Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Holiday#3021.exe

Overview

General Information

Sample name:Holiday#3021.exe
Analysis ID:1587359
MD5:d94c4aad05654b76b8b2624808355886
SHA1:f3c7911d8834836c22d78da8ae22e790ccd1429d
SHA256:337d1f05a3bf83d7a42309f5155edaa070c4ba7219cec3346d98631af0cfb4a5
Tags:exeuser-julianmckein
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • Holiday#3021.exe (PID: 6960 cmdline: "C:\Users\user\Desktop\Holiday#3021.exe" MD5: D94C4AAD05654B76B8B2624808355886)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Holiday#3021.exeReversingLabs: Detection: 42%
Source: Holiday#3021.exeVirustotal: Detection: 44%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: Holiday#3021.exeJoe Sandbox ML: detected
Source: Holiday#3021.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Holiday#3021.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 5.253.86.15 5.253.86.15
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: oshi.at
Source: Holiday#3021.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: Holiday#3021.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: Holiday#3021.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: Holiday#3021.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: Holiday#3021.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: Holiday#3021.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: Holiday#3021.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: Holiday#3021.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: Holiday#3021.exe, 00000000.00000002.4130101006.0000000002531000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002590000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002556000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002574000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000256A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002584000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002560000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.at
Source: Holiday#3021.exe, 00000000.00000002.4130101006.0000000002531000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002590000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002556000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002574000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000256A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002584000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002560000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.atd
Source: Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Holiday#3021.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: Holiday#3021.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: Holiday#3021.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
Source: Holiday#3021.exeString found in binary or memory: https://oshi.at/ypmZ
Source: Holiday#3021.exe, 00000000.00000002.4130101006.000000000257A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000256A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000258C000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002584000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002560000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/ypmZdn
Source: Holiday#3021.exe, 00000000.00000002.4130101006.0000000002531000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002574000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000256A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000253E000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002560000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.atD
Source: Holiday#3021.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: unknownNetwork traffic detected: HTTP traffic on port 50013 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50017
Source: unknownNetwork traffic detected: HTTP traffic on port 50009 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49953 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50017 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50015 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50010
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50012
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50014
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50013
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50016
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50015
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49953
Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50009
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50016 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: Holiday#3021.exeStatic PE information: invalid certificate
Source: Holiday#3021.exe, 00000000.00000002.4129229815.000000000064E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Holiday#3021.exe
Source: Holiday#3021.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\Holiday#3021.exeMutant created: NULL
Source: Holiday#3021.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Holiday#3021.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\Holiday#3021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Holiday#3021.exeReversingLabs: Detection: 42%
Source: Holiday#3021.exeVirustotal: Detection: 44%
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Holiday#3021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Holiday#3021.