Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NUGMrDcg4v.exe

Overview

General Information

Sample name:NUGMrDcg4v.exe
renamed because original name is a hash value
Original sample name:7fdbb9aa555c42d32185cbdc7059b1523278212d0afb365c6d81abcbc545d047.exe
Analysis ID:1588373
MD5:a17417ef2831452553847ca8b9a934cb
SHA1:09e726bb76d1932df35569d1d3e2c614b2ba7bfc
SHA256:7fdbb9aa555c42d32185cbdc7059b1523278212d0afb365c6d81abcbc545d047
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • NUGMrDcg4v.exe (PID: 7816 cmdline: "C:\Users\user\Desktop\NUGMrDcg4v.exe" MD5: A17417EF2831452553847CA8B9A934CB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.solucionesmexico.mx", "Username": "mynewfile@solucionesmexico.mx", "Password": "dGG^ZYIxX5!B"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x3454f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x345c1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x3464b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x346dd:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x34747:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x347b9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x3484f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x348df:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
        • 0x31739:$s2: GetPrivateProfileString
        • 0x30d82:$s3: get_OSFullName
        • 0x32418:$s5: remove_Key
        • 0x325f2:$s5: remove_Key
        • 0x33564:$s6: FtpWebRequest
        • 0x34531:$s7: logins
        • 0x34aa3:$s7: logins
        • 0x377b4:$s7: logins
        • 0x37866:$s7: logins
        • 0x391b9:$s7: logins
        • 0x38400:$s9: 1.85 (Hash, version 2, native byte-order)
        Click to see the 6 entries
        SourceRuleDescriptionAuthorStrings
        0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x3454f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x345c1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3464b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x346dd:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x34747:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x347b9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x3484f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x348df:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
              • 0x31739:$s2: GetPrivateProfileString
              • 0x30d82:$s3: get_OSFullName
              • 0x32418:$s5: remove_Key
              • 0x325f2:$s5: remove_Key
              • 0x33564:$s6: FtpWebRequest
              • 0x34531:$s7: logins
              • 0x34aa3:$s7: logins
              • 0x377b4:$s7: logins
              • 0x37866:$s7: logins
              • 0x391b9:$s7: logins
              • 0x38400:$s9: 1.85 (Hash, version 2, native byte-order)
              Click to see the 22 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: NUGMrDcg4v.exeAvira: detected
              Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.solucionesmexico.mx", "Username": "mynewfile@solucionesmexico.mx", "Password": "dGG^ZYIxX5!B"}
              Source: NUGMrDcg4v.exeReversingLabs: Detection: 71%
              Source: NUGMrDcg4v.exeVirustotal: Detection: 75%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: NUGMrDcg4v.exeJoe Sandbox ML: detected
              Source: NUGMrDcg4v.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: NUGMrDcg4v.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: unknownDNS query: name: ip-api.com
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: NUGMrDcg4v.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
              Source: NUGMrDcg4v.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
              Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003081000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000313C000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003158000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
              Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003081000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000313C000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
              Source: NUGMrDcg4v.exeString found in binary or memory: http://localhost/calculator_server/requests.php
              Source: NUGMrDcg4v.exeString found in binary or memory: http://ocsp.comodoca.com0
              Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003081000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000313C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: NUGMrDcg4v.exe, 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
              Source: NUGMrDcg4v.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

              System Summary

              barindex
              Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_01713E280_2_01713E28
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_01716F900_2_01716F90
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0171DFB40_2_0171DFB4
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_05616CC80_2_05616CC8
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_056100400_2_05610040
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_056100060_2_05610006
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_05616C980_2_05616C98
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_07930E000_2_07930E00
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0793AC880_2_0793AC88
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0793B8A00_2_0793B8A0
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0793AFD00_2_0793AFD0
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_079347080_2_07934708
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_07933E980_2_07933E98
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_07933E880_2_07933E88
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_07935E300_2_07935E30
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_07930DF00_2_07930DF0
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_079342D00_2_079342D0
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_079359F80_2_079359F8
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0B10E3000_2_0B10E300
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0B106AC80_2_0B106AC8
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0B1090100_2_0B109010
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0B1000400_2_0B100040
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0B1089280_2_0B108928
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0B1039B90_2_0B1039B9
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0B1000070_2_0B100007
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_0B105CC80_2_0B105CC8
              Source: NUGMrDcg4v.exeStatic PE information: invalid certificate
              Source: NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004162000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs NUGMrDcg4v.exe
              Source: NUGMrDcg4v.exe, 00000000.00000002.2548328749.00000000078A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs NUGMrDcg4v.exe
              Source: NUGMrDcg4v.exe, 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename1d2b2f51-e841-4af2-8893-cf0c11544dea.exe0 vs NUGMrDcg4v.exe
              Source: NUGMrDcg4v.exe, 00000000.00000002.2547134145.0000000005B10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs NUGMrDcg4v.exe
              Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000318C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs NUGMrDcg4v.exe
