Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Sample.exe

Overview

General Information

Sample name:Sample.exe
Analysis ID:1584696
MD5:196e2ae082841b1ab98dcfa445cf2704
SHA1:4af7f4bb970331ae1eb569100de98c93b61c5459
SHA256:c3e669b477d3e633bf336fc5d2506c86c8fc61b4d0be36fe2bbe3b361cf70a70
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to detect virtual machines (STR)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Sample.exe (PID: 6600 cmdline: "C:\Users\user\Desktop\Sample.exe" MD5: 196E2AE082841B1AB98DCFA445CF2704)
    • schtasks.exe (PID: 6704 cmdline: "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 6724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Runtime Broker.exe (PID: 3616 cmdline: "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" MD5: 196E2AE082841B1AB98DCFA445CF2704)
      • schtasks.exe (PID: 2056 cmdline: "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 3808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Runtime Broker.exe (PID: 2816 cmdline: "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" MD5: 196E2AE082841B1AB98DCFA445CF2704)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "91.160.181.237:4782;91.160.181.237:4783;", "SubDirectory": "Runtime Broker", "InstallName": "Runtime Broker.exe", "MutexName": "bcda0faa-47b1-4e7d-be7c-8ff6fbc69a61", "StartupKey": "Runtime Broker", "Tag": "database", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
Sample.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    Sample.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Sample.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28eed7:$x1: Quasar.Common.Messages
      • 0x29f200:$x1: Quasar.Common.Messages
      • 0x2ab816:$x4: Uninstalling... good bye :-(
      • 0x2ad00b:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      Sample.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aadc8:$f1: FileZilla\recentservers.xml
      • 0x2aae08:$f2: FileZilla\sitemanager.xml
      • 0x2aae4a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab096:$b1: Chrome\User Data\
      • 0x2ab0ec:$b1: Chrome\User Data\
      • 0x2ab3c4:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4c0:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd46c:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab618:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6d2:$b5: YandexBrowser\User Data\
      • 0x2ab740:$b5: YandexBrowser\User Data\
      • 0x2ab414:$s4: logins.json
      • 0x2ab14a:$a1: username_value
      • 0x2ab168:$a2: password_value
      • 0x2ab454:$a3: encryptedUsername
      • 0x2fd3b0:$a3: encryptedUsername
      • 0x2ab478:$a4: encryptedPassword
      • 0x2fd3ce:$a4: encryptedPassword
      • 0x2fd34c:$a5: httpRealm
      Sample.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab900:$s3: Process already elevated.
      • 0x28ebd6:$s4: get_PotentiallyVulnerablePasswords
      • 0x278c92:$s5: GetKeyloggerLogsDirectory
      • 0x29e95f:$s5: GetKeyloggerLogsDirectory
      • 0x28ebf9:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea9a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      C:\Windows\System32\Runtime Broker\Runtime Broker.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Windows\System32\Runtime Broker\Runtime Broker.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Windows\System32\Runtime Broker\Runtime Broker.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
          • 0x28eed7:$x1: Quasar.Common.Messages
          • 0x29f200:$x1: Quasar.Common.Messages
          • 0x2ab816:$x4: Uninstalling... good bye :-(
          • 0x2ad00b:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
          C:\Windows\System32\Runtime Broker\Runtime Broker.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x2aadc8:$f1: FileZilla\recentservers.xml
          • 0x2aae08:$f2: FileZilla\sitemanager.xml
          • 0x2aae4a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0x2ab096:$b1: Chrome\User Data\
          • 0x2ab0ec:$b1: Chrome\User Data\
          • 0x2ab3c4:$b2: Mozilla\Firefox\Profiles
          • 0x2ab4c0:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2fd46c:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x2ab618:$b4: Opera Software\Opera Stable\Login Data
          • 0x2ab6d2:$b5: YandexBrowser\User Data\
          • 0x2ab740:$b5: YandexBrowser\User Data\
          • 0x2ab414:$s4: logins.json
          • 0x2ab14a:$a1: username_value
          • 0x2ab168:$a2: password_value
          • 0x2ab454:$a3: encryptedUsername
          • 0x2fd3b0:$a3: encryptedUsername
          • 0x2ab478:$a4: encryptedPassword
          • 0x2fd3ce:$a4: encryptedPassword
          • 0x2fd34c:$a5: httpRealm
          C:\Windows\System32\Runtime Broker\Runtime Broker.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
          • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
          • 0x2ab900:$s3: Process already elevated.
          • 0x28ebd6:$s4: get_PotentiallyVulnerablePasswords
          • 0x278c92:$s5: GetKeyloggerLogsDirectory
          • 0x29e95f:$s5: GetKeyloggerLogsDirectory
          • 0x28ebf9:$s6: set_PotentiallyVulnerablePasswords
          • 0x2fea9a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1658588464.0000000000A82000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Process Memory Space: Sample.exe PID: 6600JoeSecurity_QuasarYara detected Quasar RATJoe Security
              Process Memory Space: Runtime Broker.exe PID: 3616JoeSecurity_QuasarYara detected Quasar RATJoe Security
                SourceRuleDescriptionAuthorStrings
                0.0.Sample.exe.a80000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  0.0.Sample.exe.a80000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.0.Sample.exe.a80000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                    • 0x28eed7:$x1: Quasar.Common.Messages
                    • 0x29f200:$x1: Quasar.Common.Messages
                    • 0x2ab816:$x4: Uninstalling... good bye :-(
                    • 0x2ad00b:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                    0.0.Sample.exe.a80000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                    • 0x2aadc8:$f1: FileZilla\recentservers.xml
                    • 0x2aae08:$f2: FileZilla\sitemanager.xml
                    • 0x2aae4a:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                    • 0x2ab096:$b1: Chrome\User Data\
                    • 0x2ab0ec:$b1: Chrome\User Data\
                    • 0x2ab3c4:$b2: Mozilla\Firefox\Profiles
                    • 0x2ab4c0:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0x2fd46c:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0x2ab618:$b4: Opera Software\Opera Stable\Login Data
                    • 0x2ab6d2:$b5: YandexBrowser\User Data\
                    • 0x2ab740:$b5: YandexBrowser\User Data\
                    • 0x2ab414:$s4: logins.json
                    • 0x2ab14a:$a1: username_value
                    • 0x2ab168:$a2: password_value
                    • 0x2ab454:$a3: encryptedUsername
                    • 0x2fd3b0:$a3: encryptedUsername
                    • 0x2ab478:$a4: encryptedPassword
                    • 0x2fd3ce:$a4: encryptedPassword
                    • 0x2fd34c:$a5: httpRealm
                    0.0.Sample.exe.a80000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                    • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                    • 0x2ab900:$s3: Process already elevated.
                    • 0x28ebd6:$s4: get_PotentiallyVulnerablePasswords
                    • 0x278c92:$s5: GetKeyloggerLogsDirectory
                    • 0x29e95f:$s5: GetKeyloggerLogsDirectory
                    • 0x28ebf9:$s6: set_PotentiallyVulnerablePasswords
                    • 0x2fea9a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Sample.exeAvira: detected
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeAvira: detection malicious, Label: HEUR/AGEN.1307453
                    Source: Sample.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "91.160.181.237:4782;91.160.181.237:4783;", "SubDirectory": "Runtime Broker", "InstallName": "Runtime Broker.exe", "MutexName": "bcda0faa-47b1-4e7d-be7c-8ff6fbc69a61", "StartupKey": "Runtime Broker", "Tag": "database", "LogDirectoryName": "Logs", "ServerSignature": "AXyAB9i/QMJIU4gAdq1J+oniXOume3lU0T3mxu8IbdQdZszooY4hH9oIzunY7uWEeH5OlXOXfcuCfe0kKFfGEKM7XRr8jCBOkPTdS45c6qEpqV6p7Xgf5apTLyQ+nhcpX2Kj5wmcb7/d/IkQ0EYvseR15ZhRZ9DhW2WyhUtb9PBZLtFfMk/4PXSr84aAVdYq0WtitFSDymQ93Y2bBvw4ONybXHQnu7GCtw37EfycClx3qEYXr3UWQqzNpk8zvgRFsC0DH1Jlj7X8pkiz+ZB5zxx38ZPAHOjO5vwkOzJzPmmT2VCkaw/6LYXGPeIz2GG76GtNcjP/yvlzB+pg9kOyptgH97tiKY5rux6cvIpEYY881bj6rgSmp6fexC9Tlo+0eZQJkuo0m0KnckjFf8jCCNsfzOy3W/XhlvZrwRBxTqCESNU8Pgl4/VUNQb97J7g2+qHvQP5YICJuwDKWsupSooNlMUbj28SdfjWHV4FqN0trPxfkI/aLYsvObLVm+XIkGE+9IqB+R01Fobp2B4AzvGiFS2k/lESyFiCTWOEpRL0rgyIM1/he6JGyo+bhq72+IZAehI6IJigodhZeXHPXbzg6gCjVhUJw1g+B2PVRgy+GTHcRYD+b3oX7L26Hih+/pEK1590qFQa8k4VPLbZ8BYEVAP/086SQFh+6LCqAW+A=", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAOJVSuPyL8hJWIKlG45dAzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTIzMDcwMjEyNDQyMVoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAr0icLbTG7+EbVFBiDOtG0P/teScd/9W++vB3ud2IzAipEreS6eWe1tortnmxqOzd1naorhWrkJFOKd8ZvM97F7O2KjSUkAWPLy1ZtN8VVaBVyzeQGMcy052/AfS+9FPdgoWNjVhBO8BqUlRadFqtQ0YkSh3ljPOeCGoDcwFjbqpg4afzwhqeuubqFaAX1aglP+VXsZ0tqJgVR3A6tSoYNgl2l+qylC2tSYKtlCEVoCCAxiQWUrKIk03DkYW427jYo08qAVUaFdOvuI2vbtKn6qZVQ7teLgc1vUHyQYINFg2OipfBXvuwQ8ZAXq9kwN0UIy+WnI4cVUClWZMNPXZ+V3zkK98liNZZZDSbLc9OAGJqk6ZKNs1sczaMcMKQv/jo4ZgWyEYcJMvKT2yY6kG+rZ0xmahx8NjF+9r612Lhnh7/V67N95Sd9onoq6d9z8gokcu39xvtwTVFGzPUo2stLWEQDj0A01v/o4oFr99/v1a8yYgGsLMLC1LMJnftFqIY8jwUOMASGNP6REgR8JUt2NWI/keX7UKYT6W6B9r45w/JxrTHipkrHOMA0cRXF2G2c2yUo7kg8lugQodWcQHx3ppM99WgeM35CJbOPVow4j7lQhDM9Nt8Xbx+GmTzRxxL9nlAlTc/6s532MGcWRpG6GCtmdSkL1SRav0b6bJX2p8CAwEAAaMyMDAwHQYDVR0OBBYEFGkT/G3gZe2DglfmM3uVPBg+AI8xMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBADIYLKX0Ilznp0aMkI/pP0gWscsfOHfPtdar81lsIoszY0F621AczluG1osi00pboN9K9zb9+HmOSi9MsFHu7OaDhZBmw0ebTZVccX8K/lVhbb28nG0Jwk80pUGbq6AoZY8AssHfaPq4j8A5cArI5eg6DPvT8ijjuq1vTln4EjRuZclCKMuGw6Vx/1SinCvaTff9GPxYn2/egLvNxLrNbi/L1UYfltIBXvvIECtQ4X45pPTVE9UBpSS2OMYxzpESZD0HFqdm5IZZ7sL8pJAo2/l4HqijJk1JCsljC//IABz9KneIRO0pQKRmVXTF9L2qGLse5bYd6RvSOqgromnz9wtHljZy9oRKzwqbfYAH/M/M6tbzIztff/TYw8Cuj/7lPDOHLxzepH04wvjjaceZRaM0lyHmB42qIuSvrvWo1Cg4YP3RnIdv2NqqpUkaPpO3ZX3LGQ1JFmqjDZkgOzjLlfAPOCX7Okalt/KrAhl8FxKY6BvdQaFYL746DAeT89aCwBHwnxWokLE2t9NBOpVVNRpDJ9XnwBEx0qDyeqXe7KGpR3ZdveyviEz/qdXSgw++q7/WRFuzWYGwOXZrSpfBT+W29JDz9HWEYzdvhPmL984TRQ0R3TZzYZct6uiArNb6rT+A+KWFDzJc+PB2MW1ToFDeQ28BB3ugpS3OSh/vfuDs"}
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeReversingLabs: Detection: 73%
                    Source: Sample.exeVirustotal: Detection: 70%Perma Link
                    Source: Sample.exeReversingLabs: Detection: 73%
                    Source: Yara matchFile source: Sample.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1658588464.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sample.exe PID: 6600, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Runtime Broker.exe PID: 3616, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeJoe Sandbox ML: detected
                    Source: Sample.exeJoe Sandbox ML: detected
                    Source: Sample.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Sample.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 91.160.181.237
                    Source: global trafficTCP traffic: 91.160.181.237 ports 4782,4783,2,4,7,8
                    Source: Yara matchFile source: Sample.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPED
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 91.160.181.237:4782
                    Source: global trafficTCP traffic: 192.168.2.4:49751 -> 1.1.1.1:53
                    Source: Joe Sandbox ViewASN Name: PROXADFR PROXADFR
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: unknownTCP traffic detected without corresponding DNS query: 91.160.181.237
                    Source: Sample.exe, 00000000.00000002.1686333050.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Runtime Broker.exe, 00000003.00000002.2924470996.0000000003159000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Sample.exe, Runtime Broker.exe.0.drString found in binary or memory: https://api.ipify.org/
                    Source: Sample.exe, Runtime Broker.exe.0.drString found in binary or memory: https://ipwho.is/
                    Source: Sample.exe, Runtime Broker.exe.0.drString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: Sample.exe, Runtime Broker.exe.0.drString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: Sample.exe, Runtime Broker.exe.0.drString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeWindows user hook set: 0 keyboard low level C:\Windows\system32\Runtime Broker\Runtime Broker.exeJump to behavior

