Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Client.exe

Overview

General Information

Sample name:Client.exe
Analysis ID:1587363
MD5:b6811a1daca8cfda16da0f730c174133
SHA1:92d67d3836def51f5a45389692292b2998a0c559
SHA256:d5619e740a38ee0c894dd17051419306c4b35ad55a1558854ed82527a4aa736c
Tags:AsyncRATexeuser-lontze7
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • Client.exe (PID: 3300 cmdline: "C:\Users\user\Desktop\Client.exe" MD5: B6811A1DACA8CFDA16DA0F730C174133)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"External_config_on_Pastebin": "null", "Server": "0.tcp.in.ngrok.io", "Ports": "10147", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "Listopener.exe", "Install_File": "aWVPNVFPYW9UOGdRNjZWQVFpNVZBaE44Rm9UbHlKaW8="}
SourceRuleDescriptionAuthorStrings
Client.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    Client.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Client.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0x9941:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xac38:$a2: Stub.exe
      • 0xacc8:$a2: Stub.exe
      • 0x66ff:$a3: get_ActivatePong
      • 0x9b59:$a4: vmware
      • 0x99d1:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x745a:$a6: get_SslClient
      Client.exerat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
      • 0x66ff:$str01: get_ActivatePong
      • 0x745a:$str02: get_SslClient
      • 0x7476:$str03: get_TcpClient
      • 0x5d0e:$str04: get_SendSync
      • 0x5d5e:$str05: get_IsConnected
      • 0x648d:$str06: set_UseShellExecute
      • 0x9c77:$str07: Pastebin
      • 0x9cf9:$str08: Select * from AntivirusProduct
      • 0xac38:$str09: Stub.exe
      • 0xacc8:$str09: Stub.exe
      • 0x9a51:$str10: timeout 3 > NUL
      • 0x9941:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
      • 0x99d1:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      Client.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0x99d3:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0x97d3:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        00000000.00000002.3365364432.0000000003161000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: Client.exe PID: 3300JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            Process Memory Space: Client.exe PID: 3300INDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0x3b4b9:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            SourceRuleDescriptionAuthorStrings
            0.0.Client.exe.c40000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              0.0.Client.exe.c40000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.0.Client.exe.c40000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
                • 0x9941:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
                • 0xac38:$a2: Stub.exe
                • 0xacc8:$a2: Stub.exe
                • 0x66ff:$a3: get_ActivatePong
                • 0x9b59:$a4: vmware
                • 0x99d1:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
                • 0x745a:$a6: get_SslClient
                0.0.Client.exe.c40000.0.unpackrat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
                • 0x66ff:$str01: get_ActivatePong
                • 0x745a:$str02: get_SslClient
                • 0x7476:$str03: get_TcpClient
                • 0x5d0e:$str04: get_SendSync
                • 0x5d5e:$str05: get_IsConnected
                • 0x648d:$str06: set_UseShellExecute
                • 0x9c77:$str07: Pastebin
                • 0x9cf9:$str08: Select * from AntivirusProduct
                • 0xac38:$str09: Stub.exe
                • 0xacc8:$str09: Stub.exe
                • 0x9a51:$str10: timeout 3 > NUL
                • 0x9941:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
                • 0x99d1:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
                0.0.Client.exe.c40000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
                • 0x99d3:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Client.exeAvira: detected
                Source: 0.tcp.in.ngrok.ioAvira URL Cloud: Label: malware
                Source: Client.exeMalware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "0.tcp.in.ngrok.io", "Ports": "10147", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "Listopener.exe", "Install_File": "aWVPNVFPYW9UOGdRNjZWQVFpNVZBaE44Rm9UbHlKaW8="}
                Source: Client.exeVirustotal: Detection: 73%Perma Link
                Source: Client.exeReversingLabs: Detection: 86%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Client.exeJoe Sandbox ML: detected
                Source: Client.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Client.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Networking

                barindex
                Source: Malware configuration extractorURLs: 0.tcp.in.ngrok.io
                Source: Yara matchFile source: Client.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPE
                Source: global trafficTCP traffic: 192.168.2.6:49710 -> 35.154.189.194:10147
                Source: global trafficTCP traffic: 192.168.2.6:57025 -> 13.202.226.61:10147
                Source: global trafficTCP traffic: 192.168.2.6:56839 -> 1.1.1.1:53
