Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
123.exe

Overview

General Information

Sample name:123.exe
Analysis ID:1586684
MD5:29fd97e2ce44268ccac3ebc2bd8ed78c
SHA1:98d3df4d3678f2efd998f62a09ec60166f8b209b
SHA256:3d6315fa786c82b89db895d8ef45f65eba125b61206d46fe3abbaa7719b85e55
Tags:Backdoorexemalwaremetasploituser-Joker
Infos:

Detection

Metasploit
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 123.exe (PID: 7364 cmdline: "C:\Users\user\Desktop\123.exe" MD5: 29FD97E2CE44268CCAC3EBC2BD8ED78C)
  • cleanup
{"Type": "Metasploit Connect", "IP": "47.90.142.15", "Port": 4567}
SourceRuleDescriptionAuthorStrings
123.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    123.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      123.exeWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0x73a2:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1697088418.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000000.1697088418.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
        • 0x63a2:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
        00000000.00000002.1838188937.0000000000580000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000000.00000002.1838188937.0000000000580000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
          • 0xd8:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
          00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.2.123.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
              0.2.123.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                0.2.123.exe.400000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
                • 0x73a2:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
                0.0.123.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
                  0.0.123.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 123.exeAvira: detected
                    Source: 123.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "47.90.142.15", "Port": 4567}
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                    Source: 123.exeJoe Sandbox ML: detected
                    Source: 123.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: 123.exe
                    Source: C:\Users\user\Desktop\123.exeCode function: 4x nop then push ebp0_2_0040317B
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 47.90.142.15:4567
                    Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.90.142.15
                    Source: C:\Users\user\Desktop\123.exeCode function: 0_2_00580095 WSASocketA,connect,recv,closesocket,0_2_00580095
                    Source: 123.exeString found in binary or memory: http://www.apache.org/
                    Source: 123.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: 123.exeString found in binary or memory: http://www.zeustech.net/

                    System Summary

                    barindex
                    Source: 123.exe, type: SAMPLEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.2.123.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.0.123.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000000.1697088418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.1838188937.0000000000580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 123.exe, 00000000.00000002.1838124548.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs 123.exe
                    Source: 123.exeBinary or memory string: OriginalFilenameab.exeF vs 123.exe
                    Source: 123.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: 123.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.2.123.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.0.123.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000000.1697088418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.1838188937.0000000000580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 123.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal88.troj.winEXE@1/0@0/1
                    Source: 123.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\123.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\Desktop\123.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\123.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\123.exeSection loaded: mswsock.dllJump to behavior
                    Source: 123.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: 123.exe
                    Source: C:\Users\user\Desktop\123.exeCode function: 0_2_00406076 push ebx; ret 0_2_0040607E
                    Source: C:\Users\user\Desktop\123.exeCode function: 0_2_00404CEC push esi; ret 0_2_00404CF0
                    Source: C:\Users\user\Desktop\123.exeCode function: 0_2_00405298 push esi; ret 0_2_004052A6
                    Source: C:\Users\user\Desktop\123.exeCode function: 0_2_00402D52 push ebp; retf 0_2_00402D53
                    Source: C:\Users\user\Desktop\123.exeCode function: 0_2_0040216C push edx; ret 0_2_00402173
                    Source: C:\Users\user\Desktop\123.exeCode function: 0_2_00402F79 push 0040D542h; ret 0_2_00402F7F
                    Source: 123.exeStatic PE information: section name: .text entropy: 7.018080580865138
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: 123.exe, 00000000.00000002.1838281442.00000000007FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\123.exeCode function: 0_2_004043A4 _iob,GetSystemTimeAsFileTime,_iob,0_2_004043A4