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: Sample.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1658588464.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sample.exe PID: 6600, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Runtime Broker.exe PID: 3616, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPED

                    System Summary

                    barindex
                    Source: Sample.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: Sample.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: Sample.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPEDMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: C:\Users\user\Desktop\Sample.exeFile created: C:\Windows\system32\Runtime BrokerJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeFile created: C:\Windows\system32\Runtime Broker\Runtime Broker.exeJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeCode function: 3_2_00007FFD9B9EAFDD3_2_00007FFD9B9EAFDD
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeCode function: 3_2_00007FFD9B9E9BD13_2_00007FFD9B9E9BD1
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeCode function: 3_2_00007FFD9B9E92713_2_00007FFD9B9E9271
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeCode function: 3_2_00007FFD9B9E55D63_2_00007FFD9B9E55D6
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeCode function: 3_2_00007FFD9B9E621F3_2_00007FFD9B9E621F
                    Source: Sample.exe, 00000000.00000000.1658906266.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCopyright (C) 2017-2021 0 vs Sample.exe
                    Source: Sample.exeBinary or memory string: OriginalFilenameCopyright (C) 2017-2021 0 vs Sample.exe
                    Source: Sample.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Sample.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: Sample.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: Sample.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/3@0/1
                    Source: C:\Users\user\Desktop\Sample.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Sample.exe.logJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6724:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3808:120:WilError_03
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeMutant created: NULL
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeMutant created: \Sessions\1\BaseNamedObjects\Local\bcda0faa-47b1-4e7d-be7c-8ff6fbc69a61
                    Source: Sample.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Sample.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\Sample.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Sample.exeVirustotal: Detection: 70%
                    Source: Sample.exeReversingLabs: Detection: 73%
                    Source: Sample.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                    Source: C:\Users\user\Desktop\Sample.exeFile read: C:\Users\user\Desktop\Sample.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Sample.exe "C:\Users\user\Desktop\Sample.exe"
                    Source: C:\Users\user\Desktop\Sample.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /f
                    Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Sample.exeProcess created: C:\Windows\System32\Runtime Broker\Runtime Broker.exe "C:\Windows\system32\Runtime Broker\Runtime Broker.exe"
                    Source: unknownProcess created: C:\Windows\System32\Runtime Broker\Runtime Broker.exe "C:\Windows\system32\Runtime Broker\Runtime Broker.exe"
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /f
                    Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Sample.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess created: C:\Windows\System32\Runtime Broker\Runtime Broker.exe "C:\Windows\system32\Runtime Broker\Runtime Broker.exe"Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: Sample.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Sample.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: Sample.exeStatic file information: File size 3266048 > 1048576
                    Source: Sample.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c600
                    Source: Sample.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\Sample.exeCode function: 0_2_00007FFD9B7600BD pushad ; iretd 0_2_00007FFD9B7600C1
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeCode function: 3_2_00007FFD9B7700BD pushad ; iretd 3_2_00007FFD9B7700C1
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeCode function: 3_2_00007FFD9B9E336E push eax; ret 3_2_00007FFD9B9E340C
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeCode function: 4_2_00007FFD9B7700BD pushad ; iretd 4_2_00007FFD9B7700C1

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\Desktop\Sample.exeExecutable created and started: C:\Windows\system32\Runtime Broker\Runtime Broker.exeJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeFile created: C:\Windows\System32\Runtime Broker\Runtime Broker.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Sample.exeFile created: C:\Windows\System32\Runtime Broker\Runtime Broker.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Sample.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /f