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeMemory allocated: 2250000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeMemory allocated: 24B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeMemory allocated: 22D0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeWindow / User API: threadDelayed 7762Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeWindow / User API: threadDelayed 2076Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep count: 35 > 30Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -32281802128991695s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7136Thread sleep count: 7762 > 30Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7136Thread sleep count: 2076 > 30Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -99844s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -99719s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -99594s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -99481s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -99375s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -99258s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -99141s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -99016s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -98906s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -98797s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -98688s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -98560s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -98453s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -98344s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -98234s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -98122s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -98013s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -97899s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -97757s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -97641s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -97531s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -97422s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -97313s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -97188s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -97063s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -96938s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -96817s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -96688s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -96578s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -96469s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -96359s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -96234s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -96125s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -96016s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -95906s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -95797s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -95688s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -95563s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -95438s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -95265s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -95147s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -95031s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -94922s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -94812s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -94703s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -94594s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -94484s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 7024Thread sleep time: -94374s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 99844Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 99719Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 99594Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 99481Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 99375Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 99258Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 99141Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 99016Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 98906Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 98797Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 98688Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 98560Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 98453Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 98344Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 98234Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 98122Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 98013Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 97899Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 97757Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 97641Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 97531Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 97422Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 97313Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 97188Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 97063Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 96938Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 96817Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 96688Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 96578Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 96469Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 96359Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 96234Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 96125Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 96016Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 95906Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 95797Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 95688Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 95563Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 95438Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 95265Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 95147Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 95031Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 94922Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 94812Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 94703Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 94594Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 94484Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 94374Jump to behavior
Source: Holiday#3021.exe, 00000000.00000002.4129229815.00000000006BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll[
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeQueries volume information: C:\Users\user\Desktop\Holiday#3021.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Holiday#3021.exe42%ReversingLabsWin32.Virus.Virut
Holiday#3021.exe44%VirustotalBrowse
Holiday#3021.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://oshi.at/ypmZdn0%Avira URL Cloudsafe
https://oshi.at/ypmZ0%Avira URL Cloudsafe