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: 0.tcp.in.ngrok.io

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: Client.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3365364432.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3300, type: MEMORYSTR

                System Summary

                barindex
                Source: Client.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: Client.exe, type: SAMPLEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                Source: Client.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                Source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: Process Memory Space: Client.exe PID: 3300, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_018649580_2_01864958
                Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_018640880_2_01864088
                Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_01865B200_2_01865B20
                Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_01863D400_2_01863D40
                Source: Client.exe, 00000000.00000000.2118325333.0000000000C4E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs Client.exe
                Source: Client.exeBinary or memory string: OriginalFilenameStub.exe" vs Client.exe
                Source: Client.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Client.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: Client.exe, type: SAMPLEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                Source: Client.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                Source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: Process Memory Space: Client.exe PID: 3300, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@2/2
                Source: C:\Users\user\Desktop\Client.exeMutant created: NULL
                Source: C:\Users\user\Desktop\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Q52IWD1RYgpZ
                Source: Client.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Client.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\Client.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Client.exeVirustotal: Detection: 73%
                Source: Client.exeReversingLabs: Detection: 86%
                Source: C:\Users\user\Desktop\Client.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Client.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: Client.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Client.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Boot Survival

                barindex
                Source: Yara matchFile source: Client.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3365364432.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3300, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Client.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3365364432.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3300, type: MEMORYSTR
                Source: Client.exeBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\Client.exeMemory allocated: 1860000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Client.exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Client.exeMemory allocated: 1A20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Client.exe TID: 5388Thread sleep time: -80000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Client.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                Source: C:\Users\user\Desktop\Client.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\Client.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: Client.exeBinary or memory string: vmware
                Source: Client.exe, 00000000.00000002.3366342123.00000000054B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_01862D4C CheckRemoteDebuggerPresent,0_2_01862D4C
                Source: C:\Users\user\Desktop\Client.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\Client.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Client.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\Client.exeQueries volume information: C:\Users\user\Desktop\Client.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Client.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: Yara matchFile source: Client.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.Client.exe.c40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3365364432.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Client.exe PID: 3300, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                4
                Virtualization/Sandbox Evasion
                OS Credential Dumping221
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory4
                Virtualization/Sandbox Evasion
                Remote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                DLL Side-Loading
                Security Account Manager23
                System Information Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Obfuscated Files or Information
                NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture11
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Client.exe74%VirustotalBrowse
                Client.exe87%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
