Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qSD738Weui.exe

Overview

General Information

Sample name:qSD738Weui.exe
renamed because original name is a hash value
Original sample name:3de40ead93a0a5496ece6e2654e98a6bcc8726ed49140fa1617e7826c2677d2c.exe
Analysis ID:1582625
MD5:30318dd92dbd04bb0f1db21a3338fbae
SHA1:91020c6dd24df7f12474b3beef76c856f1bc7da0
SHA256:3de40ead93a0a5496ece6e2654e98a6bcc8726ed49140fa1617e7826c2677d2c
Tags:exeuser-zhuzhu0009
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found potential dummy code loops (likely to delay analysis)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for sample
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • qSD738Weui.exe (PID: 7484 cmdline: "C:\Users\user\Desktop\qSD738Weui.exe" MD5: 30318DD92DBD04BB0F1DB21A3338FBAE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "69.197.148.207:443;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "9cc5b719-be0e-4bb6-89bb-6071f352b863", "StartupKey": "Quasar Client Startup", "Tag": "System", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
qSD738Weui.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    qSD738Weui.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      qSD738Weui.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ef4d:$x1: Quasar.Common.Messages
      • 0x29f276:$x1: Quasar.Common.Messages
      • 0x2ab7ee:$x4: Uninstalling... good bye :-(
      • 0x2acfe3:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      qSD738Weui.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aada0:$f1: FileZilla\recentservers.xml
      • 0x2aade0:$f2: FileZilla\sitemanager.xml
      • 0x2aae22:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab06e:$b1: Chrome\User Data\
      • 0x2ab0c4:$b1: Chrome\User Data\
      • 0x2ab39c:$b2: Mozilla\Firefox\Profiles
      • 0x2ab498:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd41c:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab5f0:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6aa:$b5: YandexBrowser\User Data\
      • 0x2ab718:$b5: YandexBrowser\User Data\
      • 0x2ab3ec:$s4: logins.json
      • 0x2ab122:$a1: username_value
      • 0x2ab140:$a2: password_value
      • 0x2ab42c:$a3: encryptedUsername
      • 0x2fd360:$a3: encryptedUsername
      • 0x2ab450:$a4: encryptedPassword
      • 0x2fd37e:$a4: encryptedPassword
      • 0x2fd2fc:$a5: httpRealm
      qSD738Weui.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab8d8:$s3: Process already elevated.
      • 0x28ec4c:$s4: get_PotentiallyVulnerablePasswords
      • 0x278d08:$s5: GetKeyloggerLogsDirectory
      • 0x29e9d5:$s5: GetKeyloggerLogsDirectory
      • 0x28ec6f:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea4a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1678697636.0000000000570000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000000.00000002.4147955993.00000000026E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000000.00000000.1678400692.0000000000252000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Process Memory Space: qSD738Weui.exe PID: 7484JoeSecurity_QuasarYara detected Quasar RATJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.qSD738Weui.exe.250000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                0.0.qSD738Weui.exe.250000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  0.0.qSD738Weui.exe.250000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                  • 0x28ef4d:$x1: Quasar.Common.Messages
                  • 0x29f276:$x1: Quasar.Common.Messages
                  • 0x2ab7ee:$x4: Uninstalling... good bye :-(
                  • 0x2acfe3:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                  0.0.qSD738Weui.exe.250000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                  • 0x2aada0:$f1: FileZilla\recentservers.xml
                  • 0x2aade0:$f2: FileZilla\sitemanager.xml
                  • 0x2aae22:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                  • 0x2ab06e:$b1: Chrome\User Data\
                  • 0x2ab0c4:$b1: Chrome\User Data\
                  • 0x2ab39c:$b2: Mozilla\Firefox\Profiles
                  • 0x2ab498:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x2fd41c:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x2ab5f0:$b4: Opera Software\Opera Stable\Login Data
                  • 0x2ab6aa:$b5: YandexBrowser\User Data\
                  • 0x2ab718:$b5: YandexBrowser\User Data\
                  • 0x2ab3ec:$s4: logins.json
                  • 0x2ab122:$a1: username_value
                  • 0x2ab140:$a2: password_value
                  • 0x2ab42c:$a3: encryptedUsername
                  • 0x2fd360:$a3: encryptedUsername
                  • 0x2ab450:$a4: encryptedPassword
                  • 0x2fd37e:$a4: encryptedPassword
                  • 0x2fd2fc:$a5: httpRealm
                  0.0.qSD738Weui.exe.250000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                  • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                  • 0x2ab8d8:$s3: Process already elevated.
