Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Holiday#3021.exe

Overview

General Information

Sample name:Holiday#3021.exe
Analysis ID:1587359
MD5:d94c4aad05654b76b8b2624808355886
SHA1:f3c7911d8834836c22d78da8ae22e790ccd1429d
SHA256:337d1f05a3bf83d7a42309f5155edaa070c4ba7219cec3346d98631af0cfb4a5
Tags:exeuser-julianmckein
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • Holiday#3021.exe (PID: 4432 cmdline: "C:\Users\user\Desktop\Holiday#3021.exe" MD5: D94C4AAD05654B76B8B2624808355886)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Holiday#3021.exeReversingLabs: Detection: 42%
Source: Holiday#3021.exeVirustotal: Detection: 44%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.8% probability
Source: Holiday#3021.exeJoe Sandbox ML: detected
Source: Holiday#3021.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Holiday#3021.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 5.253.86.15 5.253.86.15
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: oshi.at
Source: Holiday#3021.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: Holiday#3021.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: Holiday#3021.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: Holiday#3021.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: Holiday#3021.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: Holiday#3021.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: Holiday#3021.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: Holiday#3021.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.at
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oshi.atd
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002C7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameX)
Source: Holiday#3021.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: Holiday#3021.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: Holiday#3021.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002C7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
Source: Holiday#3021.exeString found in binary or memory: https://oshi.at/ypmZ
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/ypmZdn
Source: Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD0000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD8000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.atD
Source: Holiday#3021.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49982
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
Source: unknownNetwork traffic detected: HTTP traffic on port 49982 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
Source: Holiday#3021.exeStatic PE information: invalid certificate
Source: Holiday#3021.exe, 00000000.00000002.3914242900.0000000000E2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Holiday#3021.exe
Source: Holiday#3021.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\Holiday#3021.exeMutant created: NULL
Source: Holiday#3021.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Holiday#3021.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\Holiday#3021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Holiday#3021.exeReversingLabs: Detection: 42%
Source: Holiday#3021.exeVirustotal: Detection: 44%
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: Holiday#3021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Holiday#3021.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeMemory allocated: 1070000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeMemory allocated: 2C20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeMemory allocated: 11E0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeWindow / User API: threadDelayed 550Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeWindow / User API: threadDelayed 726Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 3996Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 3996Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 4288Thread sleep count: 550 > 30Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 4288Thread sleep count: 726 > 30Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exe TID: 3996Thread sleep time: -91453s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeThread delayed: delay time: 91453Jump to behavior
Source: Holiday#3021.exe, 00000000.00000002.3914242900.0000000000E9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Holiday#3021.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeQueries volume information: C:\Users\user\Desktop\Holiday#3021.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Holiday#3021.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Holiday#3021.exe42%ReversingLabsWin32.Virus.Virut
Holiday#3021.exe44%VirustotalBrowse
Holiday#3021.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://oshi.at/ypmZ0%Avira URL Cloudsafe
https://oshi.atD0%Avira URL Cloudsafe
http://oshi.at0%Avira URL Cloudsafe
https://oshi.at/ypmZdn0%Avira URL Cloudsafe
http://oshi.atd0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
oshi.at
5.253.86.15
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://oshi.atdHoliday#3021.exe, 00000000.00000002.3914754662.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD0000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://oshi.atHoliday#3021.exe, 00000000.00000002.3914754662.0000000002C7C000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://oshi.atHoliday#3021.exe, 00000000.00000002.3914754662.0000000002CA1000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD0000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://oshi.at/ypmZHoliday#3021.exefalse
