Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QfBhv404w4.exe

Overview

General Information

Sample name:QfBhv404w4.exe
renamed because original name is a hash value
Original sample name:922669216b9e991b640a3f20d26ed6c2.exe
Analysis ID:1581614
MD5:922669216b9e991b640a3f20d26ed6c2
SHA1:f295fa1d302590a494fdbce05747bfad1c9e3935
SHA256:c25fb57a8d2e0c6dbed90077d45f3428194ecbb43b0188cab3c687c62e09d4e8
Tags:exeuser-abuse_ch
Infos:

Detection

Phorpiex
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Phorpiex
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for dropped file
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • QfBhv404w4.exe (PID: 7484 cmdline: "C:\Users\user\Desktop\QfBhv404w4.exe" MD5: 922669216B9E991B640A3F20D26ED6C2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
QfBhv404w4.exeJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
    SourceRuleDescriptionAuthorStrings
    0.0.QfBhv404w4.exe.900000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
      0.2.QfBhv404w4.exe.900000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeReversingLabs: Detection: 68%
        Source: QfBhv404w4.exeReversingLabs: Detection: 44%
        Source: QfBhv404w4.exeVirustotal: Detection: 44%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 85.0% probability
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeJoe Sandbox ML: detected

        Phishing

        barindex
        Source: Yara matchFile source: QfBhv404w4.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.QfBhv404w4.exe.900000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.QfBhv404w4.exe.900000.0.unpack, type: UNPACKEDPE
        Source: QfBhv404w4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\QfBhv404w4.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: QfBhv404w4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: QfBhv404w4.exe, 00000000.00000002.4158315257.000000000AD4F000.00000004.00000020.00020000.00000000.sdmp, QfBhv404w4.exe, 00000000.00000002.4084900098.0000000009BC2000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdbx source: QfBhv404w4.exe, 00000000.00000002.4158315257.000000000AD4F000.00000004.00000020.00020000.00000000.sdmp, QfBhv404w4.exe, 00000000.00000002.4084900098.0000000009BC2000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: C:\Users\user\Desktop\QfBhv404w4.exeCode function: 0_2_00902980 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_00902980
        Source: integrator.exe.0.drString found in binary or memory: http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte
        Source: VC_redist.x64.exe.0.drString found in binary or memory: http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
        Source: integrator.exe.0.drString found in binary or memory: https://nexus.officeapps.live.comhttps://nexusrules.officeapps.live.com
        Source: integrator.exe.0.drString found in binary or memory: https://otelrules.azureedge.net/rules/.bundlesdxhelper.exeFailed
        Source: integrator.exe.0.drBinary or memory string: RegisterRawInputDevicesmemstr_442f456a-3

        Spam, unwanted Advertisements and Ransom Demands

        barindex
        Source: Yara matchFile source: QfBhv404w4.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.QfBhv404w4.exe.900000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.QfBhv404w4.exe.900000.0.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\QfBhv404w4.exeProcess Stats: CPU usage > 49%
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe 9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe 2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0
        Source: QfBhv404w4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: classification engineClassification label: mal84.troj.evad.winEXE@1/3@0/0
        Source: C:\Users\user\Desktop\QfBhv404w4.exeFile created: C:\Users\user\AppData\Roaming\windrx.txtJump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exeMutant created: \Sessions\1\BaseNamedObjects\u8u8u8ut
        Source: C:\Users\user\Desktop\QfBhv404w4.exeCommand line argument: u8u8u8ut0_2_00901090
        Source: QfBhv404w4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\QfBhv404w4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: integrator.exe.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
        Source: integrator.exe.0.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: QfBhv404w4.exeReversingLabs: Detection: 44%
        Source: QfBhv404w4.exeVirustotal: Detection: 44%
        Source: C:\Users\user\Desktop\QfBhv404w4.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: QfBhv404w4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: QfBhv404w4.exe, 00000000.00000002.4158315257.000000000AD4F000.00000004.00000020.00020000.00000000.sdmp, QfBhv404w4.exe, 00000000.00000002.4084900098.0000000009BC2000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdbx source: QfBhv404w4.exe, 00000000.00000002.4158315257.000000000AD4F000.00000004.00000020.00020000.00000000.sdmp, QfBhv404w4.exe, 00000000.00000002.4084900098.0000000009BC2000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: QfBhv404w4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: QfBhv404w4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: QfBhv404w4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: QfBhv404w4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: QfBhv404w4.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: initial sampleStatic PE information: section where entry point is pointing to: .zero
        Source: integrator.exe.0.drStatic PE information: section name: .zero
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .wixburn
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .zero
        Source: chrome.exe.0.drStatic PE information: section name: .zero
        Source: C:\Users\user\Desktop\QfBhv404w4.exeCode function: 0_2_009032E1 push ecx; ret 0_2_009032F4
        Source: C:\Users\user\Desktop\QfBhv404w4.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\QfBhv404w4.exeFile created: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\QfBhv404w4.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\QfBhv404w4.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\QfBhv404w4.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\QfBhv404w4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exeWindow / User API: threadDelayed 8069Jump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exeDropped PE file which has not been started: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\QfBhv404w4.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\QfBhv404w4.exeDropped PE file which has not been started: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\QfBhv404w4.exe TID: 7488Thread sleep count: 216 > 30Jump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exe TID: 7488Thread sleep time: -46656000000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exe TID: 7488Thread sleep count: 8069 > 30Jump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exe TID: 7488Thread sleep time: -1742904000000s >= -30000sJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\QfBhv404w4.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\QfBhv404w4.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\QfBhv404w4.exeCode function: 0_2_00902980 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_00902980
        Source: C:\Users\user\Desktop\QfBhv404w4.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\QfBhv404w4.exeThread delayed: delay time: 216000000Jump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\QfBhv404w4.exeProcess Stats: CPU usage > 42% for more than 60s
        Source: C:\Users\user\Desktop\QfBhv404w4.exeCode function: 0_2_00903418 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00903418
        Source: C:\Users\user\Desktop\QfBhv404w4.exeCode function: 0_2_00901DC0 mov eax, dword ptr fs:[00000030h]0_2_00901DC0
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\QfBhv404w4.exeCode function: 0_2_00903418 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00903418
        Source: C:\Users\user\Desktop\QfBhv404w4.exeCode function: 0_2_0090301D SetUnhandledExceptionFilter,0_2_0090301D
        Source: C:\Users\user\Desktop\QfBhv404w4.exeCode function: 0_2_00903348 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00903348