                  • 0x28ec4c:$s4: get_PotentiallyVulnerablePasswords
                  • 0x278d08:$s5: GetKeyloggerLogsDirectory
                  • 0x29e9d5:$s5: GetKeyloggerLogsDirectory
                  • 0x28ec6f:$s6: set_PotentiallyVulnerablePasswords
                  • 0x2fea4a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: qSD738Weui.exeAvira: detected
                  Source: qSD738Weui.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "69.197.148.207:443;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "9cc5b719-be0e-4bb6-89bb-6071f352b863", "StartupKey": "Quasar Client Startup", "Tag": "System", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                  Source: qSD738Weui.exeReversingLabs: Detection: 73%
                  Source: qSD738Weui.exeVirustotal: Detection: 73%Perma Link
                  Source: Yara matchFile source: qSD738Weui.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1678697636.0000000000570000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4147955993.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1678400692.0000000000252000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qSD738Weui.exe PID: 7484, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: qSD738Weui.exeJoe Sandbox ML: detected
                  Source: qSD738Weui.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: qSD738Weui.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 69.197.148.207
                  Source: Yara matchFile source: qSD738Weui.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewASN Name: WIIUS WIIUS
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: unknownTCP traffic detected without corresponding DNS query: 69.197.148.207
                  Source: qSD738Weui.exe, 00000000.00000002.4147955993.00000000026E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: qSD738Weui.exeString found in binary or memory: https://api.ipify.org/
                  Source: qSD738Weui.exeString found in binary or memory: https://ipwho.is/
                  Source: qSD738Weui.exeString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: qSD738Weui.exeString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: qSD738Weui.exeString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50008
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50008 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\qSD738Weui.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\qSD738Weui.exeJump to behavior

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: qSD738Weui.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1678697636.0000000000570000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4147955993.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1678400692.0000000000252000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qSD738Weui.exe PID: 7484, type: MEMORYSTR

                  System Summary

                  barindex
                  Source: qSD738Weui.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: qSD738Weui.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: qSD738Weui.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: C:\Users\user\Desktop\qSD738Weui.exeCode function: 0_2_00007FFD9BA6AFDD0_2_00007FFD9BA6AFDD
                  Source: C:\Users\user\Desktop\qSD738Weui.exeCode function: 0_2_00007FFD9BA69BD10_2_00007FFD9BA69BD1
                  Source: C:\Users\user\Desktop\qSD738Weui.exeCode function: 0_2_00007FFD9BA655D60_2_00007FFD9BA655D6
                  Source: C:\Users\user\Desktop\qSD738Weui.exeCode function: 0_2_00007FFD9BA692710_2_00007FFD9BA69271
                  Source: C:\Users\user\Desktop\qSD738Weui.exeCode function: 0_2_00007FFD9BA6621F0_2_00007FFD9BA6621F
                  Source: qSD738Weui.exe, 00000000.00000000.1678697636.0000000000570000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs qSD738Weui.exe
                  Source: qSD738Weui.exeBinary or memory string: OriginalFilenameClient.exe. vs qSD738Weui.exe
                  Source: qSD738Weui.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: qSD738Weui.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: qSD738Weui.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: qSD738Weui.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@0/1
                  Source: C:\Users\user\Desktop\qSD738Weui.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\qSD738Weui.exeMutant created: \Sessions\1\BaseNamedObjects\Local\9cc5b719-be0e-4bb6-89bb-6071f352b863
                  Source: qSD738Weui.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: qSD738Weui.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\qSD738Weui.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: qSD738Weui.exeReversingLabs: Detection: 73%
                  Source: qSD738Weui.exeVirustotal: Detection: 73%
                  Source: qSD738Weui.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: mrmcorer.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: thumbcache.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                  Source: qSD738Weui.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: qSD738Weui.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: qSD738Weui.exeStatic file information: File size 3265536 > 1048576
                  Source: qSD738Weui.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                  Source: qSD738Weui.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\qSD738Weui.exeCode function: 0_2_00007FFD9B7FD7D3 push eax; iretd 0_2_00007FFD9B7FD7D9