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\Sample.exeFile opened: C:\Users\user\Desktop\Sample.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeFile opened: C:\Windows\system32\Runtime Broker\Runtime Broker.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeFile opened: C:\Windows\system32\Runtime Broker\Runtime Broker.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeMemory allocated: 12D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeMemory allocated: 1B050000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeMemory allocated: 1B120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeMemory allocated: A30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeMemory allocated: 1A6B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeCode function: 3_2_00007FFD9B77F1F2 str ax3_2_00007FFD9B77F1F2
                    Source: C:\Users\user\Desktop\Sample.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeWindow / User API: threadDelayed 6759Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeWindow / User API: threadDelayed 3088Jump to behavior
                    Source: C:\Users\user\Desktop\Sample.exe TID: 6552Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe TID: 4520Thread sleep count: 35 > 30Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe TID: 4520Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe TID: 1060Thread sleep count: 6759 > 30Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe TID: 1060Thread sleep count: 3088 > 30Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe TID: 2676Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Sample.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Runtime Broker.exe, 00000003.00000002.2929954290.000000001BA32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Runtime Broker.exe, 00000003.00000002.2929954290.000000001BA32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Sample.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeProcess created: C:\Windows\System32\Runtime Broker\Runtime Broker.exe "C:\Windows\system32\Runtime Broker\Runtime Broker.exe"Jump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeProcess created: C:\Windows\System32\schtasks.exe "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeQueries volume information: C:\Users\user\Desktop\Sample.exe VolumeInformationJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeQueries volume information: C:\Windows\System32\Runtime Broker\Runtime Broker.exe VolumeInformationJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exeQueries volume information: C:\Windows\System32\Runtime Broker\Runtime Broker.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Sample.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: Sample.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1658588464.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sample.exe PID: 6600, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Runtime Broker.exe PID: 3616, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPED

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: Sample.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Sample.exe.a80000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1658588464.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Sample.exe PID: 6600, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Runtime Broker.exe PID: 3616, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, type: DROPPED
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    Scheduled Task/Job
                    11
                    Process Injection
                    121
                    Masquerading
                    11
                    Input Capture
                    11
                    Security Software Discovery
                    Remote Services11
                    Input Capture
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    LSASS Memory41
                    Virtualization/Sandbox Evasion
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    41
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Application Window Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS12
                    System Information Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Hidden Files and Directories
                    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Obfuscated Files or Information
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Sample.exe71%VirustotalBrowse
                    Sample.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                    Sample.exe100%AviraHEUR/AGEN.1307453
                    Sample.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Windows\System32\Runtime Broker\Runtime Broker.exe100%AviraHEUR/AGEN.1307453
                    C:\Windows\System32\Runtime Broker\Runtime Broker.exe100%Joe Sandbox ML
                    C:\Windows\System32\Runtime Broker\Runtime Broker.exe74%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    91.160.181.2370%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    91.160.181.237true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/Sample.exe, Runtime Broker.exe.0.drfalse
                      high
                      https://stackoverflow.com/q/14436606/23354Sample.exe, Runtime Broker.exe.0.drfalse
                        high
                        https://stackoverflow.com/q/2152978/23354sCannotSample.exe, Runtime Broker.exe.0.drfalse
                          high
                          https://ipwho.is/Sample.exe, Runtime Broker.exe.0.drfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSample.exe, 00000000.00000002.1686333050.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Runtime Broker.exe, 00000003.00000002.2924470996.0000000003159000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/11564914/23354;Sample.exe, Runtime Broker.exe.0.drfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                91.160.181.237
                                unknownFrance
                                12322PROXADFRtrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1584696
                                Start date and time:2025-01-06 08:21:30 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 23s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:11
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:Sample.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@10/3@0/1
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 27
                                • Number of non-executed functions: 1
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.253.45
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target Runtime Broker.exe, PID 2816 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                TimeTypeDescription
                                02:22:24API Interceptor3803453x Sleep call for process: Runtime Broker.exe modified
                                07:22:22Task SchedulerRun new task: Runtime Broker path: C:\Windows\system32\Runtime s>Broker\Runtime Broker.exe
                                No context
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                PROXADFRcZO.exeGet hashmaliciousUnknownBrowse
                                • 82.65.181.52
                                Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                                • 78.240.160.233
                                Fantazy.x86.elfGet hashmaliciousUnknownBrowse
                                • 78.224.99.170
                                momo.mips.elfGet hashmaliciousMiraiBrowse
                                • 88.180.232.176
                                momo.arm.elfGet hashmaliciousMiraiBrowse
                                • 78.234.76.85
                                momo.arm7.elfGet hashmaliciousMiraiBrowse
                                • 88.165.176.186
                                armv4l.elfGet hashmaliciousUnknownBrowse
                                • 91.174.92.37
                                1.elfGet hashmaliciousUnknownBrowse
                                • 78.225.31.198
                                armv6l.elfGet hashmaliciousUnknownBrowse
                                • 78.201.21.165
                                No context
                                No context
                                Process:C:\Windows\System32\Runtime Broker\Runtime Broker.exe
                                File Type:CSV text
                                Category:dropped
                                Size (bytes):1281
                                Entropy (8bit):5.370111951859942
                                Encrypted:false
                                SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                MD5:12C61586CD59AA6F2A21DF30501F71BD
                                SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                Process:C:\Users\user\Desktop\Sample.exe
                                File Type:CSV text
                                Category:dropped
                                Size (bytes):1281
                                Entropy (8bit):5.370111951859942
                                Encrypted:false
                                SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                MD5:12C61586CD59AA6F2A21DF30501F71BD
                                SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                Malicious:true
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                Process:C:\Users\user\Desktop\Sample.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3266048
                                Entropy (8bit):6.084421049485132
                                Encrypted:false
                                SSDEEP:49152:Pv/lL26AaNeWgPhlmVqvMQ7XSK4tMK1J3SoGdOTHHB72eh2NT:PvNL26AaNeWgPhlmVqkQ7XSK4tMz
                                MD5:196E2AE082841B1AB98DCFA445CF2704
                                SHA1:4AF7F4BB970331AE1EB569100DE98C93B61C5459
                                SHA-256:C3E669B477D3E633BF336FC5D2506C86C8FC61B4D0BE36FE2BBE3B361CF70A70
                                SHA-512:B64CF310FC65954C4873889CE68BCE0539435539D6FF017D8C0238EE829EC9FD5220398558F58E17E9154210856F245D94BD6BCF7780EDF0AAE6BED71958232E
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: Joe Security
                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: Joe Security
                                • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: Florian Roth
                                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: ditekSHen
                                • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: ditekshen
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 74%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@...................................1.W.....2...................... 2...................................................... ............... ..H............text...4.1.. ....1................. ..`.rsrc.........2.......1.............@..@.reloc....... 2.......1.............@..B..................1.....H........................k..p............................................0..M....... ....(.....(...........s....(....(...........s....o....(.....(....s....(....*....0..8.......(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........--..........00.......0..@........o....,7(....(0....s....%.o....%.o....%.o....(....&..&...(.....*........-5..........08......f~w...,.~....(....(....*.*v.(.....s....}.....s....}....*r..(......(.....(......(....*....0..L........{....r...po....
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):6.084421049485132
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:Sample.exe
                                File size:3'266'048 bytes
                                MD5:196e2ae082841b1ab98dcfa445cf2704
                                SHA1:4af7f4bb970331ae1eb569100de98c93b61c5459
                                SHA256:c3e669b477d3e633bf336fc5d2506c86c8fc61b4d0be36fe2bbe3b361cf70a70
                                SHA512:b64cf310fc65954c4873889ce68bce0539435539d6ff017d8c0238ee829ec9fd5220398558f58e17e9154210856f245d94bd6bcf7780edf0aae6bed71958232e
                                SSDEEP:49152:Pv/lL26AaNeWgPhlmVqvMQ7XSK4tMK1J3SoGdOTHHB72eh2NT:PvNL26AaNeWgPhlmVqkQ7XSK4tMz
                                TLSH:56E55A1437F85E23E1BBE273D5B0041667F1EC2AB3A3FB5B6181677A1C53B505801AAB
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                                Icon Hash:90cececece8e8eb0
                                Entrypoint:0x71e42e
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3d40x57.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xaec.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x31c4340x31c600a329949c1442b8351b0ee0324f979454unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x3200000xaec0xc004e1303286f1c711139751157853de5daFalse0.3766276041666667data5.205668892059367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x3220000xc0x20099e75cdb3927a57ba5de39a6c2349231False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_VERSION0x3200a00x374data0.4287330316742081
                                RT_MANIFEST0x3204140x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 6, 2025 08:22:24.638360977 CET497304782192.168.2.491.160.181.237
                                Jan 6, 2025 08:22:24.643318892 CET47824973091.160.181.237192.168.2.4
                                Jan 6, 2025 08:22:24.647136927 CET497304782192.168.2.491.160.181.237
                                Jan 6, 2025 08:22:24.656491041 CET497304782192.168.2.491.160.181.237
                                Jan 6, 2025 08:22:24.661339998 CET47824973091.160.181.237192.168.2.4
                                Jan 6, 2025 08:22:40.672255993 CET4975153192.168.2.41.1.1.1
                                Jan 6, 2025 08:22:40.677107096 CET53497511.1.1.1192.168.2.4
                                Jan 6, 2025 08:22:40.678870916 CET4975153192.168.2.41.1.1.1
                                Jan 6, 2025 08:22:40.683732033 CET53497511.1.1.1192.168.2.4
                                Jan 6, 2025 08:22:41.232369900 CET4975153192.168.2.41.1.1.1
                                Jan 6, 2025 08:22:41.237356901 CET53497511.1.1.1192.168.2.4
                                Jan 6, 2025 08:22:41.237472057 CET4975153192.168.2.41.1.1.1
                                Jan 6, 2025 08:22:46.039855003 CET47824973091.160.181.237192.168.2.4
                                Jan 6, 2025 08:22:46.039927006 CET497304782192.168.2.491.160.181.237
                                Jan 6, 2025 08:22:46.054337978 CET497304782192.168.2.491.160.181.237
                                Jan 6, 2025 08:22:46.059365034 CET47824973091.160.181.237192.168.2.4
                                Jan 6, 2025 08:22:49.678505898 CET497524783192.168.2.491.160.181.237
                                Jan 6, 2025 08:22:49.683424950 CET47834975291.160.181.237192.168.2.4
                                Jan 6, 2025 08:22:49.683546066 CET497524783192.168.2.491.160.181.237
                                Jan 6, 2025 08:22:49.684645891 CET497524783192.168.2.491.160.181.237
                                Jan 6, 2025 08:22:49.689425945 CET47834975291.160.181.237192.168.2.4
                                Jan 6, 2025 08:23:11.083223104 CET47834975291.160.181.237192.168.2.4
                                Jan 6, 2025 08:23:11.083281994 CET497524783192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:11.083616018 CET497524783192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:11.088380098 CET47834975291.160.181.237192.168.2.4
                                Jan 6, 2025 08:23:14.537856102 CET497534782192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:14.542829990 CET47824975391.160.181.237192.168.2.4
                                Jan 6, 2025 08:23:14.542952061 CET497534782192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:14.543329954 CET497534782192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:14.548129082 CET47824975391.160.181.237192.168.2.4
                                Jan 6, 2025 08:23:35.909601927 CET47824975391.160.181.237192.168.2.4
                                Jan 6, 2025 08:23:35.909662962 CET497534782192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:35.910037994 CET497534782192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:35.914843082 CET47824975391.160.181.237192.168.2.4
                                Jan 6, 2025 08:23:39.272758007 CET498784783192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:39.277620077 CET47834987891.160.181.237192.168.2.4
                                Jan 6, 2025 08:23:39.277693033 CET498784783192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:39.278048992 CET498784783192.168.2.491.160.181.237
                                Jan 6, 2025 08:23:39.282793999 CET47834987891.160.181.237192.168.2.4
                                Jan 6, 2025 08:24:00.644642115 CET47834987891.160.181.237192.168.2.4
                                Jan 6, 2025 08:24:00.651284933 CET498784783192.168.2.491.160.181.237
                                Jan 6, 2025 08:24:00.659506083 CET498784783192.168.2.491.160.181.237
                                Jan 6, 2025 08:24:00.664331913 CET47834987891.160.181.237192.168.2.4
                                Jan 6, 2025 08:24:04.383343935 CET500234782192.168.2.491.160.181.237
                                Jan 6, 2025 08:24:04.388247013 CET47825002391.160.181.237192.168.2.4
                                Jan 6, 2025 08:24:04.388323069 CET500234782192.168.2.491.160.181.237
                                Jan 6, 2025 08:24:04.391289949 CET500234782192.168.2.491.160.181.237
                                Jan 6, 2025 08:24:04.396049023 CET47825002391.160.181.237192.168.2.4
                                Jan 6, 2025 08:24:25.802331924 CET47825002391.160.181.237192.168.2.4
                                Jan 6, 2025 08:24:25.802457094 CET500234782192.168.2.491.160.181.237
                                Jan 6, 2025 08:24:25.802764893 CET500234782192.168.2.491.160.181.237
                                Jan 6, 2025 08:24:25.807554960 CET47825002391.160.181.237192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 6, 2025 08:22:40.671669006 CET53594411.1.1.1192.168.2.4