                Client.exe100%AviraTR/Dropper.Gen
                Client.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                0.tcp.in.ngrok.io100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                0.tcp.in.ngrok.io
                35.154.189.194
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  0.tcp.in.ngrok.iotrue
                  • Avira URL Cloud: malware
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  35.154.189.194
                  0.tcp.in.ngrok.ioUnited States
                  16509AMAZON-02UStrue
                  13.202.226.61
                  unknownUnited States
                  7018ATT-INTERNET4USfalse
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1587363
                  Start date and time:2025-01-10 09:20:08 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 3m 55s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Client.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@1/0@2/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 5
                  • Number of non-executed functions: 1
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212, 172.202.163.200
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  No simulations
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  0.tcp.in.ngrok.ioCV.vbsGet hashmaliciousXmrigBrowse
                  • 3.6.115.64
                  RobloxCheats.exeGet hashmaliciousUnknownBrowse
                  • 3.6.98.232
                  kuEfaZxkiY.exeGet hashmaliciousRedLineBrowse
                  • 3.6.115.182
                  ae6T8jJueq.exeGet hashmaliciousNjratBrowse
                  • 3.6.115.64
                  nOZ2Oqnzbz.exeGet hashmaliciousNjratBrowse
                  • 3.6.115.64
                  iR2UtZj5vP.exeGet hashmaliciousNjratBrowse
                  • 3.6.122.107
                  ZB7Ot9MOic.exeGet hashmaliciousNjratBrowse
                  • 3.6.30.85
                  etJZk4UQhS.exeGet hashmaliciousNjratBrowse
                  • 3.6.122.107
                  jango.exeGet hashmaliciousXWormBrowse
                  • 3.6.30.85
                  cracksetup.exeGet hashmaliciousNanocoreBrowse
                  • 3.6.98.232
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ATT-INTERNET4US5.elfGet hashmaliciousUnknownBrowse
                  • 99.38.217.117
                  3.elfGet hashmaliciousUnknownBrowse
                  • 99.131.30.169
                  5.elfGet hashmaliciousUnknownBrowse
                  • 104.56.59.108
                  5.elfGet hashmaliciousUnknownBrowse
                  • 67.115.121.134
                  6.elfGet hashmaliciousUnknownBrowse
                  • 99.35.249.8
                  armv4l.elfGet hashmaliciousUnknownBrowse
                  • 12.189.0.235
                  armv6l.elfGet hashmaliciousUnknownBrowse
                  • 108.255.169.76
                  armv5l.elfGet hashmaliciousUnknownBrowse
                  • 107.194.28.41
                  https://rachelfix-enum.staging-homes.rewiringamerica.org/Get hashmaliciousUnknownBrowse
                  • 98.98.135.24
                  3.elfGet hashmaliciousUnknownBrowse
                  • 76.254.108.205
                  AMAZON-02US1162-201.exeGet hashmaliciousFormBookBrowse
                  • 76.223.67.189
                  https://cdn.btmessage.com/Get hashmaliciousHTMLPhisherBrowse
                  • 52.211.89.170
                  3.elfGet hashmaliciousUnknownBrowse
                  • 18.151.37.43
                  http://www.jmclmedia.phGet hashmaliciousUnknownBrowse
                  • 13.32.121.98
                  5.elfGet hashmaliciousUnknownBrowse
                  • 34.248.106.44
                  6.elfGet hashmaliciousUnknownBrowse
                  • 13.213.186.124
                  https://ik.imagekit.io/nrof2h909/Sherman%20Pruitt,%20Chief%20of%20Police,%20MSCJ.pdf?updatedAt=1736444487005Get hashmaliciousUnknownBrowse
                  • 65.9.66.13
                  armv6l.elfGet hashmaliciousUnknownBrowse
                  • 3.65.161.32
                  https://paybxss.716as7qy3nzyy2eo1omfskt9q0wrkj88.oastify.com/Get hashmaliciousUnknownBrowse
                  • 3.248.33.252
                  https://rachelfix-enum.staging-homes.rewiringamerica.org/Get hashmaliciousUnknownBrowse
                  • 18.245.86.4
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):5.44725937896768
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:Client.exe
                  File size:46'080 bytes
                  MD5:b6811a1daca8cfda16da0f730c174133
                  SHA1:92d67d3836def51f5a45389692292b2998a0c559
                  SHA256:d5619e740a38ee0c894dd17051419306c4b35ad55a1558854ed82527a4aa736c
                  SHA512:c1fe4b8edc38eef9ce12ae56f7874690b50519b12560620766c7e0b9f6a8cf1f9d00f648f6fa15b328320435e013bccae2dd2195985d8121ffc3c16b521b857d
                  SSDEEP:768:9ujY21TUET1/WUT1V9mo2qz4KjPGaG6PIyzjbFgX3iaIqH5jdrK9APGuU2BDZzx:9ujY21TU0r21KTkDy3bCXSeHrKqPfdzx
                  TLSH:6C232B003BE9812BF2BE8FB859F26145857AF6A33603D6491CC451D74B13FC69A426FE
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....-e................................. ........@.. ....................... ............@................................