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 123.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.2.123.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.123.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1697088418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1838188937.0000000000580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    2
                    Software Packing
                    OS Credential Dumping1
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Non-Standard Port
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    LSASS Memory1
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    Security Account Manager2
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    123.exe100%AviraTR/Patched.Gen2
                    123.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0123.exefalse
                      high
                      http://www.apache.org/123.exefalse
                        high
                        http://www.zeustech.net/123.exefalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          47.90.142.15
                          unknownUnited States
                          45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                          Joe Sandbox version:42.0.0 Malachite
                          Analysis ID:1586684
                          Start date and time:2025-01-09 14:14:09 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 2m 35s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:4
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:123.exe
                          Detection:MAL
                          Classification:mal88.troj.winEXE@1/0@0/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 86%
                          • Number of executed functions: 3
                          • Number of non-executed functions: 2
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                          • Excluded IPs from analysis (whitelisted): 4.175.87.197, 20.109.210.53, 13.107.246.45
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • VT rate limit hit for: 123.exe
                          No simulations
                          No context
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCarm7.elfGet hashmaliciousMiraiBrowse
                          • 8.222.72.249
                          ppc.elfGet hashmaliciousMiraiBrowse
                          • 8.219.224.17
                          spc.elfGet hashmaliciousMiraiBrowse
                          • 8.220.214.139
                          3.elfGet hashmaliciousUnknownBrowse
                          • 147.139.100.19
                          2362476847-83854387.07.exeGet hashmaliciousNitolBrowse
                          • 8.210.66.183
                          2o63254452-763487230.06.exeGet hashmaliciousNitolBrowse
                          • 47.243.243.58
                          phish_alert_sp2_2.0.0.0 (1).emlGet hashmaliciousUnknownBrowse
                          • 47.246.131.51
                          e2664726330-76546233.05.exeGet hashmaliciousNitolBrowse
                          • 8.217.59.73
                          ntpd.elfGet hashmaliciousUnknownBrowse
                          • 8.210.201.184
                          miori.spc.elfGet hashmaliciousUnknownBrowse
                          • 47.251.104.78
                          No context
                          No context
                          No created / dropped files found
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.320776121400298
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:123.exe
                          File size:73'802 bytes
                          MD5:29fd97e2ce44268ccac3ebc2bd8ed78c
                          SHA1:98d3df4d3678f2efd998f62a09ec60166f8b209b
                          SHA256:3d6315fa786c82b89db895d8ef45f65eba125b61206d46fe3abbaa7719b85e55
                          SHA512:6928cb2c1c0a472b009e6310aedaca572027f96c42d39733b9be9b7adfee6ad39e7c1e0ecc664d865cec1618b383f79baeae20be386ba76d30e3f992b76a92e2
                          SSDEEP:1536:ITfrMsjvjon5DWEOioEbMb+KR0Nc8QsJq39:afrZ85KEOTae0Nc8QsC9
                          TLSH:E073BF42EDC01431D1E2133E26B63776A971F5FA2605C29A7A8CCEE5DBD18B076363C6
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L....a8J...........
                          Icon Hash:90cececece8e8eb0
                          Entrypoint:0x409549
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:
                          Time Stamp:0x4A3861A3 [Wed Jun 17 03:23:15 2009 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:481f47bbb2c9c21e108d65f52b04c448
                          Instruction
                          cwde
                          das
                          stc
                          aaa
                          lahf
                          daa
                          cdq
                          inc ecx
                          dec edx
                          lahf
                          clc
                          dec edx
                          dec ebx
                          dec eax
                          das
                          inc ebx
                          inc edx
                          daa
                          nop
                          dec ecx
                          aaa
                          inc eax
                          cld
                          clc
                          lahf
                          stc
                          inc ecx
                          dec eax
                          dec eax
                          cdq
                          inc ecx
                          inc edx
                          inc ecx
                          cmc
                          inc eax
                          cld
                          cld
                          cld
                          das
                          stc
                          nop
                          daa
                          cdq
                          xchg eax, ebx
                          wait
                          cld
                          dec ecx
                          aaa
                          inc edx
                          std
                          aas
                          cdq
                          cdq
                          cdq
                          cwde
                          nop
                          nop
                          das
                          cdq
                          dec ebx
                          aaa
                          aaa
                          inc edx
                          clc
                          inc ecx
                          aas
                          xchg eax, ebx
                          dec ecx
                          dec edx
                          salc
                          aas
                          salc
                          std
                          inc ebx
                          cwde
                          xchg eax, ebx
                          cwde
                          xchg eax, ecx
                          clc
                          std
                          dec ecx
                          nop
                          dec ecx
                          wait
                          stc
                          cwde
                          cld
                          nop
                          aaa
                          dec ecx
                          xchg eax, edx
                          inc eax
                          wait
                          daa
                          inc ecx
                          cld
                          wait
                          stc
                          wait
                          clc
                          stc
                          das
                          dec eax
                          std
                          lahf
                          dec edx
                          das
                          std
                          nop
                          cwde
                          dec ebx
                          stc
                          lahf
                          cmc
                          inc edx
                          dec ebx
                          cmc
                          lahf
                          dec ebx
                          aaa
                          inc ebx
                          inc eax
                          stc
                          aas
                          dec ecx
                          cdq
                          aas
                          stc
                          salc
                          std
                          wait
                          aas
                          inc eax
                          daa
                          clc
                          das
                          dec ecx
                          dec eax
                          nop
                          cdq
                          dec edx
                          cmc
                          cwde
                          cdq
                          cdq
                          clc
                          nop
                          dec ecx
                          stc
                          inc edx
                          cdq
                          dec ebx
                          inc eax
                          inc ebx
                          xchg eax, edx
                          inc ecx
                          dec edx
                          daa
                          clc
                          std
                          xchg eax, edx
                          dec ecx
                          cwde
                          stc
                          dec ebx
                          xchg eax, ebx
                          inc eax
                          xchg eax, ecx
                          dec edx
                          salc
                          lahf
                          inc edx
                          inc ebx
                          std
                          dec eax
                          aaa
                          dec ebx
                          stc
                          std
                          inc edx
                          cld
                          salc
                          daa
                          nop
                          nop
                          das
                          inc ecx
                          cdq
                          dec ebx
                          inc ecx
                          wait
                          dec ecx
                          aas
                          cdq
                          xchg eax, ebx
                          dec eax
                          nop
                          das
                          cwde
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000xa9660xb000a0bedb5e20d760bfad2de21d0d9c513cFalse0.8174272017045454data7.018080580865138IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
                          DLLImport
                          MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                          KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                          ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                          WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                          WS2_32.dllWSARecv, WSASend
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 9, 2025 14:15:03.244247913 CET497304567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:03.249314070 CET45674973047.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:03.249406099 CET497304567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:04.649593115 CET45674973047.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:04.649673939 CET497304567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:04.650127888 CET497304567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:04.650875092 CET497314567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:04.655050993 CET45674973047.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:04.655872107 CET45674973147.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:04.655973911 CET497314567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:06.056557894 CET45674973147.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:06.056698084 CET497314567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:06.057143927 CET497314567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:06.058145046 CET497324567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:06.061992884 CET45674973147.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:06.063196898 CET45674973247.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:06.063311100 CET497324567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:07.458589077 CET45674973247.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:07.458659887 CET497324567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:07.459115982 CET497324567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:07.460030079 CET497334567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:07.464739084 CET45674973247.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:07.465361118 CET45674973347.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:07.465434074 CET497334567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:08.850204945 CET45674973347.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:08.850558996 CET497334567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:08.850795031 CET497334567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:08.851736069 CET497344567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:08.855863094 CET45674973347.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:08.856760979 CET45674973447.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:08.856868029 CET497344567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:10.284117937 CET45674973447.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:10.284327984 CET497344567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:10.284651995 CET497344567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:10.285443068 CET497354567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:10.289511919 CET45674973447.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:10.290448904 CET45674973547.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:10.290538073 CET497354567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:11.677795887 CET45674973547.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:11.678066969 CET497354567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:11.678390980 CET497354567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:11.679287910 CET497364567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:11.683288097 CET45674973547.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:11.684180021 CET45674973647.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:11.684273958 CET497364567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:13.086818933 CET45674973647.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:13.086889029 CET497364567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:13.091640949 CET497364567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:13.095860958 CET497374567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:13.096421003 CET45674973647.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:13.100729942 CET45674973747.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:13.100807905 CET497374567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:14.489824057 CET45674973747.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:14.489913940 CET497374567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:14.490336895 CET497374567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:14.491205931 CET497384567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:14.495141983 CET45674973747.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:14.496047974 CET45674973847.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:14.496114016 CET497384567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:15.903064013 CET45674973847.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:15.903223038 CET497384567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:15.903949976 CET497384567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:15.905342102 CET497394567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:15.909018993 CET45674973847.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:15.910198927 CET45674973947.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:15.910329103 CET497394567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:17.304220915 CET45674973947.90.142.15192.168.2.4
                          Jan 9, 2025 14:15:17.304291010 CET497394567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:17.304886103 CET497394567192.168.2.447.90.142.15
                          Jan 9, 2025 14:15:17.309608936 CET45674973947.90.142.15192.168.2.4