              Source: NUGMrDcg4v.exe, 00000000.00000002.2543376911.000000000143E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs NUGMrDcg4v.exe
              Source: NUGMrDcg4v.exe, 00000000.00000000.1287254905.0000000000CE2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameehGbG.exe" vs NUGMrDcg4v.exe
              Source: NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1d2b2f51-e841-4af2-8893-cf0c11544dea.exe0 vs NUGMrDcg4v.exe
              Source: NUGMrDcg4v.exeBinary or memory string: OriginalFilenameehGbG.exe" vs NUGMrDcg4v.exe
              Source: NUGMrDcg4v.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: NUGMrDcg4v.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@1/1
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeMutant created: NULL
              Source: NUGMrDcg4v.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: NUGMrDcg4v.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003174000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003186000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: NUGMrDcg4v.exeReversingLabs: Detection: 71%
              Source: NUGMrDcg4v.exeVirustotal: Detection: 75%
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
              Source: NUGMrDcg4v.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: NUGMrDcg4v.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_01715E00 push eax; iretd 0_2_01715E09
              Source: NUGMrDcg4v.exeStatic PE information: section name: .text entropy: 7.7884153381917445
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: NUGMrDcg4v.exe PID: 7816, type: MEMORYSTR
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
              Source: NUGMrDcg4v.exe, 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003158000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.00000000030C7000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeMemory allocated: 16F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeMemory allocated: 3080000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeMemory allocated: 5080000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeMemory allocated: 8060000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeMemory allocated: 9060000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeMemory allocated: 9210000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeMemory allocated: A210000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.00000000030C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
              Source: NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMwareVBox
              Source: NUGMrDcg4v.exe, 00000000.00000002.2547764879.00000000062F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeCode function: 0_2_07939380 CheckRemoteDebuggerPresent,0_2_07939380
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeQueries volume information: C:\Users\user\Desktop\NUGMrDcg4v.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NUGMrDcg4v.exe PID: 7816, type: MEMORYSTR
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\NUGMrDcg4v.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2544569965.00000000030C7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NUGMrDcg4v.exe PID: 7816, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: NUGMrDcg4v.exe PID: 7816, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              24
              Virtualization/Sandbox Evasion
              1
              OS Credential Dumping
              531
              Security Software Discovery
              Remote Services1
              Email Collection
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Disable or Modify Tools
              LSASS Memory24
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
              Obfuscated Files or Information
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin Shares1
              Data from Local System
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
              Software Packing
              NTDS1
              System Network Configuration Discovery
              Distributed Component Object ModelInput Capture2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials34
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              NUGMrDcg4v.exe71%ReversingLabsByteCode-MSIL.Hacktool.Mimikatz
              NUGMrDcg4v.exe75%VirustotalBrowse
              NUGMrDcg4v.exe100%AviraHEUR/AGEN.1357257
              NUGMrDcg4v.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              ip-api.com
              208.95.112.1
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://ip-api.com/line/?fields=hostingfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://account.dyn.com/NUGMrDcg4v.exe, 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003081000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000313C000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/0NUGMrDcg4v.exefalse
                        high
                        http://localhost/calculator_server/requests.phpNUGMrDcg4v.exefalse
                          high
                          http://ip-api.comNUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003081000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000313C000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003158000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1588373
                            Start date and time:2025-01-11 01:30:15 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 44s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:NUGMrDcg4v.exe
                            renamed because original name is a hash value
                            Original Sample Name:7fdbb9aa555c42d32185cbdc7059b1523278212d0afb365c6d81abcbc545d047.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@1/0@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 34
                            • Number of non-executed functions: 11
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 184.28.90.27, 4.175.87.197
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            TimeTypeDescription
                            19:31:07API Interceptor2x Sleep call for process: NUGMrDcg4v.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            sDflTDPSLw.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.comLMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            sDflTDPSLw.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSLMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            sDflTDPSLw.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.784566897204724
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                            • Win32 Executable (generic) a (10002005/4) 49.93%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:NUGMrDcg4v.exe
                            File size:705'032 bytes
                            MD5:a17417ef2831452553847ca8b9a934cb
                            SHA1:09e726bb76d1932df35569d1d3e2c614b2ba7bfc
                            SHA256:7fdbb9aa555c42d32185cbdc7059b1523278212d0afb365c6d81abcbc545d047
                            SHA512:abadc517155bda890411574e089476363b9de4af819b8e7de2e80cad5385f599d581e396dd425276a3fed46fff5aa90887b806cec04aaac2971f2c0ce730c1f6
                            SSDEEP:12288:8PG/Ggc0nFGnCBC2ooxzk23EH+rCWpsQJYg1xuIA87ikR:q50nYCBC2oqzT3EHPQJLOIX7R
                            TLSH:E6E402A95A51DA03CA8157740BB1F2795BB82FDEB900D2279FEC7DEFB8A6F101C90141
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Rg..............0..t............... ........@.. ....................................@................................
