C50,00000000,00000000,00000000), ref: 009110FC
                      • Sleep.KERNELBASE(0CDFE600), ref: 00911107
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID: Sleep$Create$ErrorExitLastMutexProcessThread
                      • String ID: 6436646754
                      • API String ID: 302559243-3290978236
                      • Opcode ID: 4a026bb4ba2906a128e6ff22ab4f3207c4ab0e08f07f73cb8242f98b3a027f47
                      • Instruction ID: 040a4bbee15769a438fd3af1acddae5eec19162135cbf788e30f5735a5861177
                      • Opcode Fuzzy Hash: 4a026bb4ba2906a128e6ff22ab4f3207c4ab0e08f07f73cb8242f98b3a027f47
                      • Instruction Fuzzy Hash: 9BF01270F9D305F7E7106BE2AE0FFD83A28AB0CB42F218410F305E90E0DAA05480D626

                      Control-flow Graph

                      APIs
                      • CreateFileW.KERNELBASE(00912BF2,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 0091250C
                      • GetFileSize.KERNEL32(000000FF,00000000), ref: 00912528
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID: File$CreateSize
                      • String ID: .zero
                      • API String ID: 2791376181-843663606
                      • Opcode ID: 6c55d349a9070957bb6feae0c9366e07fcf8d7e784a220de2ecd374b36ff52dd
                      • Instruction ID: 806c3d9a9bd8a2abf49e20396b5f151ef815b7a69b83a78efcbe899be70de354
                      • Opcode Fuzzy Hash: 6c55d349a9070957bb6feae0c9366e07fcf8d7e784a220de2ecd374b36ff52dd
                      • Instruction Fuzzy Hash: 32A1F674E04209EFCB04DFA4D995BEEB7B5BF48300F208659EA05BB390D734A991DB64

                      Control-flow Graph

                      APIs
                      • memset.MSVCR90 ref: 00911017
                      • ExpandEnvironmentStringsW.KERNEL32(%appdata%,?,00000208), ref: 00911030
                      • wcscat.MSVCR90 ref: 00911042
                      • PathFileExistsW.KERNELBASE(?), ref: 00911051
                      • CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000001,00000002,00000000), ref: 00911077
                      • CloseHandle.KERNELBASE(000000FF), ref: 00911093
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID: File$CloseCreateEnvironmentExistsExpandHandlePathStringsmemsetwcscat
                      • String ID: %appdata%$\windrx.txt
                      • API String ID: 3732632079-532699497
                      • Opcode ID: 55d39251be4d0f1a283d5945352afcbdbe35aecdccdc516323dda10f46ccb126
                      • Instruction ID: d046cc93d605c16e5ee43d1e15cd68250b09e7cb2d0f3673e9b7f6433868a940
                      • Opcode Fuzzy Hash: 55d39251be4d0f1a283d5945352afcbdbe35aecdccdc516323dda10f46ccb126
                      • Instruction Fuzzy Hash: FA01B1B5B5430CB6DB20EB609C0EFDA73389B58B01F508790B76CA61D2EA745AC4DF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 91 9128d0-9128fb GetLogicalDrives 92 912906-91290a 91->92 93 912976-912981 92->93 94 91290c-91292c RegOpenKeyExW 92->94 95 912974 94->95 96 91292e-912959 RegQueryValueExW 94->96 95->92 97 91295b-91295f 96->97 98 91296a-91296e RegCloseKey 96->98 97->98 100 912961-912967 97->100 98->95 100->98
                      APIs
                      • GetLogicalDrives.KERNELBASE ref: 009128D6
                      • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00912924
                      • RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00912951
                      • RegCloseKey.KERNELBASE(?), ref: 0091296E
                      Strings
                      • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, xrefs: 00912917
                      • NoDrives, xrefs: 00912948
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID: CloseDrivesLogicalOpenQueryValue
                      • String ID: NoDrives$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
                      • API String ID: 2666887985-3471754645
                      • Opcode ID: 47b42489a3f44961ca65d64bd4efeb7d8527d5c93bc7e6f455f1c649a73e4583
                      • Instruction ID: 66c96ac5179561ae9fb70cb54ec291f971a1cc149403c72319df48c28693ea6c
                      • Opcode Fuzzy Hash: 47b42489a3f44961ca65d64bd4efeb7d8527d5c93bc7e6f455f1c649a73e4583
                      • Instruction Fuzzy Hash: AD11E7B1E0020E9BDB14DFD5D949BEEB7B4FB48704F108518E625A7280D3B86A85CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 101 912850-912876 GetDriveTypeW 102 9128c5-9128cb 101->102 103 912878-91287f 101->103 104 912881-912888 103->104 105 91288c-9128a4 QueryDosDeviceW 103->105 104->105 106 91288a 104->106 105->102 107 9128a6-9128bc StrCmpNW 105->107 106->102 107->102 108 9128be 107->108 108->102
                      APIs
                      • GetDriveTypeW.KERNELBASE(0091282F), ref: 0091285D
                      • QueryDosDeviceW.KERNELBASE(0091282F,?,00000208), ref: 0091289C
                      • StrCmpNW.KERNELBASE(?,\??\,00000004), ref: 009128B4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID: DeviceDriveQueryType
                      • String ID: \??\
                      • API String ID: 1681518211-3047946824
                      • Opcode ID: 9f01f2c414bac0c843a0e381a0f64c35c72b50206c8586354d0d16852e80056e
                      • Instruction ID: 00a8814d6a76c02523946702e0ff9ea544548de3bc398a476665edb08b5f5e2e
                      • Opcode Fuzzy Hash: 9f01f2c414bac0c843a0e381a0f64c35c72b50206c8586354d0d16852e80056e
                      • Instruction Fuzzy Hash: 9C0112B0B4420CEBCF24DF95DC49AD977B8AB08705F0085E9AA14A7240D7749FE9DFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 109 912c50-912c65 call 9128d0 112 912c70-912c74 109->112 113 912c76-912c97 call 9127f0 112->113 114 912caf-912cb1 ExitThread 112->114 117 912c99-912c9d 113->117 118 912cad 113->118 119 912ca1-912ca5 call 912990 117->119 120 912c9f 117->120 118->112 123 912caa 119->123 120->118 123->118
                      APIs
                        • Part of subcall function 009128D0: GetLogicalDrives.KERNELBASE ref: 009128D6
                        • Part of subcall function 009128D0: RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00912924
                        • Part of subcall function 009128D0: RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00912951
                        • Part of subcall function 009128D0: RegCloseKey.KERNELBASE(?), ref: 0091296E
                      • ExitThread.KERNEL32 ref: 00912CB1
                        • Part of subcall function 009127F0: lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 00912843
                        • Part of subcall function 00912990: memset.MSVCR90 ref: 00912A02
                        • Part of subcall function 00912990: memset.MSVCR90 ref: 00912A18
                        • Part of subcall function 00912990: PathCombineW.SHLWAPI(?,perflogs,00915418), ref: 00912A30
                        • Part of subcall function 00912990: FindFirstFileW.KERNELBASE(?,?), ref: 00912A44
                        • Part of subcall function 00912990: lstrcmpW.KERNEL32(?,0091541C), ref: 00912A74
                        • Part of subcall function 00912990: lstrcmpW.KERNEL32(?,00915420), ref: 00912A8A
                        • Part of subcall function 00912990: PathCombineW.SHLWAPI(?,perflogs,?), ref: 00912AA6
                        • Part of subcall function 00912990: FindNextFileW.KERNELBASE(000000FF,?), ref: 00912C03
                        • Part of subcall function 00912990: CloseHandle.KERNELBASE(000000FF), ref: 00912C18
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID: CloseCombineFileFindPathlstrcmpmemset$DrivesExitFirstHandleLogicalNextOpenQueryThreadValuelstrcpy
                      • String ID:
                      • API String ID: 717983626-0
                      • Opcode ID: bf6c3a2a15d384c0cfe208d3b16272ed27f723b373f5b041654e5cb4070186d2
                      • Instruction ID: 63abcf273181d9560cf40d1d00d997b501fce98ce7b7a2b9cdf281ce7b423652
                      • Opcode Fuzzy Hash: bf6c3a2a15d384c0cfe208d3b16272ed27f723b373f5b041654e5cb4070186d2
                      • Instruction Fuzzy Hash: FB013CB5E0420CEBCF00FFE4C946ADEB7B4AF48304F1444A9E641B7241E2359AE4DB96