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: QfBhv404w4.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.QfBhv404w4.exe.900000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.QfBhv404w4.exe.900000.0.unpack, type: UNPACKEDPE
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Masquerading
        11
        Input Capture
        1
        System Time Discovery
        Remote Services11
        Input Capture
        Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts122
        Virtualization/Sandbox Evasion
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        DLL Side-Loading
        Security Account Manager122
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        QfBhv404w4.exe45%ReversingLabsWin32.Ransomware.GandCrab
        QfBhv404w4.exe44%VirustotalBrowse
        SourceDetectionScannerLabelLink
        C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%AviraW32/Infector.Gen
        C:\Users\user\AppData\Local\Temp\chrome.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe68%ReversingLabsWin32.Ransomware.GandCrab
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        s-part-0035.t-0009.t-msedge.net
        13.107.246.63
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporteintegrator.exe.0.drfalse
            high
            http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgorVC_redist.x64.exe.0.drfalse
              high
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1581614
              Start date and time:2024-12-28 09:53:43 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 54s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Sample name:QfBhv404w4.exe
              renamed because original name is a hash value
              Original Sample Name:922669216b9e991b640a3f20d26ed6c2.exe
              Detection:MAL
              Classification:mal84.troj.evad.winEXE@1/3@0/0
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 8
              • Number of non-executed functions: 2
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240s for sample files taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenFile calls found.
              TimeTypeDescription
              03:54:42API Interceptor9112411x Sleep call for process: QfBhv404w4.exe modified
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              s-part-0035.t-0009.t-msedge.net726odELDs8.exeGet hashmaliciousLummaCBrowse
              • 13.107.246.63
              YrWaRb0IKJ.exeGet hashmaliciousLummaCBrowse
              • 13.107.246.63
              v5Evrl41VR.exeGet hashmaliciousLummaCBrowse
              • 13.107.246.63
              HGFSqmKwd5.exeGet hashmaliciousUnknownBrowse
              • 13.107.246.63
              8WFJ38EJo5.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
              • 13.107.246.63
              FLKCAS1DzH.batGet hashmaliciousUnknownBrowse
              • 13.107.246.63
              TbxHhK6lsS.exeGet hashmaliciousUnknownBrowse
              • 13.107.246.63
              MrIOYC1Pns.exeGet hashmaliciousLummaCBrowse
              • 13.107.246.63
              jPJaszTDNt.exeGet hashmaliciousUnknownBrowse
              • 13.107.246.63
              http://track.rbfcu.org/y.z?l=https://google.com/amp/s/t.ly/5SpZS&r=14387614172&d=18473&p=2&t=hGet hashmaliciousHTMLPhisherBrowse
              • 13.107.246.63
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exemyTOrYevLI.exeGet hashmaliciousPhorpiexBrowse
                ZYs8m30VE5.exeGet hashmaliciousPhorpiexBrowse
                  626wniisYq.exeGet hashmaliciousPhorpiexBrowse
                    td7aCkwbmN.exeGet hashmaliciousPhorpiexBrowse
                      C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exemyTOrYevLI.exeGet hashmaliciousPhorpiexBrowse
                        ZYs8m30VE5.exeGet hashmaliciousPhorpiexBrowse
                          626wniisYq.exeGet hashmaliciousPhorpiexBrowse
                            td7aCkwbmN.exeGet hashmaliciousPhorpiexBrowse
                              Process:C:\Users\user\Desktop\QfBhv404w4.exe
                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):4436200
                              Entropy (8bit):6.567497127479377
                              Encrypted:false
                              SSDEEP:98304:3lkkCqyDEY7+o3OBvfGVY+40yajyS+9s/pL:VkkCqaE68eV+0y8E6L
                              MD5:6912BC3CB531D369558F9B55A145773B
                              SHA1:4E2397CFA959CFDF9F7FF944BC1210DAF369D42A
                              SHA-256:9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4
                              SHA-512:07CDCE5B6E204FEED048D4B38550AF78C22F12ACB335FD04C4349FE9456ECC627A5CFD61813931D0C43FAEE8A397B627B9992C16ED205F8688636CD5EF1E96E1
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              Joe Sandbox View:
                              • Filename: myTOrYevLI.exe, Detection: malicious, Browse
                              • Filename: ZYs8m30VE5.exe, Detection: malicious, Browse
                              • Filename: 626wniisYq.exe, Detection: malicious, Browse
                              • Filename: td7aCkwbmN.exe, Detection: malicious, Browse
                              Reputation:low