http://oshi.at0%Avira URL Cloudsafe
https://oshi.atD0%Avira URL Cloudsafe
http://oshi.atd0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
oshi.at
5.253.86.15
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://oshi.atdHoliday#3021.exe, 00000000.00000002.4130101006.0000000002531000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002590000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002556000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002574000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000256A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002584000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002560000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://oshi.atHoliday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://oshi.atHoliday#3021.exe, 00000000.00000002.4130101006.0000000002531000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002590000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002556000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002574000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000256A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002584000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002560000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://oshi.at/ypmZHoliday#3021.exefalse
      • Avira URL Cloud: safe
      unknown
      https://oshi.atDHoliday#3021.exe, 00000000.00000002.4130101006.0000000002531000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002574000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000256A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000253E000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002560000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHoliday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://oshi.at/ypmZdnHoliday#3021.exe, 00000000.00000002.4130101006.000000000257A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000256A000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002512000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.000000000258C000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002584000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.4130101006.0000000002560000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        5.253.86.15
        oshi.atCyprus
        208046HOSTSLICK-GERMANYNLfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1587359
        Start date and time:2025-01-10 09:16:05 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 9s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Holiday#3021.exe
        Detection:MAL
        Classification:mal56.winEXE@1/0@1/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 9
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240000 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target Holiday#3021.exe, PID 6960 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        03:16:56API Interceptor12150109x Sleep call for process: Holiday#3021.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        5.253.86.15Ref#103052.exeGet hashmaliciousUnknownBrowse
          Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
            Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
              Ref_31020563.exeGet hashmaliciousUnknownBrowse
                Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                  Ref#1550238.exeGet hashmaliciousUnknownBrowse
                    JuneOrder.exeGet hashmaliciousAsyncRAT, Babadeda, PureLog Stealer, zgRATBrowse
                      TamenuV11.msiGet hashmaliciousUnknownBrowse
                        9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                          9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            oshi.atRef#103052.exeGet hashmaliciousXWormBrowse
                            • 194.15.112.248
                            Ref#103052.exeGet hashmaliciousUnknownBrowse
                            • 5.253.86.15
                            9876567899.bat.exeGet hashmaliciousLokibotBrowse
                            • 194.15.112.248
                            Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref_31020563.exeGet hashmaliciousUnknownBrowse
                            • 194.15.112.248
                            Ref_31020563.exeGet hashmaliciousUnknownBrowse
                            • 5.253.86.15
                            Ref#116670.exeGet hashmaliciousMassLogger RATBrowse
                            • 194.15.112.248
                            Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                            • 194.15.112.248
                            Ref#1550238.exeGet hashmaliciousAgentTeslaBrowse
                            • 194.15.112.248
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            HOSTSLICK-GERMANYNLRef#103052.exeGet hashmaliciousUnknownBrowse
                            • 5.253.86.15
                            Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref_31020563.exeGet hashmaliciousUnknownBrowse
                            • 5.253.86.15
                            Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                            • 5.253.86.15
                            Ref#1550238.exeGet hashmaliciousUnknownBrowse
                            • 5.253.86.15
                            an_api.exeGet hashmaliciousUnknownBrowse
                            • 193.142.146.64
                            licarisan_api.exeGet hashmaliciousIcarusBrowse
                            • 193.142.146.64
                            an_api.exeGet hashmaliciousUnknownBrowse
                            • 193.142.146.64
                            build.exeGet hashmaliciousUnknownBrowse
                            • 193.142.146.64
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):5.354199809612623
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                            • Win32 Executable (generic) a (10002005/4) 49.97%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:Holiday#3021.exe
                            File size:105'592 bytes
                            MD5:d94c4aad05654b76b8b2624808355886