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:02:22:20
                                Start date:06/01/2025
                                Path:C:\Users\user\Desktop\Sample.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\Sample.exe"
                                Imagebase:0xa80000
                                File size:3'266'048 bytes
                                MD5 hash:196E2AE082841B1AB98DCFA445CF2704
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1658588464.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:02:22:21
                                Start date:06/01/2025
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:02:22:21
                                Start date:06/01/2025
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:02:22:22
                                Start date:06/01/2025
                                Path:C:\Windows\System32\Runtime Broker\Runtime Broker.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\system32\Runtime Broker\Runtime Broker.exe"
                                Imagebase:0xb60000
                                File size:3'266'048 bytes
                                MD5 hash:196E2AE082841B1AB98DCFA445CF2704
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: Joe Security
                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: Joe Security
                                • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: Florian Roth
                                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: ditekSHen
                                • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: C:\Windows\System32\Runtime Broker\Runtime Broker.exe, Author: ditekshen
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 74%, ReversingLabs
                                Reputation:low
                                Has exited:false

                                Target ID:4
                                Start time:02:22:22
                                Start date:06/01/2025
                                Path:C:\Windows\System32\Runtime Broker\Runtime Broker.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\system32\Runtime Broker\Runtime Broker.exe"
                                Imagebase:0xe0000
                                File size:3'266'048 bytes
                                MD5 hash:196E2AE082841B1AB98DCFA445CF2704
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:5
                                Start time:02:22:23
                                Start date:06/01/2025
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtime Broker\Runtime Broker.exe" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:02:22:23
                                Start date:06/01/2025
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:18.9%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:6
                                  Total number of Limit Nodes:0
                                  execution_graph 1761 7ffd9b763569 1762 7ffd9b763571 DeleteFileW 1761->1762 1764 7ffd9b763616 1762->1764 1765 7ffd9b763525 1766 7ffd9b763531 DeleteFileW 1765->1766 1768 7ffd9b763616 1766->1768

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1689572742.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b760000_Sample.jbxd
                                  Similarity
                                  • API ID: DeleteFile
                                  • String ID:
                                  • API String ID: 4033686569-0
                                  • Opcode ID: 3f6f9bd78f9fd24f1daa3284477b2e743d7790476b4af7c1fa950fe35a075ad5
                                  • Instruction ID: 2a7f2c0340a711bbb42292638a393177c7907ad14023b5a3f184a0fb35627000
                                  • Opcode Fuzzy Hash: 3f6f9bd78f9fd24f1daa3284477b2e743d7790476b4af7c1fa950fe35a075ad5
                                  • Instruction Fuzzy Hash: DB31053190DB5C8FDB1ADB688855AE9BFF0EF56311F0542AFD049D71A2CB246805C791

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 11 7ffd9b763569-7ffd9b7635d8 16 7ffd9b7635e2-7ffd9b763614 DeleteFileW 11->16 17 7ffd9b7635da-7ffd9b7635df 11->17 18 7ffd9b76361c-7ffd9b76364a 16->18 19 7ffd9b763616 16->19 17->16 19->18
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1689572742.00007FFD9B760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B760000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ffd9b760000_Sample.jbxd
                                  Similarity
                                  • API ID: DeleteFile
                                  • String ID:
                                  • API String ID: 4033686569-0
                                  • Opcode ID: 4a8b8c94f086977879cdd3474ff1e75271943733efd8d93069a142ff53493ada
                                  • Instruction ID: 962261b025cca217792da3e8a6972bc5335c04c52e44e017d2e01fce52c6a387
                                  • Opcode Fuzzy Hash: 4a8b8c94f086977879cdd3474ff1e75271943733efd8d93069a142ff53493ada
                                  • Instruction Fuzzy Hash: 4A31D23190DB5C8FDB19DB588859AE9BBF0FF65311F04426FD049D32A2DB74A805CB91

                                  Execution Graph

                                  Execution Coverage:11.9%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:8
                                  Total number of Limit Nodes:1
                                  execution_graph 12103 7ffd9b9ee6f9 12104 7ffd9b9ee70f 12103->12104 12105 7ffd9b9ee7bb 12104->12105 12106 7ffd9b9ee8b4 SetWindowsHookExW 12104->12106 12107 7ffd9b9ee8f6 12106->12107 12099 7ffd9b773569 12100 7ffd9b773571 DeleteFileW 12099->12100 12102 7ffd9b773616 12100->12102
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2933149040.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b9e0000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 987325f82d2683bb214a47c918827fb95a786185c08f5e3638345606d184e13e
                                  • Instruction ID: ab4b500cdd066e4a9cf396cda66956ab66a956b81c4e31dadabc1e9d2a89f5d2
                                  • Opcode Fuzzy Hash: 987325f82d2683bb214a47c918827fb95a786185c08f5e3638345606d184e13e
                                  • Instruction Fuzzy Hash: 54F2B270A19A0D8FDFA8DF68C494BA977E1FF58304F1141A9D44ED72A6DE34EA41CB40