                              Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........:V@.[8..[8..[8.{);..[8.{)=..[8..!<..[8..!;..[8..!=..[8.\.U..[8.\.E..[8.{)<..[8.{)>..[8.{)9..[8..[9..X8..!=..[8..!1.0^8..!...[8..[...[8..!:..[8.Rich.[8.................PE..L.................".... ..*..Z........C......`+...@...........................C..............................................=......p?..............RC..N....?.....<.=.8...................P.:..... .+.@.............+......j=......................text.....*.......*................. ..`.rdata........+.......*.............@..@.data.........=.......=.............@....rsrc........p?......F?.............@..@.reloc........?......R?.............@..B.zero.........C......RC................`........................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\QfBhv404w4.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):654688
                              Entropy (8bit):7.191321691914505
                              Encrypted:false
                              SSDEEP:12288:enMwHskY7gjcjhVIEhqgM7bWvcsi6aVUfIyaU40vy3W/ceKSHMsiFyY6XN:4MysZgjS1hqgSC/izkfJjymk4HM5yJ
                              MD5:2E4F3FFE6E1B1ADAD701D7205CE379F1
                              SHA1:03C0310CD0F7091AC4F9CF723B27C70B32C58135
                              SHA-256:2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0
                              SHA-512:7863E30C151B55164EFC584DD9E1F82087503B414FC68462237DAE03AD330FF2F7293D655DAA65BBBF3ABBD6606928D2D2E3B93710A2305EBA19F31E48CA9070
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              Joe Sandbox View:
                              • Filename: myTOrYevLI.exe, Detection: malicious, Browse
                              • Filename: ZYs8m30VE5.exe, Detection: malicious, Browse
                              • Filename: 626wniisYq.exe, Detection: malicious, Browse
                              • Filename: td7aCkwbmN.exe, Detection: malicious, Browse
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c...'.u.'.u.'.u.......u.....[.u.....?.u...v.4.u...q.4.u...p...u.....".u....6.u.'.t.v.u...p.l.u....&.u.'..%.u...w.&.u.Rich'.u.........................PE..L............................v.......p............@..........................}...........................................................;..........(...8(...0...=.. t..T...................tt......@n..@...................$........................text.............................. ..`.rdata..............................@..@.data...@...........................@....wixburn8...........................@..@.tls................................@....gfids..............................@..@.rsrc....;.......<..................@..@.reloc...=...0...>..................@..B.zero........p.........................`................................................................................................................
                              Process:C:\Users\user\Desktop\QfBhv404w4.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):144896
                              Entropy (8bit):6.793947225132544
                              Encrypted:false
                              SSDEEP:3072:PZLWfp2KkvL5kdnQrWLuzeHpl18fCtnRPF9EVnb43jaI5gr/uHrC:hgkSdQ6mCtnRPF9cCGr/uH
                              MD5:6CE46EB4C85D086F06BA00DD19B56A5C
                              SHA1:DA45E3798D2581335C770A1EB3DF5EA2B6930D39
                              SHA-256:0BA09F85F26EB3E7B08C6DAAB34D160BDCC3E0898BD67C5D57635DE8B4EC23C4
                              SHA-512:109C5E563837B9A72C0455FCC7EC7B24CFFADF1EF4DAACD4C6B8B253FF2A16D0F458105AA46AE773B3A098DAE05129DA51B18F91224837BA84D0CD28505BCE5D
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 68%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.T6...6...6...}...<...}.......}..."...............'......."...}...1...6...T.......7.....:.7...6.R.7.......7...Rich6...........PE..L......................#.....d.......`............@..........................m...............................................;..P....p.. ....................P......./..p............................/..@...............P............................text...3........................... ..`.rdata...c.......d..................@..@.data........P.......2..............@....rsrc... ....p.......<..............@..@.reloc.......P......................@..B.zero........`.......&.................`................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):5.877138611902118
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:QfBhv404w4.exe
                              File size:20'992 bytes
                              MD5:922669216b9e991b640a3f20d26ed6c2
                              SHA1:f295fa1d302590a494fdbce05747bfad1c9e3935
                              SHA256:c25fb57a8d2e0c6dbed90077d45f3428194ecbb43b0188cab3c687c62e09d4e8
                              SHA512:cdfb621171e14db160a199d8fe60ace60258ea1a988e78859dc55e603aad81b3c774e72372c9faa2e0ae7fcf7e6d868c5480d46cecebbf1225df3ef2b9364c89
                              SSDEEP:384:9+0WLc01PhLACdSUkc/ibYTJ4JVB00tySVRe:E5PhUCIU6YAvtg
                              TLSH:1C921907A956939BE8B2287053B32E25647A7E32231D84CFEF8009791674DD4FB3735A
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2H..S&..S&..S&..+...S&..+...S&..+...S&...]..S&..S'..S&..+...S&..+...S&.Rich.S&.................PE..L.....og.................&.
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x402fd1
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Time Stamp:0x676F078C [Fri Dec 27 20:01:16 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:0
                              File Version Major:5
                              File Version Minor:0
                              Subsystem Version Major:5
                              Subsystem Version Minor:0
                              Import Hash:26d721f1fff47d0e5f11f2aba744001c
                              Instruction
                              call 00007F187D37D297h
                              jmp 00007F187D37CC5Bh