                            Icon Hash:04852062591b5659
                            Entrypoint:0x4a932e
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x6752AB8C [Fri Dec 6 07:45:16 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Signature Valid:false
                            Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                            Signature Validation Error:The digital signature of the object did not verify
                            Error Number:-2146869232
                            Not Before, Not After
                            • 13/11/2018 01:00:00 09/11/2021 00:59:59
                            Subject Chain
                            • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                            Version:3
                            Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                            Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                            Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                            Serial:7C1118CBBADC95DA3752C46E47A27438
                            Instruction
                            jmp dword ptr [00402000h]
                            push ebx
                            add byte ptr [ecx+00h], bh
                            jnc 00007FE604CE4462h
                            je 00007FE604CE4462h
                            add byte ptr [ebp+00h], ch
                            add byte ptr [ecx+00h], al
                            arpl word ptr [eax], ax
                            je 00007FE604CE4462h
                            imul eax, dword ptr [eax], 00610076h
                            je 00007FE604CE4462h
                            outsd
                            add byte ptr [edx+00h], dh
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa92dc0x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x13bc.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0xa8c000x3608
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xa73540xa7400abe31950983995a41a9c4217831f8fdeFalse0.9319135953849028data7.7884153381917445IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xaa0000x13bc0x14000d8560284f742fbcb2f8906d5eb9fdf5False0.732421875data6.9438658117569405IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xac0000xc0x20040017c928d7dfd5ce4871ed537cc6a11False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xaa1000xd91PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8692772818888569
                            RT_GROUP_ICON0xaaea40x14data1.05
                            RT_VERSION0xaaec80x2f4data0.4312169312169312
                            RT_MANIFEST0xab1cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 01:31:09.418811083 CET4971680192.168.2.10208.95.112.1
                            Jan 11, 2025 01:31:09.423691034 CET8049716208.95.112.1192.168.2.10
                            Jan 11, 2025 01:31:09.423758984 CET4971680192.168.2.10208.95.112.1
                            Jan 11, 2025 01:31:09.424947023 CET4971680192.168.2.10208.95.112.1
                            Jan 11, 2025 01:31:09.429778099 CET8049716208.95.112.1192.168.2.10
                            Jan 11, 2025 01:31:09.882195950 CET8049716208.95.112.1192.168.2.10
                            Jan 11, 2025 01:31:09.930608988 CET4971680192.168.2.10208.95.112.1
                            Jan 11, 2025 01:32:01.615937948 CET8049716208.95.112.1192.168.2.10
                            Jan 11, 2025 01:32:01.615998983 CET4971680192.168.2.10208.95.112.1
                            Jan 11, 2025 01:32:49.901407957 CET4971680192.168.2.10208.95.112.1
                            Jan 11, 2025 01:32:49.906274080 CET8049716208.95.112.1192.168.2.10
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 01:31:09.402955055 CET5427853192.168.2.101.1.1.1
                            Jan 11, 2025 01:31:09.410446882 CET53542781.1.1.1192.168.2.10
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 11, 2025 01:31:09.402955055 CET192.168.2.101.1.1.10xf58Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 11, 2025 01:31:09.410446882 CET1.1.1.1192.168.2.100xf58No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.1049716208.95.112.1807816C:\Users\user\Desktop\NUGMrDcg4v.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 01:31:09.424947023 CET80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Jan 11, 2025 01:31:09.882195950 CET175INHTTP/1.1 200 OK
                            Date: Sat, 11 Jan 2025 00:31:09 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 6
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 66 61 6c 73 65 0a
                            Data Ascii: false


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:19:31:07
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\NUGMrDcg4v.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\NUGMrDcg4v.exe"
                            Imagebase:0xce0000
                            File size:705'032 bytes
                            MD5 hash:A17417EF2831452553847CA8B9A934CB
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2544569965.00000000030C7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:11.5%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:16.8%
                              Total number of Nodes:250
                              Total number of Limit Nodes:11
                              execution_graph 45811 171d460 45812 171d4a6 45811->45812 45816 171d640 45812->45816 45819 171d62f 45812->45819 45813 171d593 45822 171b0b4 45816->45822 45820 171d66e 45819->45820 45821 171b0b4 DuplicateHandle 45819->45821 45820->45813 45821->45820 45823 171d6a8 DuplicateHandle 45822->45823 45824 171d66e 45823->45824 45824->45813 45825 1714668 45826 171467a 45825->45826 45827 1714686 45826->45827 45831 1714778 45826->45831 45836 1713e28 45827->45836 45829 17146a5 45832 171479d 45831->45832 45840 1714878 45832->45840 45844 1714888 45832->45844 45837 1713e33 45836->45837 45852 1715d1c 45837->45852 45839 1716ffb 45839->45829 45842 1714888 45840->45842 45841 171498c 45841->45841 45842->45841 45848 17144b0 45842->45848 45846 17148af 45844->45846 45845 171498c 45845->45845 45846->45845 45847 17144b0 CreateActCtxA 45846->45847 45847->45845 45849 1715918 CreateActCtxA 45848->45849 45851 17159db 45849->45851 45851->45851 45853 1715d27 45852->45853 45856 1715d3c 45853->45856 45855 17172b5 45855->45839 45857 1715d47 45856->45857 45860 1715d6c 45857->45860 45859 171739a 45859->45855 45861 1715d77 45860->45861 45864 1715d9c 45861->45864 45863 171748d 45863->45859 45867 1715da7 45864->45867 45865 17189eb 45866 1718a29 45865->45866 45875 171cd81 45865->45875 45886 171cd90 45865->45886 45866->45863 45867->45865 45871 171ac90 45867->45871 45897 171b0c1 45871->45897 45900 171b0d0 45871->45900 45872 171aca6 45872->45865 45876 171cdb1 45875->45876 45877 171cdd5 45876->45877 45908 171d311 45876->45908 45912 171d30d 45876->45912 45916 171d348 45876->45916 45920 171d309 45876->45920 45924 171d339 45876->45924 45928 171d305 45876->45928 45932 171d3a0 45876->45932 45937 171d301 45876->45937 45877->45866 45887 171cdb1 45886->45887 45888 171cdd5 45887->45888 45889 171d311 GetModuleHandleW 45887->45889 45890 171d301 GetModuleHandleW 45887->45890 45891 171d3a0 GetModuleHandleW 45887->45891 45892 171d305 GetModuleHandleW 45887->45892 45893 171d339 GetModuleHandleW 45887->45893 45894 171d309 GetModuleHandleW 45887->45894 45895 171d348 GetModuleHandleW 45887->45895 45896 