                  Source: C:\Users\user\Desktop\qSD738Weui.exeCode function: 0_2_00007FFD9B7F7563 push ebx; iretd 0_2_00007FFD9B7F756A
                  Source: C:\Users\user\Desktop\qSD738Weui.exeCode function: 0_2_00007FFD9B7F7963 push ebx; retf 0_2_00007FFD9B7F796A
                  Source: C:\Users\user\Desktop\qSD738Weui.exeCode function: 0_2_00007FFD9BA6336E push eax; ret 0_2_00007FFD9BA6340C

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\qSD738Weui.exeFile opened: C:\Users\user\Desktop\qSD738Weui.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeMemory allocated: DB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeMemory allocated: 1A6E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeWindow / User API: threadDelayed 8286Jump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeWindow / User API: threadDelayed 1567Jump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exe TID: 7572Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Users\user\Desktop\qSD738Weui.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: qSD738Weui.exe, 00000000.00000002.4150186261.000000001B3FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllx
                  Source: qSD738Weui.exe, 00000000.00000002.4150186261.000000001B3FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess Stats: CPU usage > 42% for more than 60s
                  Source: C:\Users\user\Desktop\qSD738Weui.exeProcess token adjusted: DebugJump to behavior
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Users\user\Desktop\qSD738Weui.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeQueries volume information: C:\Users\user\Desktop\qSD738Weui.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\qSD738Weui.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: qSD738Weui.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1678697636.0000000000570000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4147955993.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1678400692.0000000000252000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qSD738Weui.exe PID: 7484, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: qSD738Weui.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.qSD738Weui.exe.250000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1678697636.0000000000570000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4147955993.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1678400692.0000000000252000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: qSD738Weui.exe PID: 7484, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  11
                  Input Capture
                  11
                  Security Software Discovery
                  Remote Services11
                  Input Capture
                  12
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts132
                  Virtualization/Sandbox Evasion
                  LSASS Memory132
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  11
                  Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Hidden Files and Directories
                  Security Account Manager1
                  Application Window Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Obfuscated Files or Information
                  NTDS1
                  File and Directory Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets12
                  System Information Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  qSD738Weui.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                  qSD738Weui.exe74%VirustotalBrowse
                  qSD738Weui.exe100%AviraHEUR/AGEN.1307453
                  qSD738Weui.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  69.197.148.2070%Avira URL Cloudsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  69.197.148.207true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/qSD738Weui.exefalse
                    high
                    https://stackoverflow.com/q/14436606/23354qSD738Weui.exefalse
                      high
                      https://stackoverflow.com/q/2152978/23354sCannotqSD738Weui.exefalse
                        high
                        https://ipwho.is/qSD738Weui.exefalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameqSD738Weui.exe, 00000000.00000002.4147955993.00000000026E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/11564914/23354;qSD738Weui.exefalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              69.197.148.207
                              unknownUnited States
                              32097WIIUStrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1582625
                              Start date and time:2024-12-31 06:12:06 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 49s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:5
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:qSD738Weui.exe
                              renamed because original name is a hash value
                              Original Sample Name:3de40ead93a0a5496ece6e2654e98a6bcc8726ed49140fa1617e7826c2677d2c.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@1/0@0/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 8
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              00:13:01API Interceptor12373038x Sleep call for process: qSD738Weui.exe modified
                              No context