                              mov edi, edi
                              push ebp
                              mov ebp, esp
                              mov eax, dword ptr [ebp+08h]
                              mov eax, dword ptr [eax]
                              cmp dword ptr [eax], E06D7363h
                              jne 00007F187D37CF4Ch
                              cmp dword ptr [eax+10h], 03h
                              jne 00007F187D37CF46h
                              mov eax, dword ptr [eax+14h]
                              cmp eax, 19930520h
                              je 00007F187D37CF37h
                              cmp eax, 19930521h
                              je 00007F187D37CF30h
                              cmp eax, 19930522h
                              je 00007F187D37CF29h
                              cmp eax, 01994000h
                              jne 00007F187D37CF27h
                              call 00007F187D37D2ECh
                              xor eax, eax
                              pop ebp
                              retn 0004h
                              push 00402FDBh
                              call dword ptr [00404034h]
                              xor eax, eax
                              ret
                              int3
                              jmp dword ptr [0040410Ch]
                              push 00000014h
                              push 00405500h
                              call 00007F187D37D183h
                              push dword ptr [00406384h]
                              mov esi, dword ptr [004040B4h]
                              call esi
                              pop ecx
                              mov dword ptr [ebp-1Ch], eax
                              cmp eax, FFFFFFFFh
                              jne 00007F187D37CF2Eh
                              push dword ptr [ebp+08h]
                              call dword ptr [004040B8h]
                              pop ecx
                              jmp 00007F187D37CF89h
                              push 00000008h
                              call 00007F187D37D2ADh
                              pop ecx
                              and dword ptr [ebp-04h], 00000000h
                              push dword ptr [00406384h]
                              call esi
                              mov dword ptr [ebp-1Ch], eax
                              push dword ptr [00406380h]
                              call esi
                              pop ecx
                              pop ecx
                              mov dword ptr [ebp-20h], eax
                              lea eax, dword ptr [ebp-20h]
                              push eax
                              lea eax, dword ptr [ebp-1Ch]
                              push eax
                              push dword ptr [ebp+08h]
                              mov esi, dword ptr [004040D0h]
                              call esi
                              Programming Language:
                              • [IMP] VS2008 SP1 build 30729
                              • [ASM] VS2008 SP1 build 30729
                              • [ C ] VS2008 SP1 build 30729
                              • [IMP] VS2005 build 50727
                              • [C++] VS2008 SP1 build 30729
                              • [LNK] VS2008 SP1 build 30729
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x553c0x78.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x2b0.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x204.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x54780x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x40000x140.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x25240x2600868d9060769699de804fdd0fb9af69cdFalse0.5326891447368421data6.131895732766902IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x40000x1c140x1e0013cf1de1ee997eaaad2ab5092dca33edFalse0.43502604166666664data5.293396492412307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x60000x38c0x200202a0f14ba4a024e6a35d5895669b769False0.060546875data0.35275948821577235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x70000x2b00x40058a3970c5ba6bee8bcaf23ee7343f378False0.3623046875data5.190213072505898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x80000x2880x400695b2e74cc6b6d6233b7005b7ca7b3f4False0.5data3.9846074464309296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_MANIFEST0x70580x256ASCII text, with CRLF line terminatorsEnglishUnited States0.5100334448160535
                              DLLImport
                              SHLWAPI.dllPathFileExistsW, StrCmpNW, PathCombineW, PathMatchSpecW
                              MSVCR90.dll_crt_debugger_hook, _controlfp_s, _invoke_watson, _except_handler4_common, _decode_pointer, _onexit, _lock, __dllonexit, _unlock, ?terminate@@YAXXZ, __set_app_type, _encode_pointer, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _configthreadlocale, _initterm_e, _initterm, _acmdln, exit, _ismbblead, _XcptFilter, _exit, _cexit, __getmainargs, _amsg_exit, wcsstr, memset, memcpy, wcscat
                              KERNEL32.dllIsDebuggerPresent, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, SetUnhandledExceptionFilter, GetStartupInfoA, InterlockedCompareExchange, InterlockedExchange, ExitThread, FindFirstFileW, lstrcmpW, FindNextFileW, GetLogicalDrives, GetDriveTypeW, QueryDosDeviceW, lstrcpyW, GetFileSize, CreateFileMappingA, MapViewOfFile, FlushViewOfFile, UnmapViewOfFile, SetFilePointer, SetEndOfFile, Sleep, CreateMutexA, GetLastError, ExitProcess, CloseHandle, CreateFileW, ExpandEnvironmentStringsW, CreateThread