                            SHA1:f3c7911d8834836c22d78da8ae22e790ccd1429d
                            SHA256:337d1f05a3bf83d7a42309f5155edaa070c4ba7219cec3346d98631af0cfb4a5
                            SHA512:de80c7528d00e618a5071b93ccaf86cc697df6219f9e5adb4036aff163a9e87b88a461a8a36adecda1eebefd52d97630ac6d777c8c7a127759e2ea46938e0896
                            SSDEEP:768:79tVmtzb9+Os5hidy/vn61YPkAbBfmFdEugpWWF2zIV9XeS+ST6nkAv:BtVH7DidIkVFdvD0iIC/m8
                            TLSH:CEA3F31DE3D0E4CFDC85767234A62A1737216D8129AE8C079E62B6DD1EB12C279CB1DC
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................Z..........>y... ........@.. ....................................`................................
                            Icon Hash:b04a484c4c4a4eb0
                            Entrypoint:0x40793e
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x677F8B1E [Thu Jan 9 08:38:54 2025 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Signature Valid:false
                            Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                            Signature Validation Error:The digital signature of the object did not verify
                            Error Number:-2146869232
                            Not Before, Not After
                            • 19/10/2023 10:33:01 19/10/2024 10:33:01
                            Subject Chain
                            • CN=Helpfeel Inc, OU=\u958b\u767a\u90e8, O=Helpfeel Inc, STREET=110-16 Goshohachiman-cho, L="Kyoto-shi, Kamigyo-ku", S=Kyoto, C=JP, OID.1.3.6.1.4.1.311.60.2.1.3=JP, SERIALNUMBER=1300-01-068185, OID.2.5.4.15=Private Organization
                            Version:3
                            Thumbprint MD5:0D966BC363CD56690E80EE36566E3C7B
                            Thumbprint SHA-1:A955D2CBD3F7D394053A3C5219A93AF13917EA0D
                            Thumbprint SHA-256:2362CABC8423B1EE01F2DE0F40197E509F8FA6DCF631E687EDB44792B241E526
                            Serial:138A5335DB02BAFDC71DC47A
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x78e40x57.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x10eea.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x16e000x2e78
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x59440x5a0071d19515a916531c21055ed779002fdfFalse0.48020833333333335data5.562129242054329IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x80000x10eea0x11000cd5684816678f78e2f084b404c8027c6False0.056654986213235295data4.118847272485798IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1a0000xc0x200e06ea69fa48d73489b803d33aeced39fFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x81300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.046492369572932686
                            RT_GROUP_ICON0x189580x14data1.15
                            RT_VERSION0x1896c0x394OpenPGP Secret Key0.4268558951965066
                            RT_MANIFEST0x18d000x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 10, 2025 09:16:57.577282906 CET49732443192.168.2.45.253.86.15
                            Jan 10, 2025 09:16:57.577347040 CET443497325.253.86.15192.168.2.4
                            Jan 10, 2025 09:16:57.577416897 CET49732443192.168.2.45.253.86.15
                            Jan 10, 2025 09:16:57.589895010 CET49732443192.168.2.45.253.86.15
                            Jan 10, 2025 09:16:57.589912891 CET443497325.253.86.15192.168.2.4
                            Jan 10, 2025 09:17:40.379834890 CET443497325.253.86.15192.168.2.4
                            Jan 10, 2025 09:17:40.379972935 CET49732443192.168.2.45.253.86.15
                            Jan 10, 2025 09:17:40.389461040 CET49732443192.168.2.45.253.86.15
                            Jan 10, 2025 09:17:40.389486074 CET443497325.253.86.15192.168.2.4
                            Jan 10, 2025 09:17:40.402621984 CET49739443192.168.2.45.253.86.15
                            Jan 10, 2025 09:17:40.402686119 CET443497395.253.86.15192.168.2.4
                            Jan 10, 2025 09:17:40.402777910 CET49739443192.168.2.45.253.86.15
                            Jan 10, 2025 09:17:40.403217077 CET49739443192.168.2.45.253.86.15
                            Jan 10, 2025 09:17:40.403249025 CET443497395.253.86.15192.168.2.4
                            Jan 10, 2025 09:18:23.147349119 CET443497395.253.86.15192.168.2.4
                            Jan 10, 2025 09:18:23.147577047 CET49739443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:23.149414062 CET49739443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:23.149425983 CET443497395.253.86.15192.168.2.4
                            Jan 10, 2025 09:18:28.163729906 CET49953443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:28.163748980 CET443499535.253.86.15192.168.2.4
                            Jan 10, 2025 09:18:28.163808107 CET49953443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:28.164092064 CET49953443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:28.164103031 CET443499535.253.86.15192.168.2.4
                            Jan 10, 2025 09:18:48.179934025 CET49953443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:48.223345995 CET443499535.253.86.15192.168.2.4
                            Jan 10, 2025 09:18:49.541203976 CET443499535.253.86.15192.168.2.4
                            Jan 10, 2025 09:18:49.541268110 CET49953443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:53.211333036 CET50009443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:53.211374998 CET443500095.253.86.15192.168.2.4
                            Jan 10, 2025 09:18:53.214943886 CET50009443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:53.215363026 CET50009443192.168.2.45.253.86.15