      • Avira URL Cloud: safe
      unknown
      https://oshi.atDHoliday#3021.exe, 00000000.00000002.3914754662.0000000002CD0000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD8000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CAE000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameX)Holiday#3021.exe, 00000000.00000002.3914754662.0000000002C7C000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://oshi.at/ypmZdnHoliday#3021.exe, 00000000.00000002.3914754662.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, Holiday#3021.exe, 00000000.00000002.3914754662.0000000002CD8000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        5.253.86.15
        oshi.atCyprus
        208046HOSTSLICK-GERMANYNLfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1587359
        Start date and time:2025-01-10 09:22:43 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 58s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Holiday#3021.exe
        Detection:MAL
        Classification:mal56.winEXE@1/0@1/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 10
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded IPs from analysis (whitelisted): 13.107.253.45, 4.175.87.197
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target Holiday#3021.exe, PID 4432 because it is empty
        • Report size getting too big, too many NtQueryValueKey calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        5.253.86.15Ref#103052.exeGet hashmaliciousUnknownBrowse
          Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
            Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
              Ref_31020563.exeGet hashmaliciousUnknownBrowse
                Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                  Ref#1550238.exeGet hashmaliciousUnknownBrowse
                    JuneOrder.exeGet hashmaliciousAsyncRAT, Babadeda, PureLog Stealer, zgRATBrowse
                      TamenuV11.msiGet hashmaliciousUnknownBrowse
                        9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          oshi.atRef#103052.exeGet hashmaliciousXWormBrowse
                          • 194.15.112.248
                          Ref#103052.exeGet hashmaliciousUnknownBrowse
                          • 5.253.86.15
                          9876567899.bat.exeGet hashmaliciousLokibotBrowse
                          • 194.15.112.248
                          Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                          • 5.253.86.15
                          Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                          • 5.253.86.15
                          Ref_31020563.exeGet hashmaliciousUnknownBrowse
                          • 194.15.112.248
                          Ref_31020563.exeGet hashmaliciousUnknownBrowse
                          • 5.253.86.15
                          Ref#116670.exeGet hashmaliciousMassLogger RATBrowse
                          • 194.15.112.248
                          Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                          • 194.15.112.248
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          HOSTSLICK-GERMANYNLRef#103052.exeGet hashmaliciousUnknownBrowse
                          • 5.253.86.15
                          Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                          • 5.253.86.15
                          Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                          • 5.253.86.15
                          Ref_31020563.exeGet hashmaliciousUnknownBrowse
                          • 5.253.86.15
                          Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                          • 5.253.86.15
                          Ref#1550238.exeGet hashmaliciousUnknownBrowse
                          • 5.253.86.15
                          an_api.exeGet hashmaliciousUnknownBrowse
                          • 193.142.146.64
                          licarisan_api.exeGet hashmaliciousIcarusBrowse
                          • 193.142.146.64
                          an_api.exeGet hashmaliciousUnknownBrowse
                          • 193.142.146.64
                          No context
                          No context
                          No created / dropped files found
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):5.354199809612623
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                          • Win32 Executable (generic) a (10002005/4) 49.97%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:Holiday#3021.exe
                          File size:105'592 bytes
                          MD5:d94c4aad05654b76b8b2624808355886
                          SHA1:f3c7911d8834836c22d78da8ae22e790ccd1429d
                          SHA256:337d1f05a3bf83d7a42309f5155edaa070c4ba7219cec3346d98631af0cfb4a5
                          SHA512:de80c7528d00e618a5071b93ccaf86cc697df6219f9e5adb4036aff163a9e87b88a461a8a36adecda1eebefd52d97630ac6d777c8c7a127759e2ea46938e0896
                          SSDEEP:768:79tVmtzb9+Os5hidy/vn61YPkAbBfmFdEugpWWF2zIV9XeS+ST6nkAv:BtVH7DidIkVFdvD0iIC/m8
                          TLSH:CEA3F31DE3D0E4CFDC85767234A62A1737216D8129AE8C079E62B6DD1EB12C279CB1DC
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................Z..........>y... ........@.. ....................................`................................