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:08:15:01
                          Start date:09/01/2025
                          Path:C:\Users\user\Desktop\123.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\123.exe"
                          Imagebase:0x400000
                          File size:73'802 bytes
                          MD5 hash:29FD97E2CE44268CCAC3EBC2BD8ED78C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.1697088418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000000.1697088418.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                          • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1838188937.0000000000580000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.1838188937.0000000000580000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                          Reputation:low
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:1.8%
                            Dynamic/Decrypted Code Coverage:28.1%
                            Signature Coverage:25%
                            Total number of Nodes:32
                            Total number of Limit Nodes:4
                            execution_graph 923 407170 924 407183 VirtualAlloc 923->924 926 4071bf 924->926 927 406921 select 928 405db1 __p__environ 929 405dcb 928->929 910 408e53 #21 911 409065 WSAGetLastError 910->911 912 408e7d 910->912 913 408ff7 911->913 894 407177 895 407104 894->895 896 40717b VirtualAlloc 894->896 898 4071bf 896->898 899 580000 902 580095 899->902 903 5800aa 902->903 904 5800bc WSASocketA 903->904 905 5800d8 connect 904->905 906 5800f1 recv 905->906 908 5800e7 905->908 907 580139 closesocket 906->907 906->908 907->904 907->908 908->905 908->906 908->907 909 580006 908->909 916 40b63a 917 40b5db 916->917 918 40b652 916->918 919 40b6b1 __setusermatherr 918->919 920 40b6bd 918->920 919->920 921 40b704 __p___initenv 920->921 921->920 922 40b712 921->922 922->922 915 40122d atoi 914 405e1e free