                              USER32.dllCharLowerW
                              ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegCloseKey
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 28, 2024 09:54:33.137975931 CET1.1.1.1192.168.2.90x196eNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                              Dec 28, 2024 09:54:33.137975931 CET1.1.1.1192.168.2.90x196eNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Target ID:0
                              Start time:03:54:35
                              Start date:28/12/2024
                              Path:C:\Users\user\Desktop\QfBhv404w4.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\QfBhv404w4.exe"
                              Imagebase:0x900000
                              File size:20'992 bytes
                              MD5 hash:922669216B9E991B640A3F20D26ED6C2
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:21%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:21.3%
                                Total number of Nodes:136
                                Total number of Limit Nodes:4
                                execution_graph 639 901110 644 901119 639->644 641 90112d 648 901dc0 GetPEB 641->648 643 90187b 644->641 645 901dd0 644->645 649 901dc0 GetPEB 645->649 647 901de2 647->644 648->643 649->647 650 902ef0 651 902efe __set_app_type _encode_pointer __p__fmode __p__commode 650->651 653 902f9d _pre_c_init __RTC_Initialize 651->653 654 902fb7 653->654 655 902fab __setusermatherr 653->655 660 90331a _controlfp_s 654->660 655->654 658 902fc5 _configthreadlocale 659 902fce 658->659 661 902fbc 660->661 662 903336 _invoke_watson 660->662 661->658 661->659 662->661 536 902d11 557 90329c 536->557 538 902d1d GetStartupInfoA 539 902d4b InterlockedCompareExchange 538->539 540 902d5d 539->540 541 902d59 539->541 543 902d87 540->543 544 902d7d _amsg_exit 540->544 541->540 542 902d64 Sleep 541->542 542->539 545 902db0 543->545 546 902d90 _initterm_e 543->546 544->545 548 902dda 545->548 549 902dbf _initterm 545->549 546->545 547 902dab __onexit 546->547 550 902dde InterlockedExchange 548->550 551 902de6 __IsNonwritableInCurrentImage 548->551 549->548 550->551 552 902e75 _ismbblead 551->552 554 902eba 551->554 555 902e5f exit 551->555 558 901090 Sleep CreateMutexA GetLastError 551->558 552->551 554->547 556 902ec3 _cexit 554->556 555->551 556->547 557->538 559 9010c6 558->559 560 9010be ExitProcess 558->560 566 901000 ExpandEnvironmentStringsW wcscat PathFileExistsW 559->566 563 9010d2 Sleep 564 9010dd CreateThread 563->564 565 9010f2 Sleep 564->565 570 902c40 564->570 565->565 567 90104b CreateFileW 566->567 568 901045 566->568 567->568 569 901076 CloseHandle 567->569 568->563 568->564 569->568 576 9028c0 GetLogicalDrives 570->576 572 902c9f ExitThread 574 902c4b 574->572 582 9027e0 574->582 588 902980 memset memset PathCombineW FindFirstFileW 574->588 581 9028ed 576->581 577 902966 577->574 578 9028fc RegOpenKeyExW 579 90291e RegQueryValueExW 578->579 578->581 580 90295a RegCloseKey 579->580 579->581 580->581 581->577 581->578 581->580 583 902839 582->583 584 9027fc 582->584 583->574 602 902840 GetDriveTypeW 584->602 587 90282b lstrcpyW 587->583 589 902c01 CloseHandle 588->589 600 902a4d 588->600 589->574 590 902ab0 CharLowerW 590->600 591 902a58 lstrcmpW 592 902a6e lstrcmpW 591->592 591->600 593 902a84 PathCombineW 592->593 592->600 596 902980 18 API calls 593->596 594 902be5 FindNextFileW 594->589 594->600 595 902b2c PathMatchSpecW 595->594 597 902b46 PathCombineW 595->597 596->600 607 902c20 wcsstr 597->607 599 902c20 wcsstr 599->600 600->590 600->591 600->594 600->595 600->599 608 9024e0 CreateFileW 600->608 603 902868 602->603 605 90281f 602->605 604 90287c QueryDosDeviceW 603->604 603->605 604->605 606 902896 StrCmpNW 604->606 605->583 605->587 606->605 607->600 609 902512 GetFileSize 608->609 610 90250b 608->610 609->610 611 90252e CreateFileMappingA 609->611 610->600 613 902588 CloseHandle 611->613 614 902599 MapViewOfFile 611->614 613->610 615 9025b7 CloseHandle CloseHandle 614->615 617 9025d2 614->617 615->610 618 902639 617->618 620 902656 617->620 624 9025e5 6 API calls 617->624 625 902120 618->625 620->624 631 902280 620->631 623 902711 memcpy 623->624 624->610 626 902213 625->626 627 90214e 625->627 626->624 627->626 635 901ec0 627->635 630 9021ec memcpy 630->626 632 90229a 631->632 633 9022a1 631->633 632->623 632->624 633->632 634 902457 memcpy 633->634 634->632 636 901eda 635->636 637 901ee1 635->637 636->626 636->630 637->636 638 902097 memcpy 637->638 638->636 663 902fd1 666 903348 663->666 665 902fd6 665->665 667 90337a GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 666->667 668 90336d 666->668 669 903371 667->669 668->667 668->669 669->665 670 9032f5 _except_handler4_common 671 903418 IsDebuggerPresent _crt_debugger_hook SetUnhandledExceptionFilter UnhandledExceptionFilter 672 903502 _crt_debugger_hook 671->672 673 90350a GetCurrentProcess TerminateProcess 671->673 672->673 674 902fdb 675 903017 674->675 677 902fed 674->677 676 903012 ?terminate@ 676->675 677->675 677->676 684 902e8b _XcptFilter 685 902ccb 690 9030d7 685->690 688 902d10 689 902d08 _amsg_exit 689->688 693 903032 690->693 692 902cd0 __getmainargs 692->688 692->689 700 90329c 693->700 695 90303e _decode_pointer 696 903061 7 API calls 695->696 697 903055 _onexit 695->697 701 9030ce _unlock 696->701 698 9030c5 __onexit 697->698 698->692 700->695 701->698 678 90301d SetUnhandledExceptionFilter 679 902e9f 680 902eb3 _exit 679->680 681 902eba 679->681 680->681 682 902ec3 _cexit 681->682 683 902ec9 __onexit 681->683 682->683