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              WIIUShttps://aiihsr.com/FloridaCUGet hashmaliciousUnknownBrowse
                              • 173.208.207.172
                              SHIPPING DOCUMENTS_PDF.exeGet hashmaliciousFormBookBrowse
                              • 173.208.249.155
                              arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 173.208.191.42
                              mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                              • 69.197.135.107
                              loligang.arm7.elfGet hashmaliciousMiraiBrowse
                              • 69.197.241.147
                              nabppc.elfGet hashmaliciousUnknownBrowse
                              • 173.208.211.170
                              la.bot.mips.elfGet hashmaliciousUnknownBrowse
                              • 173.208.128.129
                              la.bot.arm.elfGet hashmaliciousUnknownBrowse
                              • 204.12.226.228
                              m68k.elfGet hashmaliciousMiraiBrowse
                              • 173.208.146.198
                              http://pub-21beea42d44e4f0e83b5336b9ac3900a.r2.dev/woosf.htmlGet hashmaliciousUnknownBrowse
                              • 173.208.194.98
                              No context
                              No context
                              No created / dropped files found
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):6.082925278010668
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:qSD738Weui.exe
                              File size:3'265'536 bytes
                              MD5:30318dd92dbd04bb0f1db21a3338fbae
                              SHA1:91020c6dd24df7f12474b3beef76c856f1bc7da0
                              SHA256:3de40ead93a0a5496ece6e2654e98a6bcc8726ed49140fa1617e7826c2677d2c
                              SHA512:bd1a89712e110406d667f413d640ed93ace4718829c2283eff142c2b613e8924b15359da5c3b88ab04a1709e4804ed0a41f9b2be78d048f8ea3b605c78644b7f
                              SSDEEP:49152:evfI22SsaNYfdPBldt698dBcjHQz7zXWoGd8THHB72eh2NT:evw22SsaNYfdPBldt6+dBcjHQz7zm
                              TLSH:3EE56B0437F85E72E16BD7B3E5B0501263F1F82AF363EB0B5181A77A5C93B5488426A7
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                              Icon Hash:90cececece8e8eb0
                              Entrypoint:0x71e3de
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3840x57.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x31c3e40x31c4009df2c9c12a04a9722ff0df4f2d7e805eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x3200000xa930xc00cdeae95ac72e9e58017d2bcc89d2fbeaFalse0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x3220000xc0x200576e09f300aa2216eb4d32ea1fecea5fFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0x3200a00x31cdata0.4484924623115578
                              RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 31, 2024 06:13:01.241765976 CET49730443192.168.2.469.197.148.207
                              Dec 31, 2024 06:13:01.241833925 CET4434973069.197.148.207192.168.2.4
                              Dec 31, 2024 06:13:01.241911888 CET49730443192.168.2.469.197.148.207
                              Dec 31, 2024 06:13:01.251348972 CET49730443192.168.2.469.197.148.207
                              Dec 31, 2024 06:13:01.251368046 CET4434973069.197.148.207192.168.2.4
                              Dec 31, 2024 06:13:26.259110928 CET49730443192.168.2.469.197.148.207
                              Dec 31, 2024 06:13:26.259133101 CET4434973069.197.148.207192.168.2.4
                              Dec 31, 2024 06:13:43.994745016 CET4434973069.197.148.207192.168.2.4
                              Dec 31, 2024 06:13:43.994829893 CET49730443192.168.2.469.197.148.207
                              Dec 31, 2024 06:13:44.012280941 CET49730443192.168.2.469.197.148.207
                              Dec 31, 2024 06:13:44.012298107 CET4434973069.197.148.207192.168.2.4
                              Dec 31, 2024 06:13:47.275228024 CET49737443192.168.2.469.197.148.207
                              Dec 31, 2024 06:13:47.275247097 CET4434973769.197.148.207192.168.2.4
                              Dec 31, 2024 06:13:47.275332928 CET49737443192.168.2.469.197.148.207
                              Dec 31, 2024 06:13:47.275636911 CET49737443192.168.2.469.197.148.207
                              Dec 31, 2024 06:13:47.275650024 CET4434973769.197.148.207192.168.2.4
                              Dec 31, 2024 06:14:12.290421009 CET49737443192.168.2.469.197.148.207
                              Dec 31, 2024 06:14:12.290429115 CET4434973769.197.148.207192.168.2.4
                              Dec 31, 2024 06:14:29.995861053 CET4434973769.197.148.207192.168.2.4
                              Dec 31, 2024 06:14:29.996027946 CET49737443192.168.2.469.197.148.207
                              Dec 31, 2024 06:14:29.996332884 CET49737443192.168.2.469.197.148.207
                              Dec 31, 2024 06:14:29.996340036 CET4434973769.197.148.207192.168.2.4
                              Dec 31, 2024 06:14:33.681525946 CET49979443192.168.2.469.197.148.207
                              Dec 31, 2024 06:14:33.681546926 CET4434997969.197.148.207192.168.2.4
                              Dec 31, 2024 06:14:33.681677103 CET49979443192.168.2.469.197.148.207