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 580095-5800ba 3 5800bc-5800d7 WSASocketA 0->3 4 5800d8-5800e5 connect 3->4 5 5800f1-580101 recv 4->5 6 5800e7-5800ea 4->6 8 580139-580146 closesocket 5->8 9 580103-580117 5->9 6->4 7 5800ec call 580158 6->7 7->5 8->3 10 58014c 8->10 13 580118-580127 9->13 10->7 15 580129-580132 13->15 16 580151-580155 13->16 15->8 16->13 17 580157 16->17
                            APIs
                            • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,D7110002,0F8E5A2F,0000000A,?,?,5F327377,00003233), ref: 005800D5
                            • connect.WS2_32(6174A599,?,?,00000010,?,?,5F327377,00003233), ref: 005800E1
                            • recv.WS2_32(5FC8D902,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 005800FC
                            • closesocket.WS2_32(614D6E75,?,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 0058013F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1838188937.0000000000580000.00000040.00001000.00020000.00000000.sdmp, Offset: 00580000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_580000_123.jbxd
                            Yara matches
                            Similarity
                            • API ID: Socketclosesocketconnectrecv
                            • String ID:
                            • API String ID: 2083937939-0
                            • Opcode ID: ebbf11e68accb987665bedca96f9ea2eef18cedb17714efbf073221ae0e9da29
                            • Instruction ID: ce65153fd78353c4bec281bae0ed17fa41a8aeace11b0018f68d8f001d8ae87f
                            • Opcode Fuzzy Hash: ebbf11e68accb987665bedca96f9ea2eef18cedb17714efbf073221ae0e9da29
                            • Instruction Fuzzy Hash: E411ADB07812587EF57032A29C4BFBB2D1CEF42BA4F500424BF45FA0C1C9829C4882FA