                                Callgraph

                                • Executed
                                • Not Executed
                                • Opacity -> Relevance
                                • Disassembly available
                                callgraph 0 Function_00901090 12 Function_00901000 0->12 33 Function_00902C40 0->33 1 Function_00901990 2 Function_00901110 13 Function_00901B80 2->13 21 Function_009018A0 2->21 25 Function_00901DD0 2->25 35 Function_00901DC0 2->35 44 Function_00901A70 2->44 51 Function_00901AE0 2->51 3 Function_00902D11 3->0 7 Function_0090329C 3->7 26 Function_009031D0 3->26 52 Function_009032E1 3->52 4 Function_00903114 5 Function_00903418 6 Function_0090331A 8 Function_0090301D 9 Function_00902E9F 9->52 10 Function_00902280 10->21 11 Function_00902980 11->11 22 Function_00902C20 11->22 49 Function_009024E0 11->49 13->13 16 Function_00901AB0 13->16 18 Function_00901A30 13->18 19 Function_00901B30 13->19 50 Function_009018E0 13->50 14 Function_00903180 15 Function_00902E8B 16->18 16->44 17 Function_00901EB0 20 Function_00903032 20->7 42 Function_009030CE 20->42 20->52 23 Function_00902120 34 Function_00901EC0 23->34 24 Function_00902CA7 25->1 25->35 26->14 36 Function_00903140 26->36 27 Function_00902FD1 40 Function_00903348 27->40 28 Function_009030D7 28->20 29 Function_00902ED7 30 Function_00902FDB 31 Function_00902EDB 31->52 32 Function_0090325B 33->11 37 Function_009028C0 33->37 48 Function_009027E0 33->48 34->21 38 Function_00902840 39 Function_00903345 41 Function_00902CCB 41->28 43 Function_00902EF0 43->6 43->39 53 Function_009030EE 43->53 45 Function_009032F5 46 Function_009033F6 47 Function_009010FF 48->38 49->10 49->23 54 Function_0090326F

                                Control-flow Graph

                                APIs
                                • memset.MSVCR90 ref: 009029F2
                                • memset.MSVCR90 ref: 00902A08
                                • PathCombineW.SHLWAPI(?,perflogs,00905418), ref: 00902A20
                                • FindFirstFileW.KERNELBASE(?,?), ref: 00902A34
                                • lstrcmpW.KERNEL32(?,0090541C), ref: 00902A64
                                • lstrcmpW.KERNEL32(?,00905420), ref: 00902A7A
                                • PathCombineW.SHLWAPI(?,perflogs,?), ref: 00902A96
                                • CharLowerW.USER32(?), ref: 00902ACA
                                • PathMatchSpecW.SHLWAPI(?,*.exe), ref: 00902B38
                                • PathCombineW.SHLWAPI(?,perflogs,?), ref: 00902B58
                                • FindNextFileW.KERNELBASE(000000FF,?), ref: 00902BF3
                                • CloseHandle.KERNELBASE(000000FF), ref: 00902C08
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID: Path$Combine$FileFindlstrcmpmemset$CharCloseFirstHandleLowerMatchNextSpec
                                • String ID: $recycle.bin$*.exe$DriveSec$VolDri$appdata$application data$boot$config$default$intel$msocache$perflogs$program files$programdata$sys$system$win$windows$wup
                                • API String ID: 1416314416-1168010690
                                • Opcode ID: 334b40bee1b5e6cca105e2a85576a41e241bd9d83b1c17ede2979c2707aeb0f6
                                • Instruction ID: 11e19531cfc58af5f0f836727107315bf249aaeee551460e84a40523f88c1c67
                                • Opcode Fuzzy Hash: 334b40bee1b5e6cca105e2a85576a41e241bd9d83b1c17ede2979c2707aeb0f6
                                • Instruction Fuzzy Hash: 01615EF19043189FCF20DF60DC8DBEE77B8AB55309F404598E649A61C0E7749A88CF65