                              Dec 31, 2024 06:14:33.681915045 CET49979443192.168.2.469.197.148.207
                              Dec 31, 2024 06:14:33.681930065 CET4434997969.197.148.207192.168.2.4
                              Dec 31, 2024 06:14:58.696739912 CET49979443192.168.2.469.197.148.207
                              Dec 31, 2024 06:14:58.696754932 CET4434997969.197.148.207192.168.2.4
                              Dec 31, 2024 06:15:16.455358028 CET4434997969.197.148.207192.168.2.4
                              Dec 31, 2024 06:15:16.459243059 CET49979443192.168.2.469.197.148.207
                              Dec 31, 2024 06:15:16.462019920 CET49979443192.168.2.469.197.148.207
                              Dec 31, 2024 06:15:16.462038040 CET4434997969.197.148.207192.168.2.4
                              Dec 31, 2024 06:15:20.025357962 CET50006443192.168.2.469.197.148.207
                              Dec 31, 2024 06:15:20.025434971 CET4435000669.197.148.207192.168.2.4
                              Dec 31, 2024 06:15:20.025513887 CET50006443192.168.2.469.197.148.207
                              Dec 31, 2024 06:15:20.025841951 CET50006443192.168.2.469.197.148.207
                              Dec 31, 2024 06:15:20.025865078 CET4435000669.197.148.207192.168.2.4
                              Dec 31, 2024 06:15:45.042125940 CET50006443192.168.2.469.197.148.207
                              Dec 31, 2024 06:15:45.042159081 CET4435000669.197.148.207192.168.2.4
                              Dec 31, 2024 06:16:02.780563116 CET4435000669.197.148.207192.168.2.4
                              Dec 31, 2024 06:16:02.782584906 CET50006443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:02.788216114 CET50006443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:02.788234949 CET4435000669.197.148.207192.168.2.4
                              Dec 31, 2024 06:16:06.400703907 CET50007443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:06.400744915 CET4435000769.197.148.207192.168.2.4
                              Dec 31, 2024 06:16:06.404340982 CET50007443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:06.408252954 CET50007443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:06.408265114 CET4435000769.197.148.207192.168.2.4
                              Dec 31, 2024 06:16:31.418745995 CET50007443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:31.418768883 CET4435000769.197.148.207192.168.2.4
                              Dec 31, 2024 06:16:49.180989981 CET4435000769.197.148.207192.168.2.4
                              Dec 31, 2024 06:16:49.186836958 CET50007443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:49.192817926 CET50007443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:49.192832947 CET4435000769.197.148.207192.168.2.4
                              Dec 31, 2024 06:16:52.932457924 CET50008443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:52.932492018 CET4435000869.197.148.207192.168.2.4
                              Dec 31, 2024 06:16:52.932641029 CET50008443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:52.932853937 CET50008443192.168.2.469.197.148.207
                              Dec 31, 2024 06:16:52.932866096 CET4435000869.197.148.207192.168.2.4

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Target ID:0
                              Start time:00:12:57
                              Start date:31/12/2024
                              Path:C:\Users\user\Desktop\qSD738Weui.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\qSD738Weui.exe"
                              Imagebase:0x250000
                              File size:3'265'536 bytes
                              MD5 hash:30318DD92DBD04BB0F1DB21A3338FBAE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1678697636.0000000000570000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.4147955993.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1678400692.0000000000252000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:11.2%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:8
                                Total number of Limit Nodes:1
                                execution_graph 11847 7ffd9b7f3569 11848 7ffd9b7f3571 DeleteFileW 11847->11848 11850 7ffd9b7f3616 11848->11850 11851 7ffd9ba6e6f9 11853 7ffd9ba6e70f 11851->11853 11852 7ffd9ba6e7bb 11853->11852 11854 7ffd9ba6e8b4 SetWindowsHookExW 11853->11854 11855 7ffd9ba6e8f6 11854->11855
                                Memory Dump Source
                                • Source File: 00000000.00000002.4152255297.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9ba60000_qSD738Weui.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 95df8fd9320eec1ef2518be48dc921aea677fc564e79c422675b54ed7628ad65
                                • Instruction ID: 15c6fe122a08896b5ac8272c34bd32f5e33104efaf84b1724d0a4d78512a7691
                                • Opcode Fuzzy Hash: 95df8fd9320eec1ef2518be48dc921aea677fc564e79c422675b54ed7628ad65
                                • Instruction Fuzzy Hash: 2FF2A270A19A0D8FDFA8DF58C8A4BA977E1FF58300F1541A9D44ED72A6DE34E981CB40