171d30d GetModuleHandleW 45887->45896 45888->45866 45889->45888 45890->45888 45891->45888 45892->45888 45893->45888 45894->45888 45895->45888 45896->45888 45898 171b0df 45897->45898 45903 171b1c8 45897->45903 45898->45872 45902 171b1c8 GetModuleHandleW 45900->45902 45901 171b0df 45901->45872 45902->45901 45904 171b1d9 45903->45904 45905 171b1fc 45903->45905 45904->45905 45906 171b400 GetModuleHandleW 45904->45906 45905->45898 45907 171b42d 45906->45907 45907->45898 45909 171d2f6 45908->45909 45910 171d38f 45909->45910 45941 171d170 45909->45941 45910->45877 45913 171d2f6 45912->45913 45914 171d38f 45913->45914 45915 171d170 GetModuleHandleW 45913->45915 45914->45877 45915->45914 45917 171d355 45916->45917 45918 171d38f 45917->45918 45919 171d170 GetModuleHandleW 45917->45919 45918->45877 45919->45918 45922 171d2f6 45920->45922 45921 171d38f 45921->45877 45922->45921 45923 171d170 GetModuleHandleW 45922->45923 45923->45921 45926 171d2f6 45924->45926 45925 171d38f 45925->45877 45926->45924 45926->45925 45927 171d170 GetModuleHandleW 45926->45927 45927->45925 45930 171d2f6 45928->45930 45929 171d38f 45929->45877 45930->45929 45931 171d170 GetModuleHandleW 45930->45931 45931->45929 45933 171d3d5 45932->45933 45934 171d360 45932->45934 45933->45877 45935 171d38f 45934->45935 45936 171d170 GetModuleHandleW 45934->45936 45935->45877 45936->45935 45939 171d2f6 45937->45939 45938 171d38f 45938->45877 45939->45938 45940 171d170 GetModuleHandleW 45939->45940 45940->45938 45942 171d17b 45941->45942 45944 171dca0 45942->45944 45945 171d28c 45942->45945 45944->45944 45946 171d297 45945->45946 45947 1715d9c GetModuleHandleW 45946->45947 45948 171dd0f 45947->45948 45948->45944 45949 5616cc8 45950 5616cf5 45949->45950 45987 5616974 45950->45987 45953 5616974 GetModuleHandleW 45954 5616d89 45953->45954 45955 5616974 GetModuleHandleW 45954->45955 45956 5616dbb 45955->45956 45957 5616974 GetModuleHandleW 45956->45957 45958 5616ded 45957->45958 45959 5616974 GetModuleHandleW 45958->45959 45960 5616e1f 45959->45960 45961 5616974 GetModuleHandleW 45960->45961 45962 5616e51 45961->45962 45963 5616974 GetModuleHandleW 45962->45963 45964 5616e83 45963->45964 45965 5616974 GetModuleHandleW 45964->45965 45966 5616eb5 45965->45966 45967 5616974 GetModuleHandleW 45966->45967 45968 5616ee7 45967->45968 45969 5616974 GetModuleHandleW 45968->45969 45970 5616f19 45969->45970 45991 5616984 45970->45991 45972 5616f4b 45973 5616974 GetModuleHandleW 45972->45973 45974 5616f7d 45973->45974 45975 5616974 GetModuleHandleW 45974->45975 45976 5616faf 45975->45976 45977 5616974 GetModuleHandleW 45976->45977 45978 5616fe1 45977->45978 45979 5616974 GetModuleHandleW 45978->45979 45980 5617013 45979->45980 45981 5616974 GetModuleHandleW 45980->45981 45982 5617045 45981->45982 45983 5616974 GetModuleHandleW 45982->45983 45984 5617077 45983->45984 45985 5616974 GetModuleHandleW 45984->45985 45986 56170a9 45985->45986 45988 561697f 45987->45988 45996 5616a64 45988->45996 45990 5616d57 45990->45953 45992 561698f 45991->45992 45994 1718728 GetModuleHandleW 45992->45994 45995 1715d9c GetModuleHandleW 45992->45995 45993 561999b 45993->45972 45994->45993 45995->45993 45997 5616a6f 45996->45997 46000 1715d9c GetModuleHandleW 45997->46000 46001 1718728 45997->46001 45998 561971c 45998->45990 46000->45998 46002 1718763 46001->46002 46004 17189eb 46002->46004 46005 171ac90 GetModuleHandleW 46002->46005 46003 1718a29 46003->45998 46004->46003 46006 171cd81 GetModuleHandleW 46004->46006 46007 171cd90 GetModuleHandleW 46004->46007 46005->46004 46006->46003 46007->46003 46008 165d01c 46009 165d034 46008->46009 46010 165d08e 46009->46010 46013 5612c08 46009->46013 46022 561113c 46009->46022 46014 5612c18 46013->46014 46015 5612c79 46014->46015 46017 5612c69 46014->46017 46047 5611264 46015->46047 46031 5612da0 46017->46031 46036 5612e6c 46017->46036 46042 5612d90 46017->46042 46018 5612c77 46023 5611147 46022->46023 46024 5612c79 46023->46024 46026 5612c69 46023->46026 46025 5611264 CallWindowProcW 46024->46025 46027 5612c77 46025->46027 46028 5612da0 CallWindowProcW 46026->46028 46029 5612d90 CallWindowProcW 46026->46029 46030 5612e6c CallWindowProcW 46026->46030 46028->46027 46029->46027 46030->46027 46033 5612db4 46031->46033 46032 5612e40 46032->46018 46051 5612e49 46033->46051 46055 5612e58 46033->46055 46037 5612e2a 46036->46037 46038 5612e7a 46036->46038 46040 5612e49 CallWindowProcW 46037->46040 46041 5612e58 CallWindowProcW 46037->46041 46039 5612e40 46039->46018 46040->46039 46041->46039 46044 5612da0 46042->46044 46043 5612e40 46043->46018 46045 5612e49 CallWindowProcW 46044->46045 46046 5612e58 CallWindowProcW 46044->46046 46045->46043 46046->46043 46048 561126f 46047->46048 46049 561435a CallWindowProcW 46048->46049 46050 5614309 46048->46050 46049->46050 46050->46018 46052 5612e58 46051->46052 46054 5612e69 46052->46054 46058 5614292 46052->46058 46054->46032 46056 5612e69 46055->46056 46057 5614292 CallWindowProcW 46055->46057 46056->46032 46057->46056 46059 5611264 CallWindowProcW 46058->46059 46060 56142aa 46059->46060 46060->46054 45750 7937bd8 45752 7937bde 45750->45752 45751 7937cab 45752->45751 45757 b10c250 45752->45757 45761 b10c260 45752->45761 45765 7938390 45752->45765 45769 7938380 45752->45769 45758 b10c260 45757->45758 45773 b1038fc 45758->45773 45762 b10c26f 45761->45762 45763 b1038fc OleInitialize 45762->45763 45764 b10c28f 45763->45764 45764->45752 45767 7938396 45765->45767 45766 79384ae 45766->45752 45767->45766 45794 793c53b 45767->45794 45771 7938396 45769->45771 45770 79384ae 45770->45752 45771->45770 45772 793c53b CheckRemoteDebuggerPresent 45771->45772 45772->45771 45775 b103907 45773->45775 45777 b10393c 45775->45777 45776 b10c354 45776->45776 45781 b103947 45777->45781 45778 b10c9d8 45782 b10c9f0 45778->45782 45783 b10c590 45778->45783 45779 b10c590 OleInitialize 45779->45778 45781->45778 45781->45779 45781->45782 45782->45776 45784 b10c59b 45783->45784 45785 b10d999 45784->45785 45787 b10c73c 45784->45787 45785->45782 45788 b10c747 45787->45788 45789 b10dcb3 45788->45789 45791 b10c758 45788->45791 45789->45785 45792 b10dce8 OleInitialize 45791->45792 45793 b10dd4c 45792->45793 45793->45789 45795 793c50d 45794->45795 45795->45794 45796 793c512 45795->45796 45799 793c598 45795->45799 45803 793c588 45795->45803 45796->45767 45800 793c5ae 45799->45800 45807 7939380 45800->45807 45804 793c5ae 45803->45804 45805 7939380 CheckRemoteDebuggerPresent 45804->45805 45806 793c5e1 45805->45806 45806->45795 45808 793c610 CheckRemoteDebuggerPresent 45807->45808 45810 793c5e1 45808->45810 45810->45795

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 5616c98-5616ca1 2 5616ca3-5616cb9 0->2 3 5616cfe-5616d0b 0->3 4 5616d1b-5616d2b 2->4 5 5616cbb-5616cf3 2->5 10 5616d12-5616d2b 3->10 9 5616d33-5616d3c 4->9 6 5616cf5 5->6 7 5616cfa-5616d0b 5->7 6->7 7->10 11 5616d46-5616d52 call 5616974 9->11 10->9 15 5616d57-5616f30 call 5616974 * 9 11->15 53 5616f3a-5616f46 call 5616984 15->53 55 5616f4b-56170ed call 5616974 * 7 53->55 86 56170f8-561710c call 5616994 55->86 88 5617111-56171aa call 56169a4 86->88 93 56171b4-56171c8 call 56169b4 88->93 95 56171cd-5617442 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 93->95 127 561744d-5617463 95->127 128 561746c-56174c5 127->128 132 56174d0-56174e6 128->132 133 56174f2-56174ff 132->133 134 5617501-561750d 133->134 135 5617529 133->135 136 5617517-561751d 134->136 137 561750f-5617515 134->137 138 561752f-5617537 135->138 139 5617527 136->139 137->139 140 561753d-561754d 138->140 139->138 141 5617554-5619228 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 56169f4 call 5616a04 call 5616a14 call 5616a24 140->141 142 561754f 140->142 451 561922d-5619247 141->451 142->141 452 561924d-561935c call 5616a24 * 7 451->452 472 5619361-561937b 452->472 473 5619381-5619564 call 5616a24 * 10 472->473 505 5619566-5619572 473->505 506 561958e 473->506 507 5619574-561957a 505->507 508 561957c-5619582 505->508 509 5619594-56195a6 call 5616a34 506->509 510 561958c 507->510 508->510 512 56195ab-5619627 call 5616a44 call 56169a4 509->512 510->509 518 561962c-5619641 call 5616a54 512->518 521 5619646-561964e 518->521