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x40c72e
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x652DADE5 [Mon Oct 16 21:40:53 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc6dc0x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x7ff.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xa7340xa800e86074d5096089595a507d8316cbfea6False0.4995814732142857data5.502467597701495IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0xe0000x7ff0x8000f68ce4dd77ed0bb9c1e6b31f6995d94False0.41748046875data4.88506844918463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x100000xc0x20052e47f744a136ff1d37b341562dee345False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0xe0a00x2ccdata0.43575418994413406
                  RT_MANIFEST0xe36c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 10, 2025 09:21:06.529690981 CET4971010147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:06.534517050 CET101474971035.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:06.534599066 CET4971010147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:06.548561096 CET4971010147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:06.553401947 CET101474971035.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:08.511086941 CET101474971035.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:08.511199951 CET4971010147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:13.531625986 CET4971010147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:13.532346964 CET4973710147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:13.536427021 CET101474971035.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:13.537132025 CET101474973735.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:13.537214994 CET4973710147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:13.537472010 CET4973710147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:13.542220116 CET101474973735.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:15.540848970 CET101474973735.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:15.541054964 CET4973710147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:20.545392036 CET4973710147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:20.546441078 CET4978810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:20.550307989 CET101474973735.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:20.551256895 CET101474978835.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:20.551352024 CET4978810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:20.554559946 CET4978810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:20.559305906 CET101474978835.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:22.534452915 CET101474978835.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:22.534534931 CET4978810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:23.380961895 CET5683953192.168.2.61.1.1.1
                  Jan 10, 2025 09:21:23.385740995 CET53568391.1.1.1192.168.2.6
                  Jan 10, 2025 09:21:23.385803938 CET5683953192.168.2.61.1.1.1
                  Jan 10, 2025 09:21:23.390590906 CET53568391.1.1.1192.168.2.6
                  Jan 10, 2025 09:21:23.829401016 CET5683953192.168.2.61.1.1.1
                  Jan 10, 2025 09:21:23.834428072 CET53568391.1.1.1192.168.2.6
                  Jan 10, 2025 09:21:23.834481001 CET5683953192.168.2.61.1.1.1
                  Jan 10, 2025 09:21:27.545145988 CET4978810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:27.546076059 CET5686810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:27.549992085 CET101474978835.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:27.550896883 CET101475686835.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:27.550982952 CET5686810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:27.551214933 CET5686810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:27.555986881 CET101475686835.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:29.518553019 CET101475686835.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:29.518632889 CET5686810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:34.529583931 CET5686810147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:34.530606985 CET5691410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:34.534409046 CET101475686835.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:34.535451889 CET101475691435.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:34.535547018 CET5691410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:34.535856962 CET5691410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:34.540685892 CET101475691435.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:36.504386902 CET101475691435.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:36.504455090 CET5691410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:41.517461061 CET5691410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:41.518214941 CET5696110147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:41.522447109 CET101475691435.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:41.522953033 CET101475696135.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:41.523037910 CET5696110147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:41.523317099 CET5696110147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:41.528115988 CET101475696135.