                          Icon Hash:b04a484c4c4a4eb0
                          Entrypoint:0x40793e
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x677F8B1E [Thu Jan 9 08:38:54 2025 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Signature Valid:false
                          Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                          Signature Validation Error:The digital signature of the object did not verify
                          Error Number:-2146869232
                          Not Before, Not After
                          • 19/10/2023 11:33:01 19/10/2024 11:33:01
                          Subject Chain
                          • CN=Helpfeel Inc, OU=\u958b\u767a\u90e8, O=Helpfeel Inc, STREET=110-16 Goshohachiman-cho, L="Kyoto-shi, Kamigyo-ku", S=Kyoto, C=JP, OID.1.3.6.1.4.1.311.60.2.1.3=JP, SERIALNUMBER=1300-01-068185, OID.2.5.4.15=Private Organization
                          Version:3
                          Thumbprint MD5:0D966BC363CD56690E80EE36566E3C7B
                          Thumbprint SHA-1:A955D2CBD3F7D394053A3C5219A93AF13917EA0D
                          Thumbprint SHA-256:2362CABC8423B1EE01F2DE0F40197E509F8FA6DCF631E687EDB44792B241E526
                          Serial:138A5335DB02BAFDC71DC47A
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x78e40x57.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x10eea.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x16e000x2e78
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x59440x5a0071d19515a916531c21055ed779002fdfFalse0.48020833333333335data5.562129242054329IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0x80000x10eea0x11000cd5684816678f78e2f084b404c8027c6False0.056654986213235295data4.118847272485798IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x1a0000xc0x200e06ea69fa48d73489b803d33aeced39fFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x81300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.046492369572932686
                          RT_GROUP_ICON0x189580x14data1.15
                          RT_VERSION0x1896c0x394OpenPGP Secret Key0.4268558951965066
                          RT_MANIFEST0x18d000x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 10, 2025 09:23:35.391053915 CET49706443192.168.2.55.253.86.15
                          Jan 10, 2025 09:23:35.391093969 CET443497065.253.86.15192.168.2.5
                          Jan 10, 2025 09:23:35.391166925 CET49706443192.168.2.55.253.86.15
                          Jan 10, 2025 09:23:35.398982048 CET49706443192.168.2.55.253.86.15
                          Jan 10, 2025 09:23:35.398997068 CET443497065.253.86.15192.168.2.5
                          Jan 10, 2025 09:24:18.703105927 CET443497065.253.86.15192.168.2.5
                          Jan 10, 2025 09:24:18.703196049 CET49706443192.168.2.55.253.86.15
                          Jan 10, 2025 09:24:18.711862087 CET49706443192.168.2.55.253.86.15
                          Jan 10, 2025 09:24:18.711879969 CET443497065.253.86.15192.168.2.5
                          Jan 10, 2025 09:24:18.721591949 CET49867443192.168.2.55.253.86.15
                          Jan 10, 2025 09:24:18.721615076 CET443498675.253.86.15192.168.2.5
                          Jan 10, 2025 09:24:18.721704006 CET49867443192.168.2.55.253.86.15
                          Jan 10, 2025 09:24:18.722048044 CET49867443192.168.2.55.253.86.15
                          Jan 10, 2025 09:24:18.722064018 CET443498675.253.86.15192.168.2.5
                          Jan 10, 2025 09:25:01.512765884 CET443498675.253.86.15192.168.2.5
                          Jan 10, 2025 09:25:01.512995958 CET49867443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:01.527369022 CET49867443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:01.527400970 CET443498675.253.86.15192.168.2.5
                          Jan 10, 2025 09:25:06.565850019 CET49980443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:06.565896988 CET443499805.253.86.15192.168.2.5
                          Jan 10, 2025 09:25:06.565964937 CET49980443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:06.566293001 CET49980443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:06.566308975 CET443499805.253.86.15192.168.2.5
                          Jan 10, 2025 09:25:49.309768915 CET443499805.253.86.15192.168.2.5