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2546797993.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5610000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: $2q
                              • API String ID: 0-3731487377
                              • Opcode ID: b3da8bc58be0ecb1a910419cf61462630011ef6033b5dd57f879b9b065d8fc4b
                              • Instruction ID: 3babb730e97156e8deffd3ad2e65753feea39c7d270182e84e5dc6187a017377
                              • Opcode Fuzzy Hash: b3da8bc58be0ecb1a910419cf61462630011ef6033b5dd57f879b9b065d8fc4b
                              • Instruction Fuzzy Hash: D2430674A11219CFDB25DF24C894BA9B3B5FF89300F1186E9E6096B361DB70AE85CF44

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 522 5616cc8-5616cf3 523 5616cf5 522->523 524 5616cfa-56174ff call 5616974 * 10 call 5616984 call 5616974 * 7 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 522->524 523->524 650 5617501-561750d 524->650 651 5617529 524->651 652 5617517-561751d 650->652 653 561750f-5617515 650->653 654 561752f-561754d 651->654 655 5617527 652->655 653->655 657 5617554-5619564 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 5616994 call 56169a4 call 56169b4 call 56169c4 call 56169d4 call 56169e4 call 56169f4 call 5616a04 call 5616a14 call 5616a24 * 18 654->657 658 561754f 654->658 655->654 1021 5619566-5619572 657->1021 1022 561958e 657->1022 658->657 1023 5619574-561957a 1021->1023 1024 561957c-5619582 1021->1024 1025 5619594-5619641 call 5616a34 call 5616a44 call 56169a4 call 5616a54 1022->1025 1026 561958c 1023->1026 1024->1026 1037 5619646-561964e 1025->1037 1026->1025
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2546797993.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5610000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID: $2q
                              • API String ID: 0-3731487377
                              • Opcode ID: 5c861af4a9e93fe53bbca9ad97c4ee625101a15dc4a68f321e1b678fda349829
                              • Instruction ID: 6b7ae7bcf1ff5a5ff0f18b0ea3da653c83a4193eeeccc2c3e0ce9f380e324030
                              • Opcode Fuzzy Hash: 5c861af4a9e93fe53bbca9ad97c4ee625101a15dc4a68f321e1b678fda349829
                              • Instruction Fuzzy Hash: E643F674A11219CFDB25DF24C894AA9B3B5FF89300F1186E9E6097B361DB70AE85CF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dc8c4d2793257661ff292dbae1c7a10fcab4dc9ae8b13e2261f948028be76135
                              • Instruction ID: 2785d1bb2d86b632123fe144a740779faaf624af2c21d6c0f9b8191a8580d7d1
                              • Opcode Fuzzy Hash: dc8c4d2793257661ff292dbae1c7a10fcab4dc9ae8b13e2261f948028be76135
                              • Instruction Fuzzy Hash: 5853D631D10B1A8ACB51EF68C8846A9F7B1FF99300F11D79AE45977121EF70AAD4CB81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0fd5c764a4ba75eaa742feda06a73850798e27ed975fbb0d95ed7765ee960ac6
                              • Instruction ID: 54b18b75f8e5f58bcd8272f84b271db4d86a47a9d21d82ad78dbb5582fe8c69b
                              • Opcode Fuzzy Hash: 0fd5c764a4ba75eaa742feda06a73850798e27ed975fbb0d95ed7765ee960ac6
                              • Instruction Fuzzy Hash: 6E231A31D10B198ADB11EF68C8946ADF7B1FF99300F50C79AE459B7261EB70AAC4CB41

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1957 7939380-793c694 CheckRemoteDebuggerPresent 1960 793c696-793c69c 1957->1960 1961 793c69d-793c6d8 1957->1961 1960->1961
                              APIs
                              • CheckRemoteDebuggerPresent.KERNEL32(00000000,?), ref: 0793C687
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: CheckDebuggerPresentRemote
                              • String ID:
                              • API String ID: 3662101638-0
                              • Opcode ID: c76e7913db98983b58ed3987c3c0dcaeaf5a287d877010749eafd9e3e4a56b66
                              • Instruction ID: 37e5932f1c99a50762c3c2c9612f7c38bc6d760d0ccba520264843d025d49f82
                              • Opcode Fuzzy Hash: c76e7913db98983b58ed3987c3c0dcaeaf5a287d877010749eafd9e3e4a56b66
                              • Instruction Fuzzy Hash: 262178B180075A8FCB14CF9AD484BEEBBF4EF49214F14842AE859B7241D378A944CFA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da7166951ec853ad2dcfcaa9fb2b0e633302ff0997aaff7a64e0de9b866a77d0
                              • Instruction ID: 42f8ce96f5572b1de373db4257a8b1eb1dda0c7a795d010fa3a4e63d73c42757
                              • Opcode Fuzzy Hash: da7166951ec853ad2dcfcaa9fb2b0e633302ff0997aaff7a64e0de9b866a77d0
                              • Instruction Fuzzy Hash: CDD2E731C10B5A8ACB51EB68C8845A9F7B1FF99300F15D79AE45877121EF70AAD4CF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 252e43c90adf5bab4f7b387f88247cdd4adb8609ef466d7a12bce1bc6fc1f3fc
                              • Instruction ID: 86cf79b4a05973ac1460df7ae0bb03a4db4a3c79e6ddf38f4f3236d6d41a712d
                              • Opcode Fuzzy Hash: 252e43c90adf5bab4f7b387f88247cdd4adb8609ef466d7a12bce1bc6fc1f3fc
                              • Instruction Fuzzy Hash: 90A20234A102048FDB24DB68C584B9DBBF2FB49315F5584A9E409EB3A5DBB5EC85CF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 041e9571a3e77a30fd38b45db0b22d6ff67be5355568edd1fc84f5c578e7b6f6
                              • Instruction ID: 6b65c63db8948967e95a2afe1bcda191e4f1f0f01e49d02012d5c5e42cecd0ff
                              • Opcode Fuzzy Hash: 041e9571a3e77a30fd38b45db0b22d6ff67be5355568edd1fc84f5c578e7b6f6
                              • Instruction Fuzzy Hash: AA322F30E10619CFDB25EF69C89069DB7B2FF99300F51C6A9D409A7294EF70AD85CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ecd85e1d25f275be5ca8e1f0c6aaa0449ab62c54bb31c1c6ea0261b887e0895f
                              • Instruction ID: dac883fa8c85f7f83d77b32d7789dbff1cfddca8f9a374260f257ba608287ada
                              • Opcode Fuzzy Hash: ecd85e1d25f275be5ca8e1f0c6aaa0449ab62c54bb31c1c6ea0261b887e0895f
                              • Instruction Fuzzy Hash: C4028E30B102158FDB14DB69D564AAEBBE2FF85350F148569D405DB382DFB5EC82CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f3c29db35da2461974802e1fb1cc638bd7398aeb851381b7c2535e4a8d062605
                              • Instruction ID: f36a459db26d36f429da5407c2cce7709dcef3f89c3cef9dd112a0f467fbc507
                              • Opcode Fuzzy Hash: f3c29db35da2461974802e1fb1cc638bd7398aeb851381b7c2535e4a8d062605
                              • Instruction Fuzzy Hash: A7F16E71E10209CFDB14DFA6C948B9DBBF1BF48304F258969E405AB2A5DBB4A945CF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b139425555faf958596be524b322f4edf5b6941a6670b9cbb6ac51f7dd53fe6
                              • Instruction ID: d68701780eee09e84fffcc80d80efd6040f7c9846cf4982985d2a845fa050bf9
                              • Opcode Fuzzy Hash: 9b139425555faf958596be524b322f4edf5b6941a6670b9cbb6ac51f7dd53fe6