                                Control-flow Graph

                                APIs
                                • Sleep.KERNELBASE(000007D0), ref: 00901099
                                • CreateMutexA.KERNELBASE(00000000,00000000,u8u8u8ut), ref: 009010A8
                                • GetLastError.KERNEL32 ref: 009010B1
                                • ExitProcess.KERNEL32 ref: 009010C0
                                • Sleep.KERNELBASE(00001388), ref: 009010D7
                                • CreateThread.KERNELBASE(00000000,00000000,Function_00002C40,00000000,00000000,00000000), ref: 009010EC
                                • Sleep.KERNELBASE(0CDFE600), ref: 009010F7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID: Sleep$Create$ErrorExitLastMutexProcessThread
                                • String ID: u8u8u8ut
                                • API String ID: 302559243-2736330893
                                • Opcode ID: b9fdeec302f4bf51de817a98cf3a07ceae720085401d4b1a5f9d3ebf8fdacd8d
                                • Instruction ID: 1adcf9cb51c633e1f1f8036f49bd98005d1fccf24154b7ad9e81dc4ad89755a2
                                • Opcode Fuzzy Hash: b9fdeec302f4bf51de817a98cf3a07ceae720085401d4b1a5f9d3ebf8fdacd8d
                                • Instruction Fuzzy Hash: A9F0C7B269D310FFF7602BE1AD0FF193978AB50B42F610418F385F94E1DAE454445A67

                                Control-flow Graph

                                APIs
                                • CreateFileW.KERNELBASE(00902BE2,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 009024FC
                                • GetFileSize.KERNEL32(000000FF,00000000), ref: 00902518
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID: File$CreateSize
                                • String ID: .zero
                                • API String ID: 2791376181-843663606
                                • Opcode ID: 321daa51a06f5f1c08f7d09207b32830d7eff2e394912726b0ca6d5ec46cd582
                                • Instruction ID: 3d7267a3bc61e8e26de52f402964592b6499cda3c37f22e0bfde5372b1b169ed
                                • Opcode Fuzzy Hash: 321daa51a06f5f1c08f7d09207b32830d7eff2e394912726b0ca6d5ec46cd582
                                • Instruction Fuzzy Hash: F5A11975E04209EFDB04CFA4D999BEEB7B5BF48700F208559EA01BB380D735A981DB64

                                Control-flow Graph

                                APIs
                                • ExpandEnvironmentStringsW.KERNEL32(%appdata%,?,00000208), ref: 0090101A
                                • wcscat.MSVCR90 ref: 0090102C
                                • PathFileExistsW.KERNELBASE(?), ref: 0090103B
                                • CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000001,00000002,00000000), ref: 00901061
                                • CloseHandle.KERNELBASE(000000FF), ref: 0090107D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID: File$CloseCreateEnvironmentExistsExpandHandlePathStringswcscat
                                • String ID: %appdata%$\windrx.txt
                                • API String ID: 3951416151-532699497
                                • Opcode ID: 33a3dbf385f8636485d73689c68866308a1dd820a37ddf9d79c2bc8700c058ed
                                • Instruction ID: 2377e4ef47697ebb0598d4233981134d54a9bc9b964e8f2486f0cf3f4d42cc8d
                                • Opcode Fuzzy Hash: 33a3dbf385f8636485d73689c68866308a1dd820a37ddf9d79c2bc8700c058ed
                                • Instruction Fuzzy Hash: FF01F4B59183086FDB309B609C0EFD633789B44704F000790B7A8A60D2DA7499C58F90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 91 9028c0-9028eb GetLogicalDrives 92 9028f6-9028fa 91->92 93 902966-902971 92->93 94 9028fc-90291c RegOpenKeyExW 92->94 95 902964 94->95 96 90291e-902949 RegQueryValueExW 94->96 95->92 98 90295a-90295e RegCloseKey 96->98 99 90294b-90294f 96->99 98->95 99->98 100 902951-902957 99->100 100->98
                                APIs
                                • GetLogicalDrives.KERNELBASE ref: 009028C6
                                • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00902914
                                • RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00902941
                                • RegCloseKey.KERNELBASE(?), ref: 0090295E
                                Strings
                                • NoDrives, xrefs: 00902938
                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, xrefs: 00902907
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID: CloseDrivesLogicalOpenQueryValue
                                • String ID: NoDrives$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
                                • API String ID: 2666887985-3471754645
                                • Opcode ID: 7ab0f5d16619da0c88d79f3a08a0fb7924f05a85c8a94ed754eb5191e378dc8d
                                • Instruction ID: 4fda346885fc7068a856b20f40577106da5d9a87c771c18fa6f8b5987a4035ea
                                • Opcode Fuzzy Hash: 7ab0f5d16619da0c88d79f3a08a0fb7924f05a85c8a94ed754eb5191e378dc8d
                                • Instruction Fuzzy Hash: 2611E7B1E0020A9FDB14CFD4C949BEEB7B8BB44704F108108E625B6280D3B86A45DF95

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 101 902840-902866 GetDriveTypeW 102 9028b5-9028bb 101->102 103 902868-90286f 101->103 104 902871-902878 103->104 105 90287c-902894 QueryDosDeviceW 103->105 104->105 106 90287a 104->106 105->102 107 902896-9028ac StrCmpNW 105->107 106->102 107->102 108 9028ae 107->108 108->102
                                APIs
                                • GetDriveTypeW.KERNELBASE(0090281F), ref: 0090284D
                                • QueryDosDeviceW.KERNELBASE(0090281F,?,00000208), ref: 0090288C
                                • StrCmpNW.KERNELBASE(?,\??\,00000004), ref: 009028A4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID: DeviceDriveQueryType
                                • String ID: \??\
                                • API String ID: 1681518211-3047946824
                                • Opcode ID: ac7c44691ddb9e2a904f094ca3d9228a85cafd96b673f5730265c71d79c05155
                                • Instruction ID: d8a392d28233a42997a0717e549858607eb13d1f177db52bb902ce7b7981559d
                                • Opcode Fuzzy Hash: ac7c44691ddb9e2a904f094ca3d9228a85cafd96b673f5730265c71d79c05155
                                • Instruction Fuzzy Hash: 9A01FFB494420CDFDB20DF65CC4DAD977B9AB08705F00C1A9AE04A7280D6749AC5DF94