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:43.502646923 CET101475696135.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:43.502762079 CET5696110147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:48.513797045 CET5696110147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:48.514578104 CET5700310147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:48.518631935 CET101475696135.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:48.519416094 CET101475700335.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:48.519494057 CET5700310147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:48.519763947 CET5700310147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:48.524547100 CET101475700335.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:50.503544092 CET101475700335.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:50.503599882 CET5700310147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:55.513854980 CET5700310147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:55.514570951 CET5702210147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:55.519434929 CET101475700335.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:55.519556999 CET101475702235.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:55.519618034 CET5702210147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:55.519891024 CET5702210147192.168.2.635.154.189.194
                  Jan 10, 2025 09:21:55.524641991 CET101475702235.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:57.484467983 CET101475702235.154.189.194192.168.2.6
                  Jan 10, 2025 09:21:57.484546900 CET5702210147192.168.2.635.154.189.194
                  Jan 10, 2025 09:22:02.499814034 CET5702210147192.168.2.635.154.189.194
                  Jan 10, 2025 09:22:02.501030922 CET5702410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:22:02.504697084 CET101475702235.154.189.194192.168.2.6
                  Jan 10, 2025 09:22:02.505960941 CET101475702435.154.189.194192.168.2.6
                  Jan 10, 2025 09:22:02.506066084 CET5702410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:22:02.506342888 CET5702410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:22:02.511185884 CET101475702435.154.189.194192.168.2.6
                  Jan 10, 2025 09:22:04.485274076 CET101475702435.154.189.194192.168.2.6
                  Jan 10, 2025 09:22:04.485333920 CET5702410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:22:09.498575926 CET5702410147192.168.2.635.154.189.194
                  Jan 10, 2025 09:22:09.503674984 CET101475702435.154.189.194192.168.2.6
                  Jan 10, 2025 09:22:09.522717953 CET5702510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:09.527863026 CET101475702513.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:09.527956963 CET5702510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:09.528253078 CET5702510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:09.533073902 CET101475702513.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:11.500252008 CET101475702513.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:11.500374079 CET5702510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:16.513789892 CET5702510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:16.514595985 CET5702710147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:16.519658089 CET101475702513.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:16.519710064 CET101475702713.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:16.519788027 CET5702710147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:16.520155907 CET5702710147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:16.527991056 CET101475702713.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:18.486495018 CET101475702713.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:18.486623049 CET5702710147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:23.498126030 CET5702710147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:23.503169060 CET101475702713.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:23.507267952 CET5702910147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:23.512208939 CET101475702913.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:23.512274981 CET5702910147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:23.512916088 CET5702910147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:23.518424988 CET101475702913.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:25.487967014 CET101475702913.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:25.488039017 CET5702910147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:30.498311996 CET5702910147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:30.499001980 CET5703010147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:30.503367901 CET101475702913.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:30.503987074 CET101475703013.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:30.504075050 CET5703010147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:30.505161047 CET5703010147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:30.509937048 CET101475703013.