                              • Instruction Fuzzy Hash: 74B170F0E0020ACFDB10CFA9D8957ADBBF6BF48318F148529D415E7254EB749845CB81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e6307cad36f38e81cdf63d730542d2c90dec2f6fe424aeeb233212eaa3f7cee0
                              • Instruction ID: d0fd658dbe8f95ac1309daf47055d9a7a9a4a92ce0d91e8ed9c39d3fb20ed3d0
                              • Opcode Fuzzy Hash: e6307cad36f38e81cdf63d730542d2c90dec2f6fe424aeeb233212eaa3f7cee0
                              • Instruction Fuzzy Hash: 8B916EB0E0020A9FDB14CFA9C98579EBBF6FF88318F14C529E455A7294EB749845CB41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2544201475.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1710000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 19fa57f08c71568ae97b69ad706d61ad9b88b7b509b53c1451a37dcac15d18ad
                              • Instruction ID: 875158c454fe3ff05944bd7912b678ee945636995c2b4d15cfe7ee463222c538
                              • Opcode Fuzzy Hash: 19fa57f08c71568ae97b69ad706d61ad9b88b7b509b53c1451a37dcac15d18ad
                              • Instruction Fuzzy Hash: 0D81C274E002189FDF08DFA9D994AEEBBB2FF88300F248129D415AB364DB755941CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2544201475.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1710000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 761917c304869540b85fcc4b10ad59938934723a8d3cd338ad67f65e8d9cc1a0
                              • Instruction ID: a546a92e202da649b7f733b3a2ec68a26258a454dcbfe519409e5ef3a84417e9
                              • Opcode Fuzzy Hash: 761917c304869540b85fcc4b10ad59938934723a8d3cd338ad67f65e8d9cc1a0
                              • Instruction Fuzzy Hash: 5781B174E012189FDF08DFA9D994AEEBBB2FF89300F248129D415AB364DA755941CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b3c0ce5b2af27e976477d0845a49dfc81c19a90da3731300847f74a54352c99e
                              • Instruction ID: a008064621fa5868420455d71cf1b2a84c3cade2afcd99914c187b70520cd48d
                              • Opcode Fuzzy Hash: b3c0ce5b2af27e976477d0845a49dfc81c19a90da3731300847f74a54352c99e
                              • Instruction Fuzzy Hash: 052115B1E046088BEB18CF6BD9053DEBBF7AFC9310F04C46AD408B6264EB7409458F90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a7b918c6423a26ae79c51d3372734aa87448fac54a635a47607c99d8a18d22f
                              • Instruction ID: c6128ea284525b8af8b4f0a70bf9277a54a4738246cde148b25914a503ab9b3e
                              • Opcode Fuzzy Hash: 0a7b918c6423a26ae79c51d3372734aa87448fac54a635a47607c99d8a18d22f
                              • Instruction Fuzzy Hash: 3C11C6B1E046188BEB18CF6BD9453DEFAF7AFC9304F04C56AD40976264EB7409468F90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1849 171b1c8-171b1d7 1850 171b203-171b207 1849->1850 1851 171b1d9-171b1e6 call 1719c38 1849->1851 1852 171b209-171b213 1850->1852 1853 171b21b-171b25c 1850->1853 1858 171b1e8 1851->1858 1859 171b1fc 1851->1859 1852->1853 1860 171b269-171b277 1853->1860 1861 171b25e-171b266 1853->1861 1904 171b1ee call 171b460 1858->1904 1905 171b1ee call 171b450 1858->1905 1859->1850 1862 171b279-171b27e 1860->1862 1863 171b29b-171b29d 1860->1863 1861->1860 1867 171b280-171b287 call 171ae80 1862->1867 1868 171b289 1862->1868 1866 171b2a0-171b2a7 1863->1866 1864 171b1f4-171b1f6 1864->1859 1865 171b338-171b3f8 1864->1865 1899 171b400-171b42b GetModuleHandleW 1865->1899 1900 171b3fa-171b3fd 1865->1900 1870 171b2b4-171b2bb 1866->1870 1871 171b2a9-171b2b1 1866->1871 1869 171b28b-171b299 1867->1869 1868->1869 1869->1866 1873 171b2c8-171b2d1 call 171ae90 1870->1873 1874 171b2bd-171b2c5 1870->1874 1871->1870 1880 171b2d3-171b2db 1873->1880 1881 171b2de-171b2e3 1873->1881 1874->1873 1880->1881 1882 171b301-171b30e 1881->1882 1883 171b2e5-171b2ec 1881->1883 1889 171b331-171b337 1882->1889 1890 171b310-171b32e 1882->1890 1883->1882 1885 171b2ee-171b2fe call 171aea0 call 171aeb0 1883->1885 1885->1882 1890->1889 1901 171b434-171b448 1899->1901 1902 171b42d-171b433 1899->1902 1900->1899 1902->1901 1904->1864 1905->1864
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0171B41E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2544201475.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1710000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: a1cb82f90776a787306464d5e5974664b949f6f1702463d4331a7b8baeff7f9a
                              • Instruction ID: ed21820512fc7662eef61b4b41157027a9c0f517dc7755ecd81a09d8e745c0db
                              • Opcode Fuzzy Hash: a1cb82f90776a787306464d5e5974664b949f6f1702463d4331a7b8baeff7f9a
                              • Instruction Fuzzy Hash: 6C714670A00B058FE724CF6ED44579ABBF1FF48214F008A2ED48AD7A54DB74E949CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1906 171590c-1715913 1907 1715918-17159d9 CreateActCtxA 1906->1907 1909 17159e2-1715a3c 1907->1909 1910 17159db-17159e1 1907->1910 1917 1715a4b-1715a4f 1909->1917 1918 1715a3e-1715a41 1909->1918 1910->1909 1919 1715a51-1715a5d 1917->1919 1920 1715a60 1917->1920 1918->1917 1919->1920 1922 1715a61 1920->1922 1922->1922
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 017159C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2544201475.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1710000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: e74ddcd81e2581c0ec07de08565a270a34bec664992a6899e1dee98ead304a10
                              • Instruction ID: 5616c49abc3e8b9939314b24d94f0d23e40314389b48e589a2c9d339b77484bd
                              • Opcode Fuzzy Hash: e74ddcd81e2581c0ec07de08565a270a34bec664992a6899e1dee98ead304a10
                              • Instruction Fuzzy Hash: D541C171C00719CBEB28DFA9C884BDEFBB5BF49304F24815AD408AB255DBB56945CF50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1923 5611264-56142fc 1926 5614302-5614307 1923->1926 1927 56143ac-56143cc call 561113c 1923->1927 1929 5614309-5614340 1926->1929 1930 561435a-5614392 CallWindowProcW 1926->1930 1934 56143cf-56143dc 1927->1934 1936 5614342-5614348 1929->1936 1937 5614349-5614358 1929->1937 1932 5614394-561439a 1930->1932 1933 561439b-56143aa 1930->1933 1932->1933 1933->1934 1936->1937 1937->1934
                              APIs
                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 05614381
                              Memory Dump Source
                              • Source File: 00000000.00000002.2546797993.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5610000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: CallProcWindow
                              • String ID:
                              • API String ID: 2714655100-0
                              • Opcode ID: e4f37138e35995a6b61360300ea70185714f28c703082d9610e356a123e95abd
                              • Instruction ID: ebbd87741d5af4d282d61b4b41e69a803a9d7caa6aa59f22182f39ff10a905f3
                              • Opcode Fuzzy Hash: e4f37138e35995a6b61360300ea70185714f28c703082d9610e356a123e95abd
                              • Instruction Fuzzy Hash: BE4149B59003098FCB14CF96C488BAEFBF5FF89311F288459E419AB321D734A841CBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1940 17144b0-17159d9 CreateActCtxA 1943 17159e2-1715a3c 1940->1943 1944 17159db-17159e1 1940->1944 1951 1715a4b-1715a4f 1943->1951 1952 1715a3e-1715a41 1943->1952 1944->1943 1953 1715a51-1715a5d 1951->1953 1954 1715a60 1951->1954 1952->1951 1953->1954 1956 1715a61 1954->1956 1956->1956