                            Jan 10, 2025 09:18:53.215375900 CET443500095.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:11.084722996 CET50009443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:11.127341032 CET443500095.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:14.585753918 CET443500095.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:14.591440916 CET50009443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:16.101160049 CET50010443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:16.101190090 CET443500105.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:16.101260900 CET50010443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:16.101845980 CET50010443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:16.101856947 CET443500105.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:20.928363085 CET50010443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:20.971348047 CET443500105.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:25.944876909 CET50011443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:25.944920063 CET443500115.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:25.944983006 CET50011443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:25.945514917 CET50011443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:25.945530891 CET443500115.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:29.232307911 CET50011443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:29.275336981 CET443500115.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:34.241558075 CET50012443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:34.241592884 CET443500125.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:34.241650105 CET50012443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:34.242181063 CET50012443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:34.242193937 CET443500125.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:37.476489067 CET443500105.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:37.476543903 CET50010443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:47.321356058 CET443500115.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:47.322489977 CET50011443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:53.224718094 CET50012443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:53.267373085 CET443500125.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:55.636754990 CET443500125.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:55.636977911 CET50012443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:58.241590977 CET50013443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:58.241652012 CET443500135.253.86.15192.168.2.4
                            Jan 10, 2025 09:19:58.241776943 CET50013443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:58.242427111 CET50013443192.168.2.45.253.86.15
                            Jan 10, 2025 09:19:58.242441893 CET443500135.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:33.430850029 CET50013443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:33.431052923 CET443500135.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:33.434297085 CET50013443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:38.444423914 CET50014443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:38.444458008 CET443500145.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:38.444557905 CET50014443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:38.445183992 CET50014443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:38.445199013 CET443500145.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:41.990261078 CET50014443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:42.031373024 CET443500145.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:47.007071018 CET50015443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:47.007113934 CET443500155.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:47.007534981 CET50015443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:47.008032084 CET50015443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:47.008054972 CET443500155.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:51.788001060 CET50015443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:51.831331968 CET443500155.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:56.808032990 CET50016443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:56.808077097 CET443500165.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:56.808372021 CET50016443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:56.809318066 CET50016443192.168.2.45.253.86.15
                            Jan 10, 2025 09:20:56.809330940 CET443500165.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:59.810041904 CET443500145.253.86.15192.168.2.4
                            Jan 10, 2025 09:20:59.810195923 CET50014443192.168.2.45.253.86.15
                            Jan 10, 2025 09:21:03.179213047 CET50016443192.168.2.45.253.86.15
                            Jan 10, 2025 09:21:03.219326973 CET443500165.253.86.15192.168.2.4
                            Jan 10, 2025 09:21:08.194248915 CET50017443192.168.2.45.253.86.15
                            Jan 10, 2025 09:21:08.194299936 CET443500175.253.86.15192.168.2.4
                            Jan 10, 2025 09:21:08.194849968 CET50017443192.168.2.45.253.86.15
                            Jan 10, 2025 09:21:08.195190907 CET50017443192.168.2.45.253.86.15
                            Jan 10, 2025 09:21:08.195204020 CET443500175.253.86.15192.168.2.4
                            Jan 10, 2025 09:21:08.386291981 CET443500155.253.86.15192.168.2.4
                            Jan 10, 2025 09:21:08.388052940 CET50015443192.168.2.45.253.86.15
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 10, 2025 09:16:57.560795069 CET6047953192.168.2.41.1.1.1
                            Jan 10, 2025 09:16:57.569550037 CET53604791.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 10, 2025 09:16:57.560795069 CET192.168.2.41.1.1.10x8543Standard query (0)oshi.atA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 10, 2025 09:16:57.569550037 CET1.1.1.1192.168.2.40x8543No error (0)oshi.at5.253.86.15A (IP address)IN (0x0001)false
                            Jan 10, 2025 09:16:57.569550037 CET1.1.1.1192.168.2.40x8543No error (0)oshi.at194.15.112.248A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:03:16:56
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\Holiday#3021.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Holiday#3021.exe"
                            Imagebase:0x140000
                            File size:105'592 bytes