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:32.469597101 CET101475703013.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:32.469810009 CET5703010147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:37.482429028 CET5703010147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:37.483293056 CET5703110147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:37.487308979 CET101475703013.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:37.488116026 CET101475703113.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:37.488188028 CET5703110147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:37.488564968 CET5703110147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:37.493364096 CET101475703113.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:39.458899975 CET101475703113.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:39.458966970 CET5703110147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:44.466816902 CET5703110147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:44.467978001 CET5703310147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:44.471730947 CET101475703113.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:44.472771883 CET101475703313.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:44.472863913 CET5703310147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:44.473213911 CET5703310147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:44.477987051 CET101475703313.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:46.421953917 CET101475703313.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:46.422154903 CET5703310147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:51.438941002 CET5703310147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:51.439467907 CET5703410147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:51.443846941 CET101475703313.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:51.444287062 CET101475703413.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:51.444364071 CET5703410147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:51.444612980 CET5703410147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:51.449362040 CET101475703413.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:53.408312082 CET101475703413.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:53.408416986 CET5703410147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:58.420114994 CET5703410147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:58.420742989 CET5703510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:58.425056934 CET101475703413.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:58.425580978 CET101475703513.202.226.61192.168.2.6
                  Jan 10, 2025 09:22:58.425693035 CET5703510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:58.425923109 CET5703510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:22:58.430663109 CET101475703513.202.226.61192.168.2.6
                  Jan 10, 2025 09:23:00.391057968 CET101475703513.202.226.61192.168.2.6
                  Jan 10, 2025 09:23:00.391175032 CET5703510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:23:05.404448032 CET5703510147192.168.2.613.202.226.61
                  Jan 10, 2025 09:23:05.405242920 CET5703610147192.168.2.613.202.226.61
                  Jan 10, 2025 09:23:05.409420967 CET101475703513.202.226.61192.168.2.6
                  Jan 10, 2025 09:23:05.410079002 CET101475703613.202.226.61192.168.2.6
                  Jan 10, 2025 09:23:05.410311937 CET5703610147192.168.2.613.202.226.61
                  Jan 10, 2025 09:23:05.410676003 CET5703610147192.168.2.613.202.226.61
                  Jan 10, 2025 09:23:05.415498018 CET101475703613.202.226.61192.168.2.6
                  Jan 10, 2025 09:23:07.375261068 CET101475703613.202.226.61192.168.2.6
                  Jan 10, 2025 09:23:07.375370979 CET5703610147192.168.2.613.202.226.61
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 10, 2025 09:21:06.516405106 CET6428953192.168.2.61.1.1.1
                  Jan 10, 2025 09:21:06.527724028 CET53642891.1.1.1192.168.2.6
                  Jan 10, 2025 09:21:23.380461931 CET53504061.1.1.1192.168.2.6
                  Jan 10, 2025 09:22:09.499696970 CET6271553192.168.2.61.1.1.1
                  Jan 10, 2025 09:22:09.521939039 CET53627151.1.1.1192.168.2.6
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jan 10, 2025 09:21:06.516405106 CET192.168.2.61.1.1.10xc03aStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                  Jan 10, 2025 09:22:09.499696970 CET192.168.2.61.1.1.10xa22dStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jan 10, 2025 09:21:06.527724028 CET1.1.1.1192.168.2.60xc03aNo error (0)0.tcp.in.ngrok.io35.154.189.194A (IP address)IN (0x0001)false
                  Jan 10, 2025 09:22:09.521939039 CET1.1.1.1192.168.2.60xa22dNo error (0)0.tcp.in.ngrok.io13.202.226.61A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:03:21:01
                  Start date:10/01/2025
                  Path:C:\Users\user\Desktop\Client.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Client.exe"
                  Imagebase:0xc40000
                  File size:46'080 bytes
                  MD5 hash:B6811A1DACA8CFDA16DA0F730C174133