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 017159C9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2544201475.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1710000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 7b3acbc966430108a92c3a6144b9e127fc817344d5be15158cc73bb4cb728c61
                              • Instruction ID: e20c43acb8b3baca162bc33e8d7d3fac2ce96c97d501c6e7053ab8176ad0ec7e
                              • Opcode Fuzzy Hash: 7b3acbc966430108a92c3a6144b9e127fc817344d5be15158cc73bb4cb728c61
                              • Instruction Fuzzy Hash: 1D41B271C00719CBEB28DFA9C884B9EFBB5FF49304F60816AD408AB255DBB56945CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1964 793c608-793c694 CheckRemoteDebuggerPresent 1966 793c696-793c69c 1964->1966 1967 793c69d-793c6d8 1964->1967 1966->1967
                              APIs
                              • CheckRemoteDebuggerPresent.KERNEL32(00000000,?), ref: 0793C687
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: CheckDebuggerPresentRemote
                              • String ID:
                              • API String ID: 3662101638-0
                              • Opcode ID: e49952d77688abd8940b892498b7180a9e8f9109952cb5c0ab1a78d1a769e83c
                              • Instruction ID: b7bbef4bede6839e48fdfef0aeb49cb21f283a4d0d23d8928566fb509b7b7330
                              • Opcode Fuzzy Hash: e49952d77688abd8940b892498b7180a9e8f9109952cb5c0ab1a78d1a769e83c
                              • Instruction Fuzzy Hash: 682148B2C0075A8FCB14CF9AD5857EEBBF4AF49214F14842AE459B3241D378A944CF61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1970 171b0b4-171d73c DuplicateHandle 1972 171d745-171d762 1970->1972 1973 171d73e-171d744 1970->1973 1973->1972
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0171D66E,?,?,?,?,?), ref: 0171D72F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2544201475.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1710000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: c393ae0ccac495b4f65c474a5647ae4a22feafb6581d689e2ce464ec623211a4
                              • Instruction ID: e9173927c71368ca560b91285f207e7bdb43d641301a54152ce29d01a3d0de28
                              • Opcode Fuzzy Hash: c393ae0ccac495b4f65c474a5647ae4a22feafb6581d689e2ce464ec623211a4
                              • Instruction Fuzzy Hash: A021E6B5900349AFDB10CF9AD484ADEFBF4FB48310F54841AE918A7310D378A944CFA5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1976 171d6a1-171d73c DuplicateHandle 1977 171d745-171d762 1976->1977 1978 171d73e-171d744 1976->1978 1978->1977
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0171D66E,?,?,?,?,?), ref: 0171D72F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2544201475.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1710000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 2358e877e130b5909c5c5e769739d32c6640128b29ba88805749996085420bdf
                              • Instruction ID: dd72c07226532e79f0515a2c0296791bf191836eb108c2245b4f8d5194682f19
                              • Opcode Fuzzy Hash: 2358e877e130b5909c5c5e769739d32c6640128b29ba88805749996085420bdf
                              • Instruction Fuzzy Hash: E821B3B59003499FDB10CF99D984AEEBBF5EB48320F54841AE918A7350D378A944CF65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1981 171b3b8-171b3f8 1982 171b400-171b42b GetModuleHandleW 1981->1982 1983 171b3fa-171b3fd 1981->1983 1984 171b434-171b448 1982->1984 1985 171b42d-171b433 1982->1985 1983->1982 1985->1984
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0171B41E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2544201475.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1710000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: d861e3290ffec636beeb49e594255bb3460cd2d90506d0f728cbd18c27a3bd6b
                              • Instruction ID: cc7b364f3fced726ea368e83c26b701dac3761b1b4f9de4acced5f25df43a38a
                              • Opcode Fuzzy Hash: d861e3290ffec636beeb49e594255bb3460cd2d90506d0f728cbd18c27a3bd6b
                              • Instruction Fuzzy Hash: 141110B6C003498FDB24CF9AD444BDEFBF4EB88224F14842AD828A7214C379A545CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1987 b10c758-b10dd4a OleInitialize 1989 b10dd53-b10dd70 1987->1989 1990 b10dd4c-b10dd52 1987->1990 1990->1989
                              APIs
                              • OleInitialize.OLE32(00000000), ref: 0B10DD3D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: Initialize
                              • String ID:
                              • API String ID: 2538663250-0
                              • Opcode ID: 8023b1d30c93247fe29127a1d8d226eb7b94e74ba12b5177c5a8a2b58fae04c6
                              • Instruction ID: 3fad9bc7bad13b5143ce3fdbc6e2223e92be46118d582604fa8969a13125845e
                              • Opcode Fuzzy Hash: 8023b1d30c93247fe29127a1d8d226eb7b94e74ba12b5177c5a8a2b58fae04c6
                              • Instruction Fuzzy Hash: A21118B59003498FCB20DF9AD544BDEFBF4EB48310F108459D918A7240C7B4A944CFA5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1993 b10dce1-b10dce3 1994 b10dce8-b10dd4a OleInitialize 1993->1994 1995 b10dd53-b10dd70 1994->1995 1996 b10dd4c-b10dd52 1994->1996 1996->1995
                              APIs
                              • OleInitialize.OLE32(00000000), ref: 0B10DD3D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID: Initialize
                              • String ID:
                              • API String ID: 2538663250-0
                              • Opcode ID: 1c5801f5ca05d3973dfd15e9101d4adf55aca6e5f816975c64301c53ed3daf12
                              • Instruction ID: 98b541cca1a545b480d7c62472f8243b7c297ca04563e09ad64e1cdd67e625f4
                              • Opcode Fuzzy Hash: 1c5801f5ca05d3973dfd15e9101d4adf55aca6e5f816975c64301c53ed3daf12
                              • Instruction Fuzzy Hash: 411115B5D003498FCB20DF9AD845BDEFBF4EB48320F248569D518A7240D774A544CFA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2543814403.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_164d000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b6c1a7884c981bbc90e5a1e94542b55efab3ca201483e306431fd292b2408050
                              • Instruction ID: fd08b69c108db129f12f6bc60bf1e03a059e54ca0457155c825f26d8319391a0
                              • Opcode Fuzzy Hash: b6c1a7884c981bbc90e5a1e94542b55efab3ca201483e306431fd292b2408050
                              • Instruction Fuzzy Hash: 7A2128B5904204DFDB05DF54DDC0B5ABB65FBA4324F24C16DE90A0B356C33AE456CAA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2543884964.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_165d000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6f459af5d0abdbadc7a9c6055d2dc58ae5778ccfbaab7b054f683858636aed40
                              • Instruction ID: 28c901c816524091027660f338eb99896ec7c55d87aa54b32258e42e4175ecee
                              • Opcode Fuzzy Hash: 6f459af5d0abdbadc7a9c6055d2dc58ae5778ccfbaab7b054f683858636aed40
                              • Instruction Fuzzy Hash: 472122B1504300EFDB45DF94C9C0B26BBA1FB84324F24C56DEE0A4B386C376D846CA62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2543884964.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_165d000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1e74d5582a8a050dd66be0300173edb181ec14271af4f47dc034e10a7a55183d
                              • Instruction ID: dc0bc6d4d5cb1ca202546f05ebc158879642cffc51640fd64fad6b050d09df4a