                          Jan 10, 2025 09:25:49.309861898 CET49980443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:49.311021090 CET49980443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:49.311043024 CET443499805.253.86.15192.168.2.5
                          Jan 10, 2025 09:25:49.312213898 CET49981443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:49.312252998 CET443499815.253.86.15192.168.2.5
                          Jan 10, 2025 09:25:49.312345028 CET49981443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:49.312669992 CET49981443192.168.2.55.253.86.15
                          Jan 10, 2025 09:25:49.312685013 CET443499815.253.86.15192.168.2.5
                          Jan 10, 2025 09:26:32.091247082 CET443499815.253.86.15192.168.2.5
                          Jan 10, 2025 09:26:32.092919111 CET49981443192.168.2.55.253.86.15
                          Jan 10, 2025 09:26:32.092919111 CET49981443192.168.2.55.253.86.15
                          Jan 10, 2025 09:26:32.407202005 CET49981443192.168.2.55.253.86.15
                          Jan 10, 2025 09:26:32.407229900 CET443499815.253.86.15192.168.2.5
                          Jan 10, 2025 09:26:37.097037077 CET49982443192.168.2.55.253.86.15
                          Jan 10, 2025 09:26:37.097083092 CET443499825.253.86.15192.168.2.5
                          Jan 10, 2025 09:26:37.097424030 CET49982443192.168.2.55.253.86.15
                          Jan 10, 2025 09:26:37.097624063 CET49982443192.168.2.55.253.86.15
                          Jan 10, 2025 09:26:37.097630978 CET443499825.253.86.15192.168.2.5
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 10, 2025 09:23:35.153883934 CET6314253192.168.2.51.1.1.1
                          Jan 10, 2025 09:23:35.383239985 CET53631421.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 10, 2025 09:23:35.153883934 CET192.168.2.51.1.1.10x10e2Standard query (0)oshi.atA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 10, 2025 09:23:35.383239985 CET1.1.1.1192.168.2.50x10e2No error (0)oshi.at5.253.86.15A (IP address)IN (0x0001)false
                          Jan 10, 2025 09:23:35.383239985 CET1.1.1.1192.168.2.50x10e2No error (0)oshi.at194.15.112.248A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:03:23:34
                          Start date:10/01/2025
                          Path:C:\Users\user\Desktop\Holiday#3021.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Holiday#3021.exe"
                          Imagebase:0x820000
                          File size:105'592 bytes
                          MD5 hash:D94C4AAD05654B76B8B2624808355886
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Reset < >
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914570301.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1070000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID: tohq
                            • API String ID: 0-213173455
                            • Opcode ID: 0f138d642ce424f8eacb43a32a953a65b6e06d917bb9d1ead5c32e4f456325a3
                            • Instruction ID: 99ea8b0481d3b4733270691e3c4eb5f7668c67dd1c2499fa67929ef5206e17d6
                            • Opcode Fuzzy Hash: 0f138d642ce424f8eacb43a32a953a65b6e06d917bb9d1ead5c32e4f456325a3
                            • Instruction Fuzzy Hash: BC31BF74A102448FCB54DF78C498A9A7FF2EF4A310F144498E182DB3A9DA719C02CB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914570301.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1070000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID: tohq
                            • API String ID: 0-213173455
                            • Opcode ID: 5c759d906bcb9575fe11a34b718ad649c1cccadc5e3f506f3a5cc6c61e880d05
                            • Instruction ID: cd7ac299f66eb0cd500f69965f1b8bde2e6786b1d42e5080c4fab8080c3b884f
                            • Opcode Fuzzy Hash: 5c759d906bcb9575fe11a34b718ad649c1cccadc5e3f506f3a5cc6c61e880d05
                            • Instruction Fuzzy Hash: 14215874B102048FC754EF29D458A6E7BF6AF8C710F2044A8E506EB3A8CE759C01CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914570301.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1070000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a4e17902aeea7132e9cfab3cff023312146f9ba6d4eabf00ebe50ce4e9775173
                            • Instruction ID: 9cd9d3876807e2232ce7ea4e4a19ee5100dceb4827fa5548795907ba27181b84
                            • Opcode Fuzzy Hash: a4e17902aeea7132e9cfab3cff023312146f9ba6d4eabf00ebe50ce4e9775173