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 586 7ffd9ba69bd1-7ffd9ba69c19 588 7ffd9ba69c1b-7ffd9ba69c29 586->588 589 7ffd9ba69c2a-7ffd9ba69c3c 586->589 591 7ffd9ba69c42-7ffd9ba69c52 589->591 592 7ffd9ba69cbf-7ffd9ba69cc3 589->592 600 7ffd9ba69f3b-7ffd9ba69f8a 591->600 601 7ffd9ba69c58-7ffd9ba69ca7 591->601 593 7ffd9ba69cdb-7ffd9ba69cdf 592->593 594 7ffd9ba69cc5-7ffd9ba69cc9 592->594 596 7ffd9ba69ce1-7ffd9ba69d08 593->596 597 7ffd9ba69d0e-7ffd9ba69d12 593->597 602 7ffd9ba69cd0-7ffd9ba69cd4 594->602 596->597 606 7ffd9ba69f91-7ffd9ba69fa9 596->606 598 7ffd9ba69f2c-7ffd9ba69f3a 597->598 599 7ffd9ba69d18-7ffd9ba69d1d 597->599 599->598 604 7ffd9ba69d23-7ffd9ba69d2d 599->604 600->606 636 7ffd9ba69cb4-7ffd9ba69cb8 601->636 637 7ffd9ba69ca9-7ffd9ba69cb2 601->637 602->593 613 7ffd9ba69d2f-7ffd9ba69d41 604->613 614 7ffd9ba69d7b-7ffd9ba69d80 604->614 624 7ffd9ba69fab-7ffd9ba69fb1 606->624 625 7ffd9ba69fb5 606->625 613->614 626 7ffd9ba69d43-7ffd9ba69d6e 613->626 616 7ffd9ba69f08-7ffd9ba69f0d 614->616 617 7ffd9ba69d86-7ffd9ba69d90 614->617 616->598 619 7ffd9ba69f0f-7ffd9ba69f24 616->619 617->616 627 7ffd9ba69d96-7ffd9ba69da8 617->627 619->598 633 7ffd9ba69f26-7ffd9ba69f29 619->633 629 7ffd9ba69fb3 624->629 630 7ffd9ba69fb9-7ffd9ba6a018 624->630 625->630 631 7ffd9ba69fb7 625->631 626->614 644 7ffd9ba69d70-7ffd9ba69d74 626->644 640 7ffd9ba69e9e-7ffd9ba69ea9 627->640 641 7ffd9ba69dae-7ffd9ba69df3 627->641 629->625 649 7ffd9ba6a5be-7ffd9ba6a5d0 630->649 650 7ffd9ba6a01e-7ffd9ba6a030 630->650 631->630 633->598 636->592 637->592 647 7ffd9ba69e30-7ffd9ba69e57 640->647 648 7ffd9ba69eab-7ffd9ba69f01 640->648 641->640 663 7ffd9ba69df9-7ffd9ba69e10 641->663 644->614 647->640 661 7ffd9ba69e59-7ffd9ba69e6d 647->661 648->616 650->649 657 7ffd9ba6a036-7ffd9ba6a06f 650->657 657->649 670 7ffd9ba6a075-7ffd9ba6a0b6 657->670 674 7ffd9ba6a0bc-7ffd9ba6a0d4 670->674 675 7ffd9ba6a168-7ffd9ba6a17b 670->675 678 7ffd9ba6a15c-7ffd9ba6a162 674->678 679 7ffd9ba6a0da-7ffd9ba6a0fa 674->679 680 7ffd9ba6a1d0 675->680 681 7ffd9ba6a17d-7ffd9ba6a19e 675->681 678->674 678->675 679->678 695 7ffd9ba6a0fc-7ffd9ba6a10e 679->695 682 7ffd9ba6a1d2-7ffd9ba6a1d7 680->682 687 7ffd9ba6a1a0-7ffd9ba6a1c7 681->687 688 7ffd9ba6a1c9-7ffd9ba6a1ce 681->688 683 7ffd9ba6a21e-7ffd9ba6a241 682->683 684 7ffd9ba6a1d9-7ffd9ba6a1e0 682->684 692 7ffd9ba6a337-7ffd9ba6a343 683->692 693 7ffd9ba6a247-7ffd9ba6a26f 683->693 689 7ffd9ba6a1e7-7ffd9ba6a201 684->689 687->682 688->682 689->683 699 7ffd9ba6a203-7ffd9ba6a21c 689->699 692->649 697 7ffd9ba6a349-7ffd9ba6a35e 692->697 706 7ffd9ba6a32b-7ffd9ba6a331 693->706 707 7ffd9ba6a275-7ffd9ba6a290 693->707 695->678 701 7ffd9ba6a110-7ffd9ba6a114 695->701 697->649 699->683 704 7ffd9ba6a5d1-7ffd9ba6a673 701->704 705 7ffd9ba6a11a-7ffd9ba6a12f 701->705 717 7ffd9ba6a679-7ffd9ba6a67b 704->717 718 7ffd9ba6a785-7ffd9ba6a791 704->718 712 7ffd9ba6a136-7ffd9ba6a138 705->712 706->692 706->693 707->706 719 7ffd9ba6a296-7ffd9ba6a2a8 707->719 712->678 713 7ffd9ba6a13a-7ffd9ba6a158 call 7ffd9ba653c0 712->713 713->678 721 7ffd9ba6a67d-7ffd9ba6a68f 717->721 722 7ffd9ba6a695-7ffd9ba6a6a3 717->722 727 7ffd9ba6a793-7ffd9ba6a7b8 718->727 728 7ffd9ba6a7ba 718->728 719->706 732 7ffd9ba6a2ae-7ffd9ba6a2b2 719->732 721->722 734 7ffd9ba6a7bf-7ffd9ba6a7f1 721->734 725 7ffd9ba6a6a9-7ffd9ba6a6c0 722->725 726 7ffd9ba6a7f8-7ffd9ba6a82b 722->726 745 7ffd9ba6a6c2-7ffd9ba6a6d4 725->745 746 7ffd9ba6a6da-7ffd9ba6a6dd 725->746 750 7ffd9ba6a832-7ffd9ba6a83e 726->750 727->728 728->734 732->704 736 7ffd9ba6a2b8-7ffd9ba6a2fb 732->736 734->726 736->706 764 7ffd9ba6a2fd-7ffd9ba6a328 call 7ffd9ba653c0 736->764 745->746 745->750 747 7ffd9ba6a6df-7ffd9ba6a6f6 746->747 748 7ffd9ba6a706-7ffd9ba6a722 call 7ffd9ba67a50 746->748 747->748 773 7ffd9ba6a6f8-7ffd9ba6a6fc 747->773 768 7ffd9ba6a753-7ffd9ba6a757 748->768 769 7ffd9ba6a724-7ffd9ba6a752 748->769 755 7ffd9ba6a840-7ffd9ba6a864 750->755 756 7ffd9ba6a867 750->756 755->756 761 7ffd9ba6a87b 756->761 762 7ffd9ba6a869-7ffd9ba6a871 756->762 766 7ffd9ba6a87d 761->766 765 7ffd9ba6a873-7ffd9ba6a879 762->765 762->766 764->706 765->761 771 7ffd9ba6a881-7ffd9ba6a8bc 765->771 766->771 772 7ffd9ba6a87f 766->772 777 7ffd9ba6a75e-7ffd9ba6a784 768->777 780 7ffd9ba6a8ff-7ffd9ba6a932 771->780 781 7ffd9ba6a8be-7ffd9ba6a8e5 771->781 772->771 779 7ffd9ba6a703-7ffd9ba6a704 773->779 779->748 791 7ffd9ba6a939-7ffd9ba6a981 780->791 781->791 792 7ffd9ba6a8e7-7ffd9ba6a8fe 781->792 799 7ffd9ba6a983 791->799 800 7ffd9ba6a985-7ffd9ba6a9a7 791->800 799->800 801 7ffd9ba6a9c5-7ffd9ba6a9ca 799->801 803 7ffd9ba6a9ad-7ffd9ba6a9bf 800->803 804 7ffd9ba6aa8a-7ffd9ba6aa96 800->804 810 7ffd9ba6a9c1-7ffd9ba6a9c4 803->810 811 7ffd9ba6a9cb-7ffd9ba6a9e3 call 7ffd9ba640b0 803->811 806 7ffd9ba6aabf-7ffd9ba6aad3 804->806 807 7ffd9ba6aa98-7ffd9ba6aabd 804->807 816 7ffd9ba6ab15-7ffd9ba6ab17 806->816 817 7ffd9ba6aad5-7ffd9ba6aaf2 806->817 807->806 810->801 818 7ffd9ba6aa47-7ffd9ba6aa50 811->818 819 7ffd9ba6a9e5-7ffd9ba6aa16 811->819 821 7ffd9ba6ab19-7ffd9ba6ab1b 816->821 820 7ffd9ba6aaf4-7ffd9ba6ab0f 817->820 817->821 828 7ffd9ba6aa41-7ffd9ba6aa45 819->828 829 7ffd9ba6aa18-7ffd9ba6aa3f 819->829 820->821 824 7ffd9ba6ab11-7ffd9ba6ab12 820->824 822 7ffd9ba6ab1d-7ffd9ba6ab2b 821->822 823 7ffd9ba6ab2c-7ffd9ba6ab3c 821->823 824->816 828->818 828->819 829->828 831 7ffd9ba6aa51-7ffd9ba6aa89 829->831
                                Memory Dump Source
                                • Source File: 00000000.00000002.4152255297.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9ba60000_qSD738Weui.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 173b9ae4e7e75d4a727b72f80e5f5ff7de2a758cfb4fcccc9b797fde08dca5b7
                                • Instruction ID: 28bd29d60c2443e601669fcfa5f2e4601ca29f26bc4d2d7c0e31fc1a7b248537