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.2118306306.0000000000C42000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.3365364432.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:14.5%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:27.3%
                    Total number of Nodes:11
                    Total number of Limit Nodes:0
                    execution_graph 4317 18609a8 4318 18609a9 4317->4318 4319 1860a27 4318->4319 4321 18615b8 4318->4321 4322 18615d1 4321->4322 4323 18615db 4322->4323 4325 1865258 4322->4325 4323->4319 4326 1865277 4325->4326 4329 1862d4c 4326->4329 4330 18652b8 CheckRemoteDebuggerPresent 4329->4330 4332 186528a 4330->4332 4332->4323

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 137 1862d4c-186533c CheckRemoteDebuggerPresent 140 1865345-1865380 137->140 141 186533e-1865344 137->141 141->140
                    APIs
                    • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 0186532F
                    Memory Dump Source
                    • Source File: 00000000.00000002.3365143126.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1860000_Client.jbxd
                    Similarity
                    • API ID: CheckDebuggerPresentRemote
                    • String ID:
                    • API String ID: 3662101638-0
                    • Opcode ID: 06ab4e18cfef33508ba577f87122e5b46523ab4ce988ab1d5412c864d4912579
                    • Instruction ID: 85338d8a3f82a45e9cb96420d6464447af7d6ee9928bcf663e809183e8cb47e1
                    • Opcode Fuzzy Hash: 06ab4e18cfef33508ba577f87122e5b46523ab4ce988ab1d5412c864d4912579
                    • Instruction Fuzzy Hash: 822139B1801259CFDB10CF9AD4447EEBBF4EF49320F14846AE559A7240D778A944CF61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 275 1865b20-1865b32 277 1865b96-1865b9d 275->277 278 1865b34-1865b73 call 1865928 call 18606dc 275->278 287 1865b75-1865b87 278->287 288 1865b9e-1865bf6 278->288 294 1865b8e 287->294 298 1865bf8 288->298 299 1865bf9-1865c05 288->299 294->277 298->299 300 1865c07-1865c09 299->300 301 1865c0e-1865c1e 299->301 302 1865ead-1865eb4 300->302 303 1865c25-1865c35 301->303 304 1865c20 301->304 306 1865e94-1865ea2 303->306 307 1865c3b-1865c49 303->307 304->302 310 1865eb5-1865f2e 306->310 312 1865ea4-1865ea8 call 1864f38 306->312 307->310 311 1865c4f 307->311 311->310 313 1865d06-1865d27 311->313 314 1865e47-1865e62 call 18601c0 311->314 315 1865e64-1865e86 311->315 316 1865ce0-1865d01 311->316 317 1865dee-1865e14 311->317 318 1865d2c-1865d4d 311->318 319 1865dac-1865de9 311->319 320 1865c6d-1865c8e 311->320 321 1865e88-1865e92 311->321 322 1865c56-1865c68 311->322 323 1865d52-1865d7a 311->323 324 1865c93-1865cb5 311->324 325 1865d7f-1865da7 311->325 326 1865cba-1865cdb 311->326 327 1865e19-1865e45 311->327 312->302 313->302 314->302 315->302 316->302 317->302 318->302 319->302 320->302 321->302 322->302 323->302 324->302 325->302 326->302 327->302
                    Memory Dump Source
                    • Source File: 00000000.00000002.3365143126.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1860000_Client.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3657cef8f405898c88ce32cab1fdc33182d099335f7b858bb3797cf99c860994
                    • Instruction ID: b8e1e057c84946f1f64afa04602084201680d86830f8fba45ea699527a27be68
                    • Opcode Fuzzy Hash: 3657cef8f405898c88ce32cab1fdc33182d099335f7b858bb3797cf99c860994
                    • Instruction Fuzzy Hash: 13B1A434B042598FDB18AB79985467E7BF7BFC8750B05C86EE406DB388DE349D028792

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 380 1864088-18640ee 382 18640f0-18640fb 380->382 383 1864138-186413a 380->383 382->383 384 18640fd-1864109 382->384 385 186413c-1864155 383->385 386 186412c-1864136 384->386 387 186410b-1864115 384->387 392 1864157-1864163 385->392 393 18641a1-18641a3 385->393 386->385 388 1864117 387->388 389 1864119-1864128 387->389 388->389 389->389 391 186412a 389->391 391->386 392->393 394 1864165-1864171 392->394 395 18641a5-18641fd 393->395 396 1864194-186419f 394->396 397 1864173-186417d 394->397 404 1864247-1864249 395->404 405 18641ff-186420a 395->405 396->395 398 1864181-1864190 397->398 399 186417f 397->399 398->398 401 1864192 398->401 399->398 401->396 406 186424b-1864263 404->406 405->404 407 186420c-1864218 405->407 414 1864265-1864270 406->414 415 18642ad-18642af 406->415 408 186421a-1864224 407->408 409 186423b-1864245 407->409 410 1864226 408->410 411 1864228-1864237 408->411 409->406 410->411 411->411 413 1864239 411->413 413->409 414->415 417 1864272-186427e 414->417 416 18642b1-1864302 415->416 425 1864308-1864316 416->425 418 1864280-186428a 417->418 419 18642a1-18642ab 417->419 421 186428e-186429d 418->421 422 186428c 418->422 419->416 421->421 423 186429f 421->423 422->421 423->419 426 186431f-186437f 425->426 427 1864318-186431e 425->427 434 1864381-1864385 426->434 435 186438f-1864393 426->435 427->426 434->435 436 1864387 434->436 437 1864395-1864399 435->437 438 18643a3-18643a7 435->438 436->435 437->438 439 186439b 437->439 440 18643b7-18643bb 438->440 441 18643a9-18643ad 438->441 439->438 442 18643bd-18643c1 440->442 443 18643cb-18643cf 440->443 441->440 444 18643af-18643b2 call 1860418 441->444 442->443 445 18643c3-18643c6 call 1860418 442->445 446 18643d1-18643d5 443->446 447 18643df-18643e3 443->447 444->440 445->443 446->447 450 18643d7-18643da call 1860418 446->450 451 18643e5-18643e9 447->451 452 18643f3-18643f7 447->452 450->447 451->452 454 18643eb 451->454 455 1864407 452->455 456 18643f9-18643fd 452->456 454->452 458 1864408 455->458 456->455 457 18643ff 456->457 457->455 458->458