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 771 7ffd9b9e9bd1-7ffd9b9e9c19 773 7ffd9b9e9c1b-7ffd9b9e9c29 771->773 774 7ffd9b9e9c2a-7ffd9b9e9c3c 771->774 776 7ffd9b9e9c42-7ffd9b9e9c52 774->776 777 7ffd9b9e9cbf-7ffd9b9e9cc3 774->777 783 7ffd9b9e9f3b-7ffd9b9e9f8a 776->783 784 7ffd9b9e9c58-7ffd9b9e9ca7 776->784 778 7ffd9b9e9cdb-7ffd9b9e9cdf 777->778 779 7ffd9b9e9cc5-7ffd9b9e9cc9 777->779 781 7ffd9b9e9ce1-7ffd9b9e9d08 778->781 782 7ffd9b9e9d0e-7ffd9b9e9d12 778->782 785 7ffd9b9e9cd0-7ffd9b9e9cd4 779->785 781->782 792 7ffd9b9e9f91-7ffd9b9e9fa9 781->792 786 7ffd9b9e9f2c-7ffd9b9e9f3a 782->786 787 7ffd9b9e9d18-7ffd9b9e9d1d 782->787 783->792 820 7ffd9b9e9ca9-7ffd9b9e9cb2 784->820 821 7ffd9b9e9cb4-7ffd9b9e9cb8 784->821 785->778 787->786 790 7ffd9b9e9d23-7ffd9b9e9d2d 787->790 798 7ffd9b9e9d7b-7ffd9b9e9d80 790->798 799 7ffd9b9e9d2f-7ffd9b9e9d41 790->799 809 7ffd9b9e9fab-7ffd9b9e9fb1 792->809 810 7ffd9b9e9fb5 792->810 801 7ffd9b9e9f08-7ffd9b9e9f0d 798->801 802 7ffd9b9e9d86-7ffd9b9e9d90 798->802 799->798 806 7ffd9b9e9d43-7ffd9b9e9d6e 799->806 801->786 805 7ffd9b9e9f0f-7ffd9b9e9f24 801->805 802->801 814 7ffd9b9e9d96-7ffd9b9e9da8 802->814 805->786 816 7ffd9b9e9f26-7ffd9b9e9f29 805->816 806->798 828 7ffd9b9e9d70-7ffd9b9e9d74 806->828 812 7ffd9b9e9fb9-7ffd9b9ea018 809->812 815 7ffd9b9e9fb3 809->815 810->812 813 7ffd9b9e9fb7 810->813 834 7ffd9b9ea5be-7ffd9b9ea5d0 812->834 835 7ffd9b9ea01e-7ffd9b9ea030 812->835 813->812 825 7ffd9b9e9e9e-7ffd9b9e9ea9 814->825 826 7ffd9b9e9dae-7ffd9b9e9df3 814->826 815->810 816->786 820->777 821->777 830 7ffd9b9e9eab-7ffd9b9e9f01 825->830 831 7ffd9b9e9e30-7ffd9b9e9e57 825->831 826->825 847 7ffd9b9e9df9-7ffd9b9e9e10 826->847 828->798 830->801 831->825 846 7ffd9b9e9e59-7ffd9b9e9e6d 831->846 835->834 841 7ffd9b9ea036-7ffd9b9ea06f 835->841 841->834 854 7ffd9b9ea075-7ffd9b9ea0b6 841->854 858 7ffd9b9ea0bc-7ffd9b9ea0d4 854->858 859 7ffd9b9ea168-7ffd9b9ea17b 854->859 864 7ffd9b9ea15c-7ffd9b9ea162 858->864 865 7ffd9b9ea0da-7ffd9b9ea0fa 858->865 862 7ffd9b9ea1d0 859->862 863 7ffd9b9ea17d-7ffd9b9ea19e 859->863 866 7ffd9b9ea1d2-7ffd9b9ea1d7 862->866 871 7ffd9b9ea1c9-7ffd9b9ea1ce 863->871 872 7ffd9b9ea1a0-7ffd9b9ea1c7 863->872 864->858 864->859 865->864 879 7ffd9b9ea0fc-7ffd9b9ea10e 865->879 868 7ffd9b9ea1d9-7ffd9b9ea1e0 866->868 869 7ffd9b9ea21e-7ffd9b9ea241 866->869 874 7ffd9b9ea1e7-7ffd9b9ea201 868->874 876 7ffd9b9ea337-7ffd9b9ea343 869->876 877 7ffd9b9ea247-7ffd9b9ea26f 869->877 871->866 872->866 874->869 884 7ffd9b9ea203-7ffd9b9ea21c 874->884 876->834 880 7ffd9b9ea349-7ffd9b9ea35e 876->880 890 7ffd9b9ea32b-7ffd9b9ea331 877->890 891 7ffd9b9ea275-7ffd9b9ea290 877->891 879->864 885 7ffd9b9ea110-7ffd9b9ea114 879->885 880->834 884->869 887 7ffd9b9ea11a-7ffd9b9ea12f 885->887 888 7ffd9b9ea5d1-7ffd9b9ea673 885->888 896 7ffd9b9ea136-7ffd9b9ea138 887->896 901 7ffd9b9ea679-7ffd9b9ea67b 888->901 902 7ffd9b9ea785-7ffd9b9ea791 888->902 890->876 890->877 891->890 903 7ffd9b9ea296-7ffd9b9ea2a8 891->903 896->864 897 7ffd9b9ea13a-7ffd9b9ea158 call 7ffd9b9e53c0 896->897 897->864 906 7ffd9b9ea695-7ffd9b9ea6a3 901->906 907 7ffd9b9ea67d-7ffd9b9ea68f 901->907 909 7ffd9b9ea7b9 902->909 910 7ffd9b9ea793-7ffd9b9ea7b8 902->910 903->890 914 7ffd9b9ea2ae-7ffd9b9ea2b2 903->914 911 7ffd9b9ea6a9-7ffd9b9ea6c0 906->911 912 7ffd9b9ea7f8-7ffd9b9ea82b 906->912 907->906 919 7ffd9b9ea7bf-7ffd9b9ea7f1 907->919 909->919 910->909 929 7ffd9b9ea6da-7ffd9b9ea6dd 911->929 930 7ffd9b9ea6c2-7ffd9b9ea6d4 911->930 931 7ffd9b9ea832-7ffd9b9ea83e 912->931 914->888 920 7ffd9b9ea2b8-7ffd9b9ea2fb 914->920 919->912 920->890 946 7ffd9b9ea2fd-7ffd9b9ea328 call 7ffd9b9e53c0 920->946 932 7ffd9b9ea706-7ffd9b9ea722 call 7ffd9b9e7a50 929->932 933 7ffd9b9ea6df-7ffd9b9ea6f6 929->933 930->929 930->931 939 7ffd9b9ea866-7ffd9b9ea871 931->939 940 7ffd9b9ea840-7ffd9b9ea864 931->940 950 7ffd9b9ea753-7ffd9b9ea757 932->950 951 7ffd9b9ea724-7ffd9b9ea752 932->951 933->932 949 7ffd9b9ea6f8-7ffd9b9ea6fc 933->949 953 7ffd9b9ea873-7ffd9b9ea879 939->953 954 7ffd9b9ea87d 939->954 940->939 946->890 960 7ffd9b9ea703-7ffd9b9ea704 949->960 962 7ffd9b9ea75e-7ffd9b9ea784 950->962 955 7ffd9b9ea881-7ffd9b9ea8bc 953->955 958 7ffd9b9ea87b 953->958 954->955 956 7ffd9b9ea87f 954->956 964 7ffd9b9ea8ff-7ffd9b9ea932 955->964 965 7ffd9b9ea8be-7ffd9b9ea8e5 955->965 956->955 958->954 960->932 974 7ffd9b9ea939-7ffd9b9ea981 964->974 965->974 977 7ffd9b9ea8e7-7ffd9b9ea8fe 965->977 983 7ffd9b9ea985-7ffd9b9ea9a7 974->983 984 7ffd9b9ea983 974->984 987 7ffd9b9eaa8a-7ffd9b9eaa96 983->987 988 7ffd9b9ea9ad-7ffd9b9ea9bf 983->988 984->983 985 7ffd9b9ea9c5-7ffd9b9ea9ca 984->985 991 7ffd9b9eaa98-7ffd9b9eaabd 987->991 992 7ffd9b9eaabe-7ffd9b9eaad3 987->992 993 7ffd9b9ea9cb-7ffd9b9ea9e3 call 7ffd9b9e40b0 988->993 994 7ffd9b9ea9c1-7ffd9b9ea9c4 988->994 991->992 1000 7ffd9b9eab15-7ffd9b9eab17 992->1000 1001 7ffd9b9eaad5-7ffd9b9eaaf2 992->1001 1004 7ffd9b9eaa47-7ffd9b9eaa50 993->1004 1005 7ffd9b9ea9e5-7ffd9b9eaa16 993->1005 994->985 1002 7ffd9b9eab19-7ffd9b9eab1b 1000->1002 1001->1002 1003 7ffd9b9eaaf4-7ffd9b9eab0f 1001->1003 1007 7ffd9b9eab2c-7ffd9b9eab3c 1002->1007 1008 7ffd9b9eab1d-7ffd9b9eab2b 1002->1008 1003->1002 1006 7ffd9b9eab11-7ffd9b9eab12 1003->1006 1012 7ffd9b9eaa18-7ffd9b9eaa3f 1005->1012 1013 7ffd9b9eaa41-7ffd9b9eaa45 1005->1013 1006->1000 1012->1013 1015 7ffd9b9eaa51-7ffd9b9eaa89 1012->1015 1013->1004 1013->1005
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2933149040.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b9e0000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a261c251868ff93f15cd671c3493aafc5901cf1c843db8c3c1952ff158d00d4
                                  • Instruction ID: bb6eada74dfd3954a460088bde9854044ef5c1cc11bbe89cfff6f16ce3a4b292
                                  • Opcode Fuzzy Hash: 5a261c251868ff93f15cd671c3493aafc5901cf1c843db8c3c1952ff158d00d4
                                  • Instruction Fuzzy Hash: 4C923931B1D94D5FEBA8EB6C8469B7837D1EF99310F0501BAE44EC72B6DE24AD028341