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 124 9127f0-91280a 125 912849-91284f 124->125 126 91280c-91282a call 912850 124->126 128 91282f-912839 126->128 128->125 129 91283b-912843 lstrcpyW 128->129 129->125
                      APIs
                        • Part of subcall function 00912850: GetDriveTypeW.KERNELBASE(0091282F), ref: 0091285D
                      • lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 00912843
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID: DriveTypelstrcpy
                      • String ID:
                      • API String ID: 3664088370-0
                      • Opcode ID: 46f30e79df2b402cfe96d0387e14a5f3420a71459fb2dd48e36cd0129f5a07c1
                      • Instruction ID: fe4854647886870e3708042b38529bddbeb4cc9443975477e12b831cacffa936
                      • Opcode Fuzzy Hash: 46f30e79df2b402cfe96d0387e14a5f3420a71459fb2dd48e36cd0129f5a07c1
                      • Instruction Fuzzy Hash: 26F09AB1E0024CFBDB01EFA8D855BDDB7B8EF48300F00C0A8E8199B250E235AB59CB45
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_00002FEB), ref: 00913032
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 2a529e5c47ac1b6f3036a5c13c9a613c6ab7b7f70bdf557ebc889aae7fb5eb2b
                      • Instruction ID: 1d2643c29e31c9b5d38b807945d9a9251afeb86ef5a6029bde053c40338e18e6
                      • Opcode Fuzzy Hash: 2a529e5c47ac1b6f3036a5c13c9a613c6ab7b7f70bdf557ebc889aae7fb5eb2b
                      • Instruction Fuzzy Hash: E29002743671084A470127729E0998529B06B9C746B4344606301DC154EA504151A961
                      Memory Dump Source
                      • Source File: 00000000.00000002.3734845888.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
                      • Associated: 00000000.00000002.3734799095.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734886195.0000000000914000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.3734927032.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_910000_ZYs8m30VE5.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                      • Instruction ID: be7eecee3400b42b3e558a840de4aeb97e4223185f45bdd8b65d759b642826a8
                      • Opcode Fuzzy Hash: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                      • Instruction Fuzzy Hash: 85A002321A5B8CC7C612A68DA651B51B3ECE348D54F440461A50D43E015659B9108495