                    Memory Dump Source
                    • Source File: 00000000.00000002.3365143126.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1860000_Client.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 94a34f9718e73ca4fbacaf1dc4e289f8b7b8e980b4edded67705142c372d95e9
                    • Instruction ID: 9e80e36d691fe8ad3fe313ed468c2e31e1c7a53e4471d6167af741c7409d82b5
                    • Opcode Fuzzy Hash: 94a34f9718e73ca4fbacaf1dc4e289f8b7b8e980b4edded67705142c372d95e9
                    • Instruction Fuzzy Hash: 58B16E70E00609CFDB14CFA9C985BAEBBF6BF88714F248129D815EB354EB749945CB81

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 538 1864958-18649be 540 18649c0-18649cb 538->540 541 1864a08-1864a0a 538->541 540->541 542 18649cd-18649d9 540->542 543 1864a0c-1864a25 541->543 544 18649fc-1864a06 542->544 545 18649db-18649e5 542->545 550 1864a27-1864a33 543->550 551 1864a71-1864a73 543->551 544->543 546 18649e7 545->546 547 18649e9-18649f8 545->547 546->547 547->547 549 18649fa 547->549 549->544 550->551 553 1864a35-1864a41 550->553 552 1864a75-1864a8d 551->552 560 1864ad7-1864ad9 552->560 561 1864a8f-1864a9a 552->561 554 1864a64-1864a6f 553->554 555 1864a43-1864a4d 553->555 554->552 556 1864a51-1864a60 555->556 557 1864a4f 555->557 556->556 559 1864a62 556->559 557->556 559->554 562 1864adb-1864af3 560->562 561->560 563 1864a9c-1864aa8 561->563 569 1864af5-1864b00 562->569 570 1864b3d-1864b3f 562->570 564 1864aaa-1864ab4 563->564 565 1864acb-1864ad5 563->565 567 1864ab6 564->567 568 1864ab8-1864ac7 564->568 565->562 567->568 568->568 571 1864ac9 568->571 569->570 572 1864b02-1864b0e 569->572 573 1864b41-1864bb4 570->573 571->565 574 1864b10-1864b1a 572->574 575 1864b31-1864b3b 572->575 582 1864bba-1864bc8 573->582 576 1864b1e-1864b2d 574->576 577 1864b1c 574->577 575->573 576->576 579 1864b2f 576->579 577->576 579->575 583 1864bd1-1864c31 582->583 584 1864bca-1864bd0 582->584 591 1864c33-1864c37 583->591 592 1864c41-1864c45 583->592 584->583 591->592 593 1864c39 591->593 594 1864c47-1864c4b 592->594 595 1864c55-1864c59 592->595 593->592 594->595 596 1864c4d 594->596 597 1864c5b-1864c5f 595->597 598 1864c69-1864c6d 595->598 596->595 597->598 599 1864c61 597->599 600 1864c6f-1864c73 598->600 601 1864c7d-1864c81 598->601 599->598 600->601 602 1864c75 600->602 603 1864c83-1864c87 601->603 604 1864c91-1864c95 601->604 602->601 603->604 605 1864c89-1864c8c call 1860418 603->605 606 1864c97-1864c9b 604->606 607 1864ca5 604->607 605->604 606->607 609 1864c9d-1864ca0 call 1860418 606->609 611 1864ca6 607->611 609->607 611->611
                    Memory Dump Source
                    • Source File: 00000000.00000002.3365143126.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1860000_Client.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3b9944255a30f0e049f31aaf522d569ef0410ae1d9f0c03fe60a611477fb683f
                    • Instruction ID: 05b8157fc37e3fb471177c51d6ef5e397c0de2257c416bb9a528dff7d394ca35
                    • Opcode Fuzzy Hash: 3b9944255a30f0e049f31aaf522d569ef0410ae1d9f0c03fe60a611477fb683f
                    • Instruction Fuzzy Hash: 35B18C70E00209DFEB14CFA9C8817ADBBF6BF88714F248129D815E7398EB749945CB85

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 144 18652b0-186533c CheckRemoteDebuggerPresent 146 1865345-1865380 144->146 147 186533e-1865344 144->147 147->146
                    APIs
                    • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 0186532F
                    Memory Dump Source
                    • Source File: 00000000.00000002.3365143126.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1860000_Client.jbxd
                    Similarity
                    • API ID: CheckDebuggerPresentRemote
                    • String ID:
                    • API String ID: 3662101638-0
                    • Opcode ID: 9680b84bd48d60ddcc561919f3676d3d57f7f3c360e91772f88eed1268ecb51d
                    • Instruction ID: 92d5145c67d4b82e37318cc70c6c677178a0a045a3ed0cd7cc38061452e3e849
                    • Opcode Fuzzy Hash: 9680b84bd48d60ddcc561919f3676d3d57f7f3c360e91772f88eed1268ecb51d
                    • Instruction Fuzzy Hash: 262139B1C00259CFDB10CF9AD4847EEBBF4BF49320F24846AE855A3250D7789944CF61
                    Memory Dump Source
                    • Source File: 00000000.00000002.3365143126.0000000001860000.00000040.00000800.00020000.00000000.sdmp, Offset: 01860000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1860000_Client.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aa10e50b7f1c9a974ba64d9937f28ded87f7aa1c1ac67d797282f564eb1c9132
                    • Instruction ID: d739a306050568ad336e3500d27d1f5accb57501d802dd17adf4e0a600107a99
                    • Opcode Fuzzy Hash: aa10e50b7f1c9a974ba64d9937f28ded87f7aa1c1ac67d797282f564eb1c9132
                    • Instruction Fuzzy Hash: F0918E70E00249CFDF10CFA9D9857AEBBF6BF88314F148529E809E7294EB749945CB91