                                • Opcode Fuzzy Hash: 173b9ae4e7e75d4a727b72f80e5f5ff7de2a758cfb4fcccc9b797fde08dca5b7
                                • Instruction Fuzzy Hash: 7E922A7171D90D8FEBA8EB6CD465A7937D1EF99310F0500BAE44EC72E6DE28AC428741

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 889 7ffd9ba6afdd-7ffd9ba6b079 891 7ffd9ba6b6f1-7ffd9ba6b706 889->891 892 7ffd9ba6b07f-7ffd9ba6b082 889->892 892->891 893 7ffd9ba6b088-7ffd9ba6b0a5 892->893 893->891 895 7ffd9ba6b0ab-7ffd9ba6b0ca 893->895 897 7ffd9ba6b0cc-7ffd9ba6b0cf 895->897 898 7ffd9ba6b0d6-7ffd9ba6b0e9 895->898 900 7ffd9ba6b0d1 897->900 901 7ffd9ba6b0ee-7ffd9ba6b11e 897->901 899 7ffd9ba6b179-7ffd9ba6b18b 898->899 899->891 904 7ffd9ba6b191-7ffd9ba6b1d0 899->904 900->891 901->891 906 7ffd9ba6b124-7ffd9ba6b172 901->906 904->891 911 7ffd9ba6b1d6-7ffd9ba6b1e0 904->911 906->899 914 7ffd9ba6b1e2-7ffd9ba6b1f6 911->914 915 7ffd9ba6b1f8-7ffd9ba6b208 911->915 918 7ffd9ba6b212-7ffd9ba6b267 914->918 915->918 922 7ffd9ba6b26d-7ffd9ba6b275 918->922 923 7ffd9ba6b2db-7ffd9ba6b2e3 922->923 924 7ffd9ba6b277-7ffd9ba6b28b 922->924 923->891 925 7ffd9ba6b2e9-7ffd9ba6b30b 923->925 924->923 928 7ffd9ba6b28d-7ffd9ba6b2d7 924->928 929 7ffd9ba6b311-7ffd9ba6b33a 925->929 930 7ffd9ba6b40f-7ffd9ba6b41a 925->930 928->923 936 7ffd9ba6b3c1-7ffd9ba6b3e2 929->936 937 7ffd9ba6b340-7ffd9ba6b366 929->937 934 7ffd9ba6b48c-7ffd9ba6b4b5 930->934 935 7ffd9ba6b41c-7ffd9ba6b445 930->935 951 7ffd9ba6b4b7-7ffd9ba6b4d1 934->951 952 7ffd9ba6b4d8-7ffd9ba6b4e5 934->952 935->891 947 7ffd9ba6b44b-7ffd9ba6b45d 935->947 936->929 940 7ffd9ba6b3e8 936->940 937->936 950 7ffd9ba6b368-7ffd9ba6b37e 937->950 940->930 947->891 955 7ffd9ba6b463-7ffd9ba6b481 947->955 950->936 956 7ffd9ba6b380-7ffd9ba6b398 950->956 951->952 960 7ffd9ba6b4eb-7ffd9ba6b518 952->960 961 7ffd9ba6b5aa-7ffd9ba6b5ca 952->961 955->891 969 7ffd9ba6b487-7ffd9ba6b488 955->969 956->936 963 7ffd9ba6b39a-7ffd9ba6b3bf 956->963 975 7ffd9ba6b53b-7ffd9ba6b547 960->975 976 7ffd9ba6b51a-7ffd9ba6b534 960->976 967 7ffd9ba6b5d4-7ffd9ba6b610 961->967 968 7ffd9ba6b5cc-7ffd9ba6b5cd 961->968 963->936 972 7ffd9ba6b3ea-7ffd9ba6b408 963->972 967->891 984 7ffd9ba6b616-7ffd9ba6b633 967->984 968->967 969->934 972->930 982 7ffd9ba6b549-7ffd9ba6b555 975->982 983 7ffd9ba6b598-7ffd9ba6b5a4 975->983 976->975 985 7ffd9ba6b840-7ffd9ba6b857 982->985 986 7ffd9ba6b55b-7ffd9ba6b591 982->986 983->891 983->961 990 7ffd9ba6b63d-7ffd9ba6b678 984->990 991 7ffd9ba6b635-7ffd9ba6b636 984->991 993 7ffd9ba6b861-7ffd9ba6b8cf call 7ffd9ba65070 call 7ffd9ba67d70 call 7ffd9ba65370 call 7ffd9ba6b8d0 985->993 994 7ffd9ba6b859-7ffd9ba6b860 985->994 986->983 990->891 1006 7ffd9ba6b67a-7ffd9ba6b68c 990->1006 991->990 994->993 1006->891 1010 7ffd9ba6b68e-7ffd9ba6b6ac 1006->1010 1010->891 1013 7ffd9ba6b6ae-7ffd9ba6b6ca 1010->1013 1016 7ffd9ba6b6cc-7ffd9ba6b6ef 1013->1016 1017 7ffd9ba6b707-7ffd9ba6b77c 1013->1017 1016->891 1016->1017 1027 7ffd9ba6b782-7ffd9ba6b78b 1017->1027 1028 7ffd9ba6b827-7ffd9ba6b83f 1017->1028 1027->1028
                                Memory Dump Source
                                • Source File: 00000000.00000002.4152255297.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9ba60000_qSD738Weui.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8a6e7623a545b1d479f77927fe9110c2d107d9122f922b5855c73ed83e17e57d
                                • Instruction ID: 3fe7a5d2dec3b62eb232a4f33703ddfc025465205cb54a920c06d37322a9bfa5
                                • Opcode Fuzzy Hash: 8a6e7623a545b1d479f77927fe9110c2d107d9122f922b5855c73ed83e17e57d
                                • Instruction Fuzzy Hash: D4527F70B08A098FEBA8EB2CC465B7977E1FF99300F5545B9E44DC72A6DE34E8418B41

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1030 7ffd9ba69271-7ffd9ba69295 1031 7ffd9ba692df-7ffd9ba692e2 1030->1031 1032 7ffd9ba69297-7ffd9ba692bc 1030->1032 1033 7ffd9ba692d0-7ffd9ba692de 1032->1033 1034 7ffd9ba692be-7ffd9ba692ce 1032->1034 1033->1031 1034->1033 1036 7ffd9ba692e3-7ffd9ba69314 1034->1036 1039 7ffd9ba69363-7ffd9ba69388 call 7ffd9ba67e00 1036->1039 1040 7ffd9ba69316-7ffd9ba69335 call 7ffd9ba63950 1036->1040 1046 7ffd9ba695f2-7ffd9ba69605 call 7ffd9ba68d80 1039->1046 1047 7ffd9ba6938e-7ffd9ba6939c call 7ffd9ba64e50 1039->1047 1040->1039 1045 7ffd9ba69337-7ffd9ba69357 call 7ffd9ba63830 1040->1045 1045->1039 1058 7ffd9ba69359-7ffd9ba69360 1045->1058 1056 7ffd9ba69632-7ffd9ba69634 1046->1056 1057 7ffd9ba69607-7ffd9ba69628 1046->1057 1054 7ffd9ba6939e-7ffd9ba693b2 1047->1054 1055 7ffd9ba693b6-7ffd9ba693b9 1047->1055 1054->1055 1059 7ffd9ba69583-7ffd9ba6958e 1055->1059 1060 7ffd9ba693bf-7ffd9ba693c2 1055->1060 1061 7ffd9ba69643-7ffd9ba696c6 1056->1061 1062 7ffd9ba69636-7ffd9ba6963a 1056->1062 1057->1056 1070 7ffd9ba6962a-7ffd9ba6962f 1057->1070 1058->1039 1064 7ffd9ba695c5-7ffd9ba695d0 1059->1064 1063 7ffd9ba693c8 1060->1063 1060->1064 1076 7ffd9ba696ce-7ffd9ba696cf 1061->1076 1062->1061 1067 7ffd9ba6963c-7ffd9ba6963e 1062->1067 1063->1046 1064->1046 1072 7ffd9ba696d5-7ffd9ba696d8 1067->1072 1070->1056 1074 7ffd9ba696de-7ffd9ba69751 call 7ffd9ba68060 1072->1074 1075 7ffd9ba69ac7-7ffd9ba69ada 1072->1075 1084 7ffd9ba69753-7ffd9ba69774 1074->1084 1085 7ffd9ba69776 1074->1085 1076->1072 1084->1085 1086 7ffd9ba69778-7ffd9ba6978b 1084->1086 1085->1086 1089 7ffd9ba6978d-7ffd9ba697b6 1086->1089 1090 7ffd9ba697bb-7ffd9ba697f4 1086->1090 1095 7ffd9ba69870-7ffd9ba69877 1089->1095 1096 7ffd9ba697fe-7ffd9ba6982a 1090->1096 1097 7ffd9ba697f6-7ffd9ba697f7 1090->1097 1098 7ffd9ba69893-7ffd9ba698f4 