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 109 902c40-902c55 call 9028c0 112 902c60-902c64 109->112 113 902c66-902c87 call 9027e0 112->113 114 902c9f-902ca1 ExitThread 112->114 117 902c89-902c8d 113->117 118 902c9d 113->118 120 902c91-902c95 call 902980 117->120 121 902c8f 117->121 118->112 123 902c9a 120->123 121->118 123->118
                                APIs
                                  • Part of subcall function 009028C0: GetLogicalDrives.KERNELBASE ref: 009028C6
                                  • Part of subcall function 009028C0: RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00902914
                                  • Part of subcall function 009028C0: RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00902941
                                  • Part of subcall function 009028C0: RegCloseKey.KERNELBASE(?), ref: 0090295E
                                • ExitThread.KERNEL32 ref: 00902CA1
                                  • Part of subcall function 009027E0: lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 00902833
                                  • Part of subcall function 00902980: memset.MSVCR90 ref: 009029F2
                                  • Part of subcall function 00902980: memset.MSVCR90 ref: 00902A08
                                  • Part of subcall function 00902980: PathCombineW.SHLWAPI(?,perflogs,00905418), ref: 00902A20
                                  • Part of subcall function 00902980: FindFirstFileW.KERNELBASE(?,?), ref: 00902A34
                                  • Part of subcall function 00902980: lstrcmpW.KERNEL32(?,0090541C), ref: 00902A64
                                  • Part of subcall function 00902980: lstrcmpW.KERNEL32(?,00905420), ref: 00902A7A
                                  • Part of subcall function 00902980: PathCombineW.SHLWAPI(?,perflogs,?), ref: 00902A96
                                  • Part of subcall function 00902980: FindNextFileW.KERNELBASE(000000FF,?), ref: 00902BF3
                                  • Part of subcall function 00902980: CloseHandle.KERNELBASE(000000FF), ref: 00902C08
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID: CloseCombineFileFindPathlstrcmpmemset$DrivesExitFirstHandleLogicalNextOpenQueryThreadValuelstrcpy
                                • String ID:
                                • API String ID: 717983626-0
                                • Opcode ID: d01c15c7daad1f80f44a3010182fcf7fd4b3559578170b5c6437800058e43ad6
                                • Instruction ID: fb5b39d4f7489a23259cd0ae77b6881202de36caba3495b87fdd3e86ce7cd78c
                                • Opcode Fuzzy Hash: d01c15c7daad1f80f44a3010182fcf7fd4b3559578170b5c6437800058e43ad6
                                • Instruction Fuzzy Hash: ED018CB5C08218EFDB00EBE4C94EADEB7F4BF48304F2440A9D542B3281E2359A84DB65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 124 9027e0-9027fa 125 902839-90283f 124->125 126 9027fc-90281a call 902840 124->126 128 90281f-902829 126->128 128->125 129 90282b-902833 lstrcpyW 128->129 129->125
                                APIs
                                  • Part of subcall function 00902840: GetDriveTypeW.KERNELBASE(0090281F), ref: 0090284D
                                • lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 00902833
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID: DriveTypelstrcpy
                                • String ID:
                                • API String ID: 3664088370-0
                                • Opcode ID: e1ab32dc66fec2949e9e5f129923e6dec31ddb087007aaaa879de06c2825cf6a
                                • Instruction ID: 3e7f3fb5ee77cb2254800f68f58a20061a6b5292d87f5b6bb1a17bcda0186e21
                                • Opcode Fuzzy Hash: e1ab32dc66fec2949e9e5f129923e6dec31ddb087007aaaa879de06c2825cf6a
                                • Instruction Fuzzy Hash: B3F06D75D00208FBDB00DFA4D44979DB7B4EF44300F10C0A8EC159B240E275AB08DB45
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_00002FDB), ref: 00903022
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: f4600527ac8f50db9b28cb6e2fc3a0d4a706e864b3c5b98f96cfd25c4f526afc
                                • Instruction ID: 688b334f5e3bdc4e60c9621a3cad04197e19133c80728dcbbccb03dc5c5c2c20
                                • Opcode Fuzzy Hash: f4600527ac8f50db9b28cb6e2fc3a0d4a706e864b3c5b98f96cfd25c4f526afc
                                • Instruction Fuzzy Hash: D59002B02662014EC7001B709D0D50529F55B9878B74304506301F8094DA5041407951
                                Memory Dump Source
                                • Source File: 00000000.00000002.3806593557.0000000000901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00900000, based on PE: true
                                • Associated: 00000000.00000002.3806573829.0000000000900000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806609432.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3806625060.0000000000907000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_900000_QfBhv404w4.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                                • Instruction ID: be7eecee3400b42b3e558a840de4aeb97e4223185f45bdd8b65d759b642826a8
                                • Opcode Fuzzy Hash: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                                • Instruction Fuzzy Hash: 85A002321A5B8CC7C612A68DA651B51B3ECE348D54F440461A50D43E015659B9108495