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1032 7ffd9b9eafdd-7ffd9b9eb079 1034 7ffd9b9eb6f1-7ffd9b9eb706 1032->1034 1035 7ffd9b9eb07f-7ffd9b9eb082 1032->1035 1035->1034 1036 7ffd9b9eb088-7ffd9b9eb0a5 1035->1036 1036->1034 1038 7ffd9b9eb0ab-7ffd9b9eb0ca 1036->1038 1040 7ffd9b9eb0cc-7ffd9b9eb0cf 1038->1040 1041 7ffd9b9eb0d6-7ffd9b9eb0e9 1038->1041 1042 7ffd9b9eb0d1 1040->1042 1043 7ffd9b9eb0ee-7ffd9b9eb11e 1040->1043 1044 7ffd9b9eb179-7ffd9b9eb18b 1041->1044 1042->1034 1043->1034 1049 7ffd9b9eb124-7ffd9b9eb172 1043->1049 1044->1034 1048 7ffd9b9eb191-7ffd9b9eb1d0 1044->1048 1048->1034 1054 7ffd9b9eb1d6-7ffd9b9eb1e0 1048->1054 1049->1044 1057 7ffd9b9eb1f8-7ffd9b9eb208 1054->1057 1058 7ffd9b9eb1e2-7ffd9b9eb1f6 1054->1058 1061 7ffd9b9eb212-7ffd9b9eb267 1057->1061 1058->1061 1065 7ffd9b9eb26d-7ffd9b9eb275 1061->1065 1066 7ffd9b9eb2db-7ffd9b9eb2e3 1065->1066 1067 7ffd9b9eb277-7ffd9b9eb28b 1065->1067 1066->1034 1068 7ffd9b9eb2e9-7ffd9b9eb30b 1066->1068 1067->1066 1071 7ffd9b9eb28d-7ffd9b9eb2d7 1067->1071 1072 7ffd9b9eb311-7ffd9b9eb33a 1068->1072 1073 7ffd9b9eb40f-7ffd9b9eb41a 1068->1073 1071->1066 1079 7ffd9b9eb3c1-7ffd9b9eb3e2 1072->1079 1080 7ffd9b9eb340-7ffd9b9eb366 1072->1080 1077 7ffd9b9eb48c-7ffd9b9eb4b5 1073->1077 1078 7ffd9b9eb41c-7ffd9b9eb445 1073->1078 1094 7ffd9b9eb4b7-7ffd9b9eb4d1 1077->1094 1095 7ffd9b9eb4d8-7ffd9b9eb4e5 1077->1095 1078->1034 1089 7ffd9b9eb44b-7ffd9b9eb45d 1078->1089 1079->1072 1082 7ffd9b9eb3e8 1079->1082 1080->1079 1093 7ffd9b9eb368-7ffd9b9eb37e 1080->1093 1082->1073 1089->1034 1097 7ffd9b9eb463-7ffd9b9eb481 1089->1097 1093->1079 1101 7ffd9b9eb380-7ffd9b9eb398 1093->1101 1094->1095 1103 7ffd9b9eb4eb-7ffd9b9eb518 1095->1103 1104 7ffd9b9eb5aa-7ffd9b9eb5ca 1095->1104 1097->1034 1112 7ffd9b9eb487-7ffd9b9eb488 1097->1112 1101->1079 1106 7ffd9b9eb39a-7ffd9b9eb3bf 1101->1106 1120 7ffd9b9eb53b-7ffd9b9eb547 1103->1120 1121 7ffd9b9eb51a-7ffd9b9eb534 1103->1121 1110 7ffd9b9eb5cc-7ffd9b9eb5cd 1104->1110 1111 7ffd9b9eb5d4-7ffd9b9eb610 1104->1111 1106->1079 1115 7ffd9b9eb3ea-7ffd9b9eb408 1106->1115 1110->1111 1111->1034 1127 7ffd9b9eb616-7ffd9b9eb633 1111->1127 1112->1077 1115->1073 1125 7ffd9b9eb549-7ffd9b9eb555 1120->1125 1126 7ffd9b9eb598-7ffd9b9eb5a4 1120->1126 1121->1120 1128 7ffd9b9eb55b-7ffd9b9eb591 1125->1128 1129 7ffd9b9eb840-7ffd9b9eb857 1125->1129 1126->1034 1126->1104 1134 7ffd9b9eb635-7ffd9b9eb636 1127->1134 1135 7ffd9b9eb63d-7ffd9b9eb678 1127->1135 1128->1126 1136 7ffd9b9eb859-7ffd9b9eb860 1129->1136 1137 7ffd9b9eb861-7ffd9b9eb8cf call 7ffd9b9e5070 call 7ffd9b9e7d70 call 7ffd9b9e5370 call 7ffd9b9eb8d0 1129->1137 1134->1135 1135->1034 1149 7ffd9b9eb67a-7ffd9b9eb68c 1135->1149 1136->1137 1149->1034 1153 7ffd9b9eb68e-7ffd9b9eb6ac 1149->1153 1153->1034 1156 7ffd9b9eb6ae-7ffd9b9eb6ca 1153->1156 1159 7ffd9b9eb6cc-7ffd9b9eb6ef 1156->1159 1160 7ffd9b9eb707-7ffd9b9eb77c 1156->1160 1159->1034 1159->1160 1170 7ffd9b9eb827-7ffd9b9eb83f 1160->1170 1171 7ffd9b9eb782-7ffd9b9eb78b 1160->1171 1171->1170
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2933149040.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b9e0000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d74e64ae2cc60c52c13e975c55ccdb71dcc46eaada7c2fa26d6df41f0bbf0b7c
                                  • Instruction ID: 8fe2fb2339d46313d2752280f6aac427aa2bead5ec7293acd243d03915928fca
                                  • Opcode Fuzzy Hash: d74e64ae2cc60c52c13e975c55ccdb71dcc46eaada7c2fa26d6df41f0bbf0b7c
                                  • Instruction Fuzzy Hash: 5B525030B18A498FDBA8EF2CC4A4B6977E1FF99304F1545B9E04EC72A6DE35E8418741