1095->1098 1099 7ffd9ba69879-7ffd9ba69885 1095->1099 1096->1095 1104 7ffd9ba6982c-7ffd9ba69860 1096->1104 1097->1096 1108 7ffd9ba69915-7ffd9ba69937 1098->1108 1109 7ffd9ba698f6-7ffd9ba6990b 1098->1109 1099->1098 1101 7ffd9ba69887-7ffd9ba6988c 1099->1101 1101->1098 1104->1095 1115 7ffd9ba69862-7ffd9ba69869 1104->1115 1113 7ffd9ba69953-7ffd9ba69954 1108->1113 1114 7ffd9ba69939-7ffd9ba69945 1108->1114 1109->1108 1116 7ffd9ba69956-7ffd9ba69971 1113->1116 1117 7ffd9ba6994d-7ffd9ba69951 1114->1117 1115->1095 1116->1075 1119 7ffd9ba69977-7ffd9ba6998d call 7ffd9ba68d80 1116->1119 1117->1116 1119->1075 1122 7ffd9ba69993-7ffd9ba699b4 1119->1122 1124 7ffd9ba69a01-7ffd9ba69a22 1122->1124 1125 7ffd9ba699b6-7ffd9ba699e4 1122->1125 1130 7ffd9ba69a64-7ffd9ba69a85 1124->1130 1131 7ffd9ba69a24-7ffd9ba69a56 1124->1131 1125->1124 1129 7ffd9ba699e6-7ffd9ba699fc 1125->1129 1129->1075 1130->1075 1137 7ffd9ba69a87-7ffd9ba69ab9 1130->1137 1131->1130 1136 7ffd9ba69a58-7ffd9ba69a61 1131->1136 1136->1130 1137->1075 1141 7ffd9ba69abb-7ffd9ba69ac4 1137->1141 1141->1075
                                Memory Dump Source
                                • Source File: 00000000.00000002.4152255297.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9ba60000_qSD738Weui.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 11d0d2370ae7b2525f074d0c391dc623b15b1da0e85acd97f8e0413afef4ccab
                                • Instruction ID: 1815350d804d046906db0997aa754194e85e635c503b18e9b4c6e0cff1e67552
                                • Opcode Fuzzy Hash: 11d0d2370ae7b2525f074d0c391dc623b15b1da0e85acd97f8e0413afef4ccab
                                • Instruction Fuzzy Hash: 2F228170B19A098FEBA8DB5884A57B977E2FF98300F15417DD44EC32E2DE74E9428741
                                Memory Dump Source
                                • Source File: 00000000.00000002.4152255297.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9ba60000_qSD738Weui.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9d323af7764d92661c34453c7b32daa0601d8c60babc8e11defdd68f18763bda
                                • Instruction ID: 74bd55cea88ee816f75c862362ba8262dad85aa1063a124a11f4eb61f435f5a3
                                • Opcode Fuzzy Hash: 9d323af7764d92661c34453c7b32daa0601d8c60babc8e11defdd68f18763bda
                                • Instruction Fuzzy Hash: 78025B70E18A1D8FEBA8DF68C4957B977E1FF98301F1541B9D44ED32A5CA34B9818B40

                                Control-flow Graph

                                Memory Dump Source
                                • Source File: 00000000.00000002.4152255297.00007FFD9BA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA60000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9ba60000_qSD738Weui.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 609541e0c0e4dcec9f7faaac58400e559fc0ea1be4df7855e4874ae7fa9ff659
                                • Instruction ID: ccb49a1470ab24490508f854da5a1c436eada64aa885a5a5d9c396d7a652712f
                                • Opcode Fuzzy Hash: 609541e0c0e4dcec9f7faaac58400e559fc0ea1be4df7855e4874ae7fa9ff659
                                • Instruction Fuzzy Hash: 3F712571B1DF5D4FDB68EB6C98665B97BE1EF58310B0441BBE04AC3292DE24AC4287C1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 516 7ffd9b7f3525-7ffd9b7f352f 517 7ffd9b7f3571-7ffd9b7f35d8 516->517 518 7ffd9b7f3531-7ffd9b7f3537 516->518 522 7ffd9b7f35da-7ffd9b7f35df 517->522 523 7ffd9b7f35e2-7ffd9b7f3614 DeleteFileW 517->523 518->517 522->523 524 7ffd9b7f361c-7ffd9b7f364a 523->524 525 7ffd9b7f3616 523->525 525->524
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4151037672.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b7f0000_qSD738Weui.jbxd
                                Similarity
                                • API ID: DeleteFile
                                • String ID:
                                • API String ID: 4033686569-0
                                • Opcode ID: 5e1468098f0a9bcb839ba81b8b167c07a0486310b6c4b4f8ca21983def83a757
                                • Instruction ID: 180e054b4db822d64278881901431df71148c53d066a1058e4f6d03e6488502f
                                • Opcode Fuzzy Hash: 5e1468098f0a9bcb839ba81b8b167c07a0486310b6c4b4f8ca21983def83a757
                                • Instruction Fuzzy Hash: 17311231A0DB5C8FDB19DB688859AE9BFF0EF56311F0542AFD049D71A2CB24A805CB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 527 7ffd9b7f3569-7ffd9b7f35d8 532 7ffd9b7f35da-7ffd9b7f35df 527->532 533 7ffd9b7f35e2-7ffd9b7f3614 DeleteFileW 527->533 532->533 534 7ffd9b7f361c-7ffd9b7f364a 533->534 535 7ffd9b7f3616 533->535 535->534
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4151037672.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffd9b7f0000_qSD738Weui.jbxd
                                Similarity
                                • API ID: DeleteFile
                                • String ID:
                                • API String ID: 4033686569-0
                                • Opcode ID: 5e564423322cca063fe9cad08e0c0ee8b40cd2f212ffb159114bbf6e946b3b38
                                • Instruction ID: 6bfe2fc9beb589e15d6fc27b5c800ad40abafea20845118d622c6b12a59dd301
                                • Opcode Fuzzy Hash: 5e564423322cca063fe9cad08e0c0ee8b40cd2f212ffb159114bbf6e946b3b38
                                • Instruction Fuzzy Hash: 0731E131A0DB5C8FDB19DB588859AE9BBF0FF65321F04426BD049D32A2CB74A8458B91