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 18 407177-407179 19 407104 18->19 20 40717b-4071ae VirtualAlloc 18->20 22 4071bf-4071e8 call 4072c5 20->22 27 4071ed-407230 22->27 28 4071e8 call 407273 22->28 33 407236-40723a 27->33 34 407258-4072c0 27->34 28->27 33->34 35 407240-407257 33->35 34->27 35->34
                            APIs
                            • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 004071A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1838058999.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838090618.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838105910.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838124548.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_123.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: bbe54f4ed8a20c600ad75c04fe77680d607c93ac925b51e2ba08807e894f0480
                            • Instruction ID: 5b231865590b577aca64c6a58d33b022d1fbc9bb76de5855a0ed113413e47a4d
                            • Opcode Fuzzy Hash: bbe54f4ed8a20c600ad75c04fe77680d607c93ac925b51e2ba08807e894f0480
                            • Instruction Fuzzy Hash: EDF0F928F9E2449AC524B5354C81BB56615975B380F2435BF75057E3C7C8797803115F

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 44 407170-4071e8 VirtualAlloc call 4072c5 52 4071ed-407230 44->52 53 4071e8 call 407273 44->53 58 407236-40723a 52->58 59 407258-4072c0 52->59 53->52 58->59 60 407240-407257 58->60 59->52 60->59
                            APIs
                            • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 004071A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1838058999.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838090618.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838105910.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838124548.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_123.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: c94fd77ef40290532eb7d861cbb86d1646b0e9411ad931b8f465837d36ddf9a4
                            • Instruction ID: a26b178cd4858426eba1dda4830d4ea24c51ac4d8efeb47256560bd74cd9418e
                            • Opcode Fuzzy Hash: c94fd77ef40290532eb7d861cbb86d1646b0e9411ad931b8f465837d36ddf9a4
                            • Instruction Fuzzy Hash: FAF05428FDF244D6C52461650C85BF6514A579B751E2035BB790A7E3C7C8BCB803215F

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 89 4043a4-4043fd 91 40443f-404452 89->91 92 4043ff-404410 89->92 92->91
                            Strings
                            • 'application/x-www-form-urlencoded', xrefs: 004043BD
                            • -C attribute Add cookie, eg. 'Apache=1234. (repeatable), xrefs: 00404445
                            • -w Print out results in HTML tables, xrefs: 004043EF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1838058999.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838090618.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838105910.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838124548.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_123.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 'application/x-www-form-urlencoded'$ -C attribute Add cookie, eg. 'Apache=1234. (repeatable)$ -w Print out results in HTML tables
                            • API String ID: 0-3129442784
                            • Opcode ID: 1a4e525a60c471288877c48bc56cef322ca26e8aee77600da94489166d97fbf2
                            • Instruction ID: 8617cb6a553737b242ce1959ec9ba86a48a66a3e74b7f2eb9a9ea670186a4625
                            • Opcode Fuzzy Hash: 1a4e525a60c471288877c48bc56cef322ca26e8aee77600da94489166d97fbf2
                            • Instruction Fuzzy Hash: 4B017672A292C1CFD304A3B4DCD5B24BBA0EB02300B6182EBC293832C2C77CC546CB15
                            Memory Dump Source
                            • Source File: 00000000.00000002.1838074048.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1838058999.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838090618.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838105910.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1838124548.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_123.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2ee4113159bf91ec45ed4cc59ea63054c976cc8e75deeb05fd6a8a3c5e1fa1ba
                            • Instruction ID: d31d71394359bd72904e27ded841780d0ce4ae2cf1015a8ea91c16141a9ae1f3
                            • Opcode Fuzzy Hash: 2ee4113159bf91ec45ed4cc59ea63054c976cc8e75deeb05fd6a8a3c5e1fa1ba
                            • Instruction Fuzzy Hash: 72014932A085414BE728AD1CB8C04A5FF69FA4633A31417BFD814EF2C3C636E586829C