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1173 7ffd9b9e9271-7ffd9b9e9295 1174 7ffd9b9e9297-7ffd9b9e92bc 1173->1174 1175 7ffd9b9e92df-7ffd9b9e92e2 1173->1175 1176 7ffd9b9e92d0-7ffd9b9e92de 1174->1176 1177 7ffd9b9e92be-7ffd9b9e92ce 1174->1177 1176->1175 1177->1176 1179 7ffd9b9e92e3-7ffd9b9e9314 1177->1179 1182 7ffd9b9e9316-7ffd9b9e9335 call 7ffd9b9e3950 1179->1182 1183 7ffd9b9e9363-7ffd9b9e9388 call 7ffd9b9e7e00 1179->1183 1182->1183 1188 7ffd9b9e9337-7ffd9b9e9357 call 7ffd9b9e3830 1182->1188 1189 7ffd9b9e95f2-7ffd9b9e9605 call 7ffd9b9e8d80 1183->1189 1190 7ffd9b9e938e-7ffd9b9e939c call 7ffd9b9e4e50 1183->1190 1188->1183 1197 7ffd9b9e9359-7ffd9b9e9360 1188->1197 1200 7ffd9b9e9607-7ffd9b9e9628 1189->1200 1201 7ffd9b9e9632-7ffd9b9e9634 1189->1201 1198 7ffd9b9e93b6-7ffd9b9e93b9 1190->1198 1199 7ffd9b9e939e-7ffd9b9e93b2 1190->1199 1197->1183 1204 7ffd9b9e9583-7ffd9b9e958e 1198->1204 1205 7ffd9b9e93bf-7ffd9b9e93c2 1198->1205 1199->1198 1200->1201 1215 7ffd9b9e962a-7ffd9b9e962f 1200->1215 1202 7ffd9b9e9636-7ffd9b9e963a 1201->1202 1203 7ffd9b9e9643-7ffd9b9e96c6 1201->1203 1202->1203 1207 7ffd9b9e963c-7ffd9b9e963e 1202->1207 1220 7ffd9b9e96ce-7ffd9b9e96cf 1203->1220 1211 7ffd9b9e95c5-7ffd9b9e95d0 1204->1211 1210 7ffd9b9e93c8 1205->1210 1205->1211 1212 7ffd9b9e96d5-7ffd9b9e96d8 1207->1212 1210->1189 1211->1189 1216 7ffd9b9e9ac7-7ffd9b9e9ada 1212->1216 1217 7ffd9b9e96de-7ffd9b9e9751 call 7ffd9b9e8060 1212->1217 1215->1201 1227 7ffd9b9e9776 1217->1227 1228 7ffd9b9e9753-7ffd9b9e9774 1217->1228 1220->1212 1229 7ffd9b9e9778-7ffd9b9e978b 1227->1229 1228->1227 1228->1229 1232 7ffd9b9e97bb-7ffd9b9e97f4 1229->1232 1233 7ffd9b9e978d-7ffd9b9e97b6 1229->1233 1238 7ffd9b9e97f6-7ffd9b9e97f7 1232->1238 1239 7ffd9b9e97fe-7ffd9b9e982a 1232->1239 1240 7ffd9b9e9870-7ffd9b9e9877 1233->1240 1238->1239 1239->1240 1248 7ffd9b9e982c-7ffd9b9e9860 1239->1248 1241 7ffd9b9e9879-7ffd9b9e9885 1240->1241 1242 7ffd9b9e9893-7ffd9b9e98f4 1240->1242 1241->1242 1244 7ffd9b9e9887-7ffd9b9e988c 1241->1244 1251 7ffd9b9e9915-7ffd9b9e9937 1242->1251 1252 7ffd9b9e98f6-7ffd9b9e990b 1242->1252 1244->1242 1248->1240 1256 7ffd9b9e9862-7ffd9b9e9869 1248->1256 1257 7ffd9b9e9939-7ffd9b9e9945 1251->1257 1258 7ffd9b9e9953-7ffd9b9e9954 1251->1258 1252->1251 1256->1240 1260 7ffd9b9e994d-7ffd9b9e9951 1257->1260 1259 7ffd9b9e9956-7ffd9b9e9971 1258->1259 1259->1216 1262 7ffd9b9e9977-7ffd9b9e998d call 7ffd9b9e8d80 1259->1262 1260->1259 1262->1216 1265 7ffd9b9e9993-7ffd9b9e99b4 1262->1265 1267 7ffd9b9e99b6-7ffd9b9e99e4 1265->1267 1268 7ffd9b9e9a01-7ffd9b9e9a22 1265->1268 1267->1268 1272 7ffd9b9e99e6-7ffd9b9e99fc 1267->1272 1273 7ffd9b9e9a64-7ffd9b9e9a85 1268->1273 1274 7ffd9b9e9a24-7ffd9b9e9a56 1268->1274 1272->1216 1273->1216 1280 7ffd9b9e9a87-7ffd9b9e9ab9 1273->1280 1274->1273 1279 7ffd9b9e9a58-7ffd9b9e9a61 1274->1279 1279->1273 1280->1216 1284 7ffd9b9e9abb-7ffd9b9e9ac4 1280->1284 1284->1216
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2933149040.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b9e0000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 958ef265a16dc3b926b291051a825c9edb53c3f53c358a6bbb70c00374cec96a
                                  • Instruction ID: 91908e4a938359840fc15a951a140768e1b5f3a7f8dbc2fb9a9346d53cea33a4
                                  • Opcode Fuzzy Hash: 958ef265a16dc3b926b291051a825c9edb53c3f53c358a6bbb70c00374cec96a
                                  • Instruction Fuzzy Hash: 35227230B19A0D5FEB68EB5C84A97B977E2FF98300F15417DD44EC32A6DE34AA428741
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2933149040.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b9e0000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12dfa441546b408a3beea0ef6afa2b8483f2b669843123f7fc2ce7850a1242af
                                  • Instruction ID: 1058182eaf64a272a55923a6d5a7cb40ba191a2602fd6dceb91927f7a485183e
                                  • Opcode Fuzzy Hash: 12dfa441546b408a3beea0ef6afa2b8483f2b669843123f7fc2ce7850a1242af
                                  • Instruction Fuzzy Hash: 7B023C30E28A1D8FEBA8DF58C49476977E1FF98301F1541B9D44ED32A6DA34BA81CB40

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2933149040.00007FFD9B9E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B9E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b9e0000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cf2cbf482465d378ce32e5461ef7deb13fb27d0264cf1dd58ba9b212af7e93a8
                                  • Instruction ID: 07a7efbdca827bd9d306dc2342dd95b8b4cbf9202be97668492eb810f87abe70
                                  • Opcode Fuzzy Hash: cf2cbf482465d378ce32e5461ef7deb13fb27d0264cf1dd58ba9b212af7e93a8
                                  • Instruction Fuzzy Hash: 00714731A2DE4D4FDB58EB6C98655B977E1EF58310B0442BBE04EC32A7DE24A94287C1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 594 7ffd9b773525-7ffd9b77352f 595 7ffd9b773571-7ffd9b7735d8 594->595 596 7ffd9b773531-7ffd9b773562 594->596 602 7ffd9b7735e2-7ffd9b773614 DeleteFileW 595->602 603 7ffd9b7735da-7ffd9b7735df 595->603 596->595 604 7ffd9b77361c-7ffd9b77364a 602->604 605 7ffd9b773616 602->605 603->602 605->604
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2931308223.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID: DeleteFile
                                  • String ID:
                                  • API String ID: 4033686569-0
                                  • Opcode ID: 51955e1d0ce3be647fced7196de5672d2fb8a31963807ce985130c27c303b9f9
                                  • Instruction ID: b803aeec6fd82c83b42943360f875056a85d923ba65a0fd59f878740581bddc8
                                  • Opcode Fuzzy Hash: 51955e1d0ce3be647fced7196de5672d2fb8a31963807ce985130c27c303b9f9
                                  • Instruction Fuzzy Hash: 9E414431A0DB4C8FCB19DF6888996E97BF0FF56310F0542AFD049C71A2CA64A906C791