                            MD5 hash:D94C4AAD05654B76B8B2624808355886
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            Reset < >
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4129929001.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2250000_Holiday#3021.jbxd
                              Similarity
                              • API ID:
                              • String ID: tokq
                              • API String ID: 0-664377100
                              • Opcode ID: 94e0713276facf74fb854a9bc8ad71f25e47f843d7924aeea3ac8600af844180
                              • Instruction ID: 344c3f9c1c0b4038773aa0471152d702a925d4d5e97f72e01f9784d2e906cf2b
                              • Opcode Fuzzy Hash: 94e0713276facf74fb854a9bc8ad71f25e47f843d7924aeea3ac8600af844180
                              • Instruction Fuzzy Hash: 84214574B101048FDB58DF78D498AAE7BF2AF8D710F2045A8E406EB3A8DA709C05CB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4129929001.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2250000_Holiday#3021.jbxd
                              Similarity
                              • API ID:
                              • String ID: tokq
                              • API String ID: 0-664377100
                              • Opcode ID: 79240fb6ab7b44938b8976c283da79f9c2957637cda6358a8c1ae00ebe096233
                              • Instruction ID: 85fbd08927944fa76006a07c7d20adf56b74ef96af145579cafd7e796460783e
                              • Opcode Fuzzy Hash: 79240fb6ab7b44938b8976c283da79f9c2957637cda6358a8c1ae00ebe096233
                              • Instruction Fuzzy Hash: 6E213674B106148FD754EB78D958A6E7BF2AF8D710F204468E506EB3B8DE74AC41CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4129929001.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2250000_Holiday#3021.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 850281888aca4096bbc4f28dc20b11a462b44e3c385fcb872a0b8fb7ed002bb2
                              • Instruction ID: ed382152a05c58400cb0162a197794faa0e67b39d1c5a17336a5d284dcef96e6
                              • Opcode Fuzzy Hash: 850281888aca4096bbc4f28dc20b11a462b44e3c385fcb872a0b8fb7ed002bb2
                              • Instruction Fuzzy Hash: 693114B0D04259AFDF14CFA9C590AEEBFF1AF48314F248469E809AB258DB749941DF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.4129929001.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2250000_Holiday#3021.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6d6cd5dcdb47bc37bdc47974bc19c94e8f0fa03a1277395337e8a6ec2d3e8dc6
                              • Instruction ID: bc5f210a25b57e5b15aa486237f6c13133fba088f69c7a8b4e9d45ee2660cd9d
                              • Opcode Fuzzy Hash: 6d6cd5dcdb47bc37bdc47974bc19c94e8f0fa03a1277395337e8a6ec2d3e8dc6
                              • Instruction Fuzzy Hash: 483115B0D04259AFDF10CFAAC590ADEBFF5AF48310F248429E809AB358DB749941DF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.4129929001.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2250000_Holiday#3021.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 265f1933a25def9ef13dec81ac17e55e7544b5651407c52d96362f9fe1a41ae9
                              • Instruction ID: 14b8aa8d3b5a0e7e0627ea4b24416df72215d6d95b99c1aa8b009a676565eac4
                              • Opcode Fuzzy Hash: 265f1933a25def9ef13dec81ac17e55e7544b5651407c52d96362f9fe1a41ae9
                              • Instruction Fuzzy Hash: 7B21D030B102158FCB19AFB88814BAD7BF2EFC9304F14852DD506DB296DB74994ACB92
                              Memory Dump Source
                              • Source File: 00000000.00000002.4129929001.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2250000_Holiday#3021.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: facc62031b86a1d6809783e4e6b6d249e1094d31b542374cd3155bb0c251460c
                              • Instruction ID: 3dd6750a2a33b841ddaf095ab391900a8283d6a290546527ef6fe2586bb3e9c9
                              • Opcode Fuzzy Hash: facc62031b86a1d6809783e4e6b6d249e1094d31b542374cd3155bb0c251460c
                              • Instruction Fuzzy Hash: D11182307101158FCB19AB78C464BBC37B3EBC9315B14C928E5069B3A6DF75AD8ACB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.4129624864.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_94d000_Holiday#3021.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9efc9f9c130216b0fc7abbd10d88f9b964ee7e359c6285735524369e7a0975d5
                              • Instruction ID: dc38eeb7361a245ad4d088840c66f1af4bb7385d54c82c0d62828e122bb6ef32
                              • Opcode Fuzzy Hash: 9efc9f9c130216b0fc7abbd10d88f9b964ee7e359c6285735524369e7a0975d5
                              • Instruction Fuzzy Hash: 0301D6B500A3409AE7208F29CDC4F66BFACDF51774F18C81AFD095A286D7799840DA71
                              Memory Dump Source
                              • Source File: 00000000.00000002.4129624864.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_94d000_Holiday#3021.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6c4be6b64b1624b2ae9f85fc7f8fa5c7f087cd8c687ffa093797a19a94574126
                              • Instruction ID: 5e2ec76e65a5749d627e4fde6868a715081e81a4f57761628d53752ba1736d13
                              • Opcode Fuzzy Hash: 6c4be6b64b1624b2ae9f85fc7f8fa5c7f087cd8c687ffa093797a19a94574126
                              • Instruction Fuzzy Hash: 42F062764053449AE7208E1AD9C4B66FF9CEB51724F18C45AFD085A286C3799844CA71
                              Memory Dump Source
                              • Source File: 00000000.00000002.4129929001.0000000002250000.00000040.00000800.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2250000_Holiday#3021.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a539c390beff2db1ec1ee4ff126707844160cf45b0fd6e7a9c38c44e7e251d0
                              • Instruction ID: 503518a74abd963788824f3f9b73a16cb357cd3b8278afb5b33d4123c09c928b
                              • Opcode Fuzzy Hash: 0a539c390beff2db1ec1ee4ff126707844160cf45b0fd6e7a9c38c44e7e251d0
                              • Instruction Fuzzy Hash: 8DB0124911C1D8CECB63E7620C3C3D43FA0BF01006FCC10ED8C804B143C404851C5255