                            • Instruction Fuzzy Hash: 05312AB1D002499FDB24CFA9D484AEEBFF1AF48300F24846AE549AB350DB749945CF91
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914570301.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1070000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dea328bd1d74e5c375b1d02e791d4a2a1e9015d22ad11cee893d2477914ef1e9
                            • Instruction ID: a611a6942482ade9b173cac4343711fbc16418bb7f28619801ba3dd1a2f48412
                            • Opcode Fuzzy Hash: dea328bd1d74e5c375b1d02e791d4a2a1e9015d22ad11cee893d2477914ef1e9
                            • Instruction Fuzzy Hash: D83139B1D002499FDB14CFA9D484AEEBFF5EF48300F248429E949AB350DB749945CF91
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914570301.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1070000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3b43b3118786c6fb96aa59f8a616147d47370b8810f406763e1fdab56d1b0cf0
                            • Instruction ID: fdd6e2281beec4ff079a341e9fc887dcbb3c84382afb7a84c32b28cebd541605
                            • Opcode Fuzzy Hash: 3b43b3118786c6fb96aa59f8a616147d47370b8810f406763e1fdab56d1b0cf0
                            • Instruction Fuzzy Hash: E421CC70B002048FCB45AFB8C4446FD7BF2EFDA311B144668E046EB395DB34998ACB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914570301.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1070000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b8ba1e6ed8d08831e72e29dd426551c24e2894ee57455c7d00886ae44f0d231a
                            • Instruction ID: 81adb271b633cde8c5b6fd104e56e5e1451d15ce36ecaa8c282d7a0255ac75de
                            • Opcode Fuzzy Hash: b8ba1e6ed8d08831e72e29dd426551c24e2894ee57455c7d00886ae44f0d231a
                            • Instruction Fuzzy Hash: 2B119D30700114CFCB1AAB68D0546FC77F3EBDA315B144968E006AB394CF759D8ADB82
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914229006.0000000000E1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_e1d000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f2b01d045580aefabf9d66807800851c28852809ce5752aa9a64116dce71e5e9
                            • Instruction ID: 36db63d9168e67ebf11ac800efe293f908d66caac9c6a2a7262e5a7610eaa98a
                            • Opcode Fuzzy Hash: f2b01d045580aefabf9d66807800851c28852809ce5752aa9a64116dce71e5e9
                            • Instruction Fuzzy Hash: 9501A27110C3409AE7109A29CDC4BE7BFA8DF41328F28D41BED096A2C6C6799884CAB1
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914229006.0000000000E1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_e1d000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6a1571e680a22bc219b6956251acb52e9032b4511505a50db18fbc8442f2538f
                            • Instruction ID: 4633c629f14be5bf818cbcf5c810734049428566fd07c76bf4813e67c045d13d
                            • Opcode Fuzzy Hash: 6a1571e680a22bc219b6956251acb52e9032b4511505a50db18fbc8442f2538f
                            • Instruction Fuzzy Hash: 9CF06271408344AEE7108E19DD84BA3FFA8EB51724F18C45AED085A296C379A884CAB1
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914570301.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1070000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1109c42163c25e5534a668ee8b32d66c9ab3d2f98f453d7c7131903c11bf7a12
                            • Instruction ID: a3c28f976b235ef59489ef493895a3dfcd5b4051b1d7aed7a6181b3e699dbe35
                            • Opcode Fuzzy Hash: 1109c42163c25e5534a668ee8b32d66c9ab3d2f98f453d7c7131903c11bf7a12
                            • Instruction Fuzzy Hash: F1F0321160E3D48FCB134B3448342987FA09E4302835E01EAC2E4CF2B3E5480C1AC7AB
                            Memory Dump Source
                            • Source File: 00000000.00000002.3914570301.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1070000_Holiday#3021.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 92b1b1969736589ff6b42509a951ccecc06dfcbf237a6b606ef084658d092d5f
                            • Instruction ID: 8a9d8fee9e13c959801be73b532b316d35d19c24ef3a23c190114faedaab5109
                            • Opcode Fuzzy Hash: 92b1b1969736589ff6b42509a951ccecc06dfcbf237a6b606ef084658d092d5f
                            • Instruction Fuzzy Hash: 8AC08032B0012EC6EF1197CCD4042DC7770EBC4315F000165E3456204087341155C773