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 661 7ffd9b773569-7ffd9b7735d8 666 7ffd9b7735e2-7ffd9b773614 DeleteFileW 661->666 667 7ffd9b7735da-7ffd9b7735df 661->667 668 7ffd9b77361c-7ffd9b77364a 666->668 669 7ffd9b773616 666->669 667->666 669->668
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2931308223.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID: DeleteFile
                                  • String ID:
                                  • API String ID: 4033686569-0
                                  • Opcode ID: bd0a00df7b58dadcc5a35d66d8850a82156c50b21c9139f2f5d7d583e0e35f55
                                  • Instruction ID: 99aa4fdf22d60e79e06ea2bfa5e5e0831ea722e96da557ab6ef9d887c11094a8
                                  • Opcode Fuzzy Hash: bd0a00df7b58dadcc5a35d66d8850a82156c50b21c9139f2f5d7d583e0e35f55
                                  • Instruction Fuzzy Hash: C731C13190CB5C8FDB19DB588859AE9BBF0FF65311F04426BD049D32A2DB74A906CB91
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2931308223.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: afecb03f595489ac8c11ac2c29886081fb784167a893c786c46c35ceb37ce25d
                                  • Instruction ID: f752c7b0eaacd635d0c267c467e19e757e3ff60a32e718bfc71e799a2bf7117d
                                  • Opcode Fuzzy Hash: afecb03f595489ac8c11ac2c29886081fb784167a893c786c46c35ceb37ce25d
                                  • Instruction Fuzzy Hash: 61316F1FA4E1A61EE315B3BCB5B28FD3B51CF6223970842F3F19D4D0E79D09208A4A94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: H
                                  • API String ID: 0-2852464175
                                  • Opcode ID: f248d4f5f156661b60d77c1e4f846f93deba70e69573b7b5fd8888fecb70c39e
                                  • Instruction ID: e0a27318116ece0f2c43546adfdfe21bf2ad0e7f5f7b9db68acaf7eceddeeab0
                                  • Opcode Fuzzy Hash: f248d4f5f156661b60d77c1e4f846f93deba70e69573b7b5fd8888fecb70c39e
                                  • Instruction Fuzzy Hash: 10718871F1990D4FDBA8EBA884A57BCB3D2EF99310F454179D45ED32E6CE68AC028740
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ;N_I
                                  • API String ID: 0-1313454297
                                  • Opcode ID: 49ed9f19fd4892e6ba4f5dabc46c4bacdd2d8d1579e4b6d353ff0970fba27a01
                                  • Instruction ID: c1be42add7b5796d2763fd4b4b29dba7daf2155d248b29f1aecf70d6094cbd7b
                                  • Opcode Fuzzy Hash: 49ed9f19fd4892e6ba4f5dabc46c4bacdd2d8d1579e4b6d353ff0970fba27a01
                                  • Instruction Fuzzy Hash: FD815C3270FB854FE7259BBC54B46A93FA1EF41300B5401FAE488873EBE9687941C741
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .N_^
                                  • API String ID: 0-2858261171
                                  • Opcode ID: d3319b9f2747acd99580145792a08e03aae0093ef7ec89b805d3ed144ba2dd7a
                                  • Instruction ID: 8e467d0115f43e3a5eb38e6cb31278c31c443e56b81d3caa2290e02baf0af8dd
                                  • Opcode Fuzzy Hash: d3319b9f2747acd99580145792a08e03aae0093ef7ec89b805d3ed144ba2dd7a
                                  • Instruction Fuzzy Hash: 0A21051670DAA90FD715A76CA8B56F43BD1DF5622070D02F7D099CB1A3CD0859098391
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ab3a07c71b158245cab55c149b5c2074b59eff46f703dfb02b811d5aafae601
                                  • Instruction ID: dc421a6aaaf9ec7a24efc5c0e3a42abb0169f44890d20e2960398fd91600638a
                                  • Opcode Fuzzy Hash: 3ab3a07c71b158245cab55c149b5c2074b59eff46f703dfb02b811d5aafae601
                                  • Instruction Fuzzy Hash: B9A11B31B1AA8E0FEBA5EB6884A56B977D2FF95300F0502B9D45DC71F7CD68AD028740
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2d23bb0dfacdb66ab782051d25a87274c7ded7e4eea5f6469f7c88e529246478
                                  • Instruction ID: d120ad74c956284a1ef345d9e9d5e41a8c940ca4f8a8ef2d0ddebe45282a05d3
                                  • Opcode Fuzzy Hash: 2d23bb0dfacdb66ab782051d25a87274c7ded7e4eea5f6469f7c88e529246478
                                  • Instruction Fuzzy Hash: 94513820B1EE5A0FEB95E7B844B16AE3BD2DF8624074442F9E00DC72EBDD5C9D428340
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e97c3b093ad7ec8d687928d6d667f26cb8eae1b27527df55dd21af18db703eef
                                  • Instruction ID: fa6d42cc164940a4e1e507de15adc7e1dc354ee6e51289762d4c30cea9a9ddb5
                                  • Opcode Fuzzy Hash: e97c3b093ad7ec8d687928d6d667f26cb8eae1b27527df55dd21af18db703eef
                                  • Instruction Fuzzy Hash: E7410C31B0E64D0FEBA5EBA844B1AF977E1EF96300F0601BAD45DC71E7CE68A9018741
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 47a826ae71c4a8930dbcd90a8cbf900867f3ee138164f42f3e7650a57fada266
                                  • Instruction ID: 940f9425173e278303723f11d946870b130816cf1d66b792d39e4ddeb24c2318
                                  • Opcode Fuzzy Hash: 47a826ae71c4a8930dbcd90a8cbf900867f3ee138164f42f3e7650a57fada266
                                  • Instruction Fuzzy Hash: 16415D21B1EB490FE758ABAC94667BD77D1EF95314F0002BEE05EC32D6CD6869028782
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5046c334d7076a854bf22dbf0943d5ad7beb7f27be346d8e19db265cf75b2004
                                  • Instruction ID: a7a0912d785436f004ef0e0d4df7e0acd61f1d7ab9e9dc0d0db3042a3925a4ce
                                  • Opcode Fuzzy Hash: 5046c334d7076a854bf22dbf0943d5ad7beb7f27be346d8e19db265cf75b2004
                                  • Instruction Fuzzy Hash: 06215A3060E6864FDB54DF68C0D55A577A1EF91310B1A43FAC048CF5BBD928ED86C380
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 40b3a882fe896f00e6fb40dc461a83de6727e61575f5e481c28093209cd50df8
                                  • Instruction ID: d867cb8c04744f7e6944f875ec757fff6b02c74e64f2625e84373c5fd8d783c5
                                  • Opcode Fuzzy Hash: 40b3a882fe896f00e6fb40dc461a83de6727e61575f5e481c28093209cd50df8
                                  • Instruction Fuzzy Hash: 3131A83476A9554FE308DB6C80B16AE3F61AF89304F9442E9F819433CEEE3C6540CB51
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dfd42362d554cbc9c03b9b1166eee172a7989ac1a7fa80c77f5853a2dfcf966a
                                  • Instruction ID: 1d2186af1e94312329faaa577e175a2892907978420ea817c0dcd91b4dfdddbc
                                  • Opcode Fuzzy Hash: dfd42362d554cbc9c03b9b1166eee172a7989ac1a7fa80c77f5853a2dfcf966a
                                  • Instruction Fuzzy Hash: 19215752A1EBCA4FFB55A7680875669ABA1FF52340F4506FAD089CB1E7EC0868048391
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 55d5cd00cf9e68a4a4d0a80752f948cf5c9abebac6388e67ac0e2456c4ed1cb4
                                  • Instruction ID: e5dee88c0968df98369a5067a02f7b1c2e5bd002d8d240b72d253db2ac94b036
                                  • Opcode Fuzzy Hash: 55d5cd00cf9e68a4a4d0a80752f948cf5c9abebac6388e67ac0e2456c4ed1cb4
                                  • Instruction Fuzzy Hash: 2F21F431F1AA5D4FD794EB6884A99B973D1EF58301B4505BAE00DC72E6DE24D901C740
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 941147a9158d2416630b13e6af41680a69c0409815f57a43ce1f54c90e5e28dd
                                  • Instruction ID: 099475f7aad453a8c4ed0dd82c50f85e6eefdb8350929488a7da9c57b0f2b232
                                  • Opcode Fuzzy Hash: 941147a9158d2416630b13e6af41680a69c0409815f57a43ce1f54c90e5e28dd
                                  • Instruction Fuzzy Hash: DD11DC22B1EB880FE355E6786CA98F17BD0DF9022430A03BBE44CC31B3CD0896878351
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d76dbbbcdc91895d9ba7acfc1f21c661c49ac62df3ef582b2f0931f9527155c4
                                  • Instruction ID: 66f54c084d5f41862abd510349ed6efa4decabdd287057370782b92a0ca0c205
                                  • Opcode Fuzzy Hash: d76dbbbcdc91895d9ba7acfc1f21c661c49ac62df3ef582b2f0931f9527155c4
                                  • Instruction Fuzzy Hash: DD113852B2EECA0FDF66927848B45F53B92DF95310B0902FBE449C31E7DD5869468381
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8268f5db7031bfbac9a8e6a61017a472c783a2e355de13eb5f03313035d6f0a4
                                  • Instruction ID: 18fd0442cd924939b6ebf21cf2246d5af6d2624fe66570f3e256d8a103bbf21a
                                  • Opcode Fuzzy Hash: 8268f5db7031bfbac9a8e6a61017a472c783a2e355de13eb5f03313035d6f0a4
                                  • Instruction Fuzzy Hash: C911A020A0EBCD4FE357A37858A9AA43FD1EF87215B0A01E7E098CB0B7C9984945C342
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 83adbb006465599d0a75cbc28fde084f40e2bad0518862471ce4cd31abd54b90
                                  • Instruction ID: a10ba54d781d25082cd5412dfe1bc3d62b638a8b8a41931ba2af7830fdd2e758
                                  • Opcode Fuzzy Hash: 83adbb006465599d0a75cbc28fde084f40e2bad0518862471ce4cd31abd54b90
                                  • Instruction Fuzzy Hash: 5CF0F022B19C1D0FE794F2AD54E9AF967C5DBA822631401B3E00CC72BBDC1498428381
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 77c259b904772428ebb0806584e6110b615724de8f332564e58108b56a5bf15e
                                  • Instruction ID: 2d3530ab6fe06d07a9dc021d0149174f54e3758e2503810028611f63d9f30aaa
                                  • Opcode Fuzzy Hash: 77c259b904772428ebb0806584e6110b615724de8f332564e58108b56a5bf15e
                                  • Instruction Fuzzy Hash: 73E02221F19C0D0FABA4F6AD44D9F7922C1EBAC21171405B2E40CC32BACC689C418381
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1715005481.00007FFD9B770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_7ffd9b770000_Runtime Broker.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f69f4cf8aea6bdbc50f99b108c3ddefaca2eb61f653c88e2c7a879772e4bc4b3
                                  • Instruction ID: d074c9fb9528ec618007ac3d9e73d21cd0b7d12437d2de1dab907c18091b2537
                                  • Opcode Fuzzy Hash: f69f4cf8aea6bdbc50f99b108c3ddefaca2eb61f653c88e2c7a879772e4bc4b3
                                  • Instruction Fuzzy Hash: 56E02012F1A91D17EB94337814760FC2181DF58650741013AD40DC71D7DC1D3D420240