                              • Opcode Fuzzy Hash: 1e74d5582a8a050dd66be0300173edb181ec14271af4f47dc034e10a7a55183d
                              • Instruction Fuzzy Hash: 32212FB1604300DFDB55DF64D8C0B26BBA1EB88324F24C56DEC0A4B386C33AD847CA62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2543884964.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_165d000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cada62b6f03a3efeb125db7ae30388dd2c983c7da5e9dccdce3e05e4bcfffefe
                              • Instruction ID: 3d65b332e810719ce991894538d5c275b3582dee10c7ebea86f64deb7404a2b5
                              • Opcode Fuzzy Hash: cada62b6f03a3efeb125db7ae30388dd2c983c7da5e9dccdce3e05e4bcfffefe
                              • Instruction Fuzzy Hash: 03218E755083809FDB03CF64D994B15BF71EB46214F28C5EAD8498F2A7C33A980ACB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2543814403.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_164d000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                              • Instruction ID: 8e9b1ecea3471da23c10af705a87d196ba5bbe059c7271b93c2648579c120dac
                              • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                              • Instruction Fuzzy Hash: 2611CD76804240DFDB12CF54D9C0B56BF71FB94224F2482A9D8090A656C33AE456CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2543884964.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_165d000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                              • Instruction ID: c7d1e6f87410f8c08ee618150bb5557f1cd04a786b01224f7b26cb37abae6200
                              • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                              • Instruction Fuzzy Hash: 5E11BB75504280DFDB12CF54C9C0B15BBB1FB84224F28C6AEDD494B796C33AD44ACB61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2543814403.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_164d000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7a4a0e7fcd4662799097a53034307e21e2540be23139626babac362f6cb3c771
                              • Instruction ID: fb37874dbb76c241b8610a6fe526cf2ee9fcbaa2160b6acf57beeba78b8ef51e
                              • Opcode Fuzzy Hash: 7a4a0e7fcd4662799097a53034307e21e2540be23139626babac362f6cb3c771
                              • Instruction Fuzzy Hash: 5E01F7718043809BF720DE55CD84B76BF98EF52234F18C55AED090B382D3799441CA71
                              Memory Dump Source
                              • Source File: 00000000.00000002.2543814403.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_164d000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1606adf366ba4aa4845ed9199de661eac821a51cdd67ab160e8efcda3c115333
                              • Instruction ID: 9001969b511c4c96ef8b7e06906e869d964fb8cc91365a5f3ce242de2fb2052b
                              • Opcode Fuzzy Hash: 1606adf366ba4aa4845ed9199de661eac821a51cdd67ab160e8efcda3c115333
                              • Instruction Fuzzy Hash: A5F04F714053849FE7248E19CD88B72FF98EB51634F18C55AED484B386C3799844CAA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2549111742.000000000B100000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B100000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b100000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4274bde7e2b3507ba55af66813eb6e268457b661f311012d375afe571f0d83ae
                              • Instruction ID: 5e8bba2733f6c9848da841972111cbc4f078330ac08a7261f50120e7872fa3eb
                              • Opcode Fuzzy Hash: 4274bde7e2b3507ba55af66813eb6e268457b661f311012d375afe571f0d83ae
                              • Instruction Fuzzy Hash: 78124B30A14219CFDB28DF69C954B9EB7B2BF89301F2085A9D40AAB395DF709D81CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2546797993.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5610000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: be11e49c41c9ae8f3abecd4af153394ee3beccf6a421e50b2ee2faaafb6a2f4c
                              • Instruction ID: adde28c892a42deed47522f65f7246fdeb5c4cbc55cdac30c66a257f77fc9b84
                              • Opcode Fuzzy Hash: be11e49c41c9ae8f3abecd4af153394ee3beccf6a421e50b2ee2faaafb6a2f4c
                              • Instruction Fuzzy Hash: 741277B04A27858AE710CF6DE95E1893F71BB45318FD0431AE2A15B2E1EFB4164EEF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2d8b8531664e35e20e90e69e8b2aa5ad76e09106badc926a25de538a59adb3e8
                              • Instruction ID: 567f4c5f342111a15c43ed27550987eb99585dadac0a79409f934f3ed4796fb6
                              • Opcode Fuzzy Hash: 2d8b8531664e35e20e90e69e8b2aa5ad76e09106badc926a25de538a59adb3e8
                              • Instruction Fuzzy Hash: ABE119B4E002598FDB14CFA9C580AAEFBB6FF89304F2481A9D455AB359D734AD41CF60
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8d3c1056564e2fbe34672ff5c3282ff76c470a0e127d2a89c524af755f61dcb0
                              • Instruction ID: 3db1fe7073f14352ca54cd7f6c1a06dab28013681a922ad06ab126133016b307
                              • Opcode Fuzzy Hash: 8d3c1056564e2fbe34672ff5c3282ff76c470a0e127d2a89c524af755f61dcb0
                              • Instruction Fuzzy Hash: BFE108B4E002598FDB14CFA9C580AAEBBF6FF89304F248169D455AB359D734AD41CFA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d8f3a8ba6d62321538cb1c8022bdf4eb36f94cdb414712bc5024aaaa288a50c3
                              • Instruction ID: beabd90516664d67e5a0ff4acee26a24764385980c2af1a7f96a96c8cecb7156
                              • Opcode Fuzzy Hash: d8f3a8ba6d62321538cb1c8022bdf4eb36f94cdb414712bc5024aaaa288a50c3
                              • Instruction Fuzzy Hash: 09E109B4E002198FDB14CFA9C580AAEFBB6FF89304F248169E455AB359D734AD41CF61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 603bede1edfafbeafd3d298624e6e4806845065c1de67d8ef092b9de9f0f1253
                              • Instruction ID: 1f02f13e9741487605a1d85f8f95d26ff914fefc53222f728ef2a90942502019
                              • Opcode Fuzzy Hash: 603bede1edfafbeafd3d298624e6e4806845065c1de67d8ef092b9de9f0f1253
                              • Instruction Fuzzy Hash: 2DE108B4E002598FDB14CFA9C580AAEBBF6FF89304F24816AD455AB359D734AD41CF60
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4b0349390bea364ce72ef9566e4c285db7bc8440133d844e8590dd667d49718a
                              • Instruction ID: 5e78553ccfd8e2d2f68221dc63a97fbeab573ce669a589a03b3b83bb219bce15
                              • Opcode Fuzzy Hash: 4b0349390bea364ce72ef9566e4c285db7bc8440133d844e8590dd667d49718a
                              • Instruction Fuzzy Hash: D6E1F9B4E002198FDB14CFA9C580AAEFBB6FF89304F248169D455AB359D735AD41CFA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0494a18fb420283e3b556f1b0a6b49c76f6aa539b52f2cde23e0ceea5aeb031a
                              • Instruction ID: 442bba55a0570a00d43247b8bcc853a7e510366d81e44831e2673ff41d88429e
                              • Opcode Fuzzy Hash: 0494a18fb420283e3b556f1b0a6b49c76f6aa539b52f2cde23e0ceea5aeb031a
                              • Instruction Fuzzy Hash: 93B151F0E0025ACFDB14CFA9D885BAEBBF6BF48318F148529D415AB254EB749841CB81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2544201475.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1710000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf4bb8cf9bcee569f1ded6703481b633cdc023c1b89e4cceff3ac2fd9ff90bb1
                              • Instruction ID: 1ab9e14d76b6db0eb662ed7d966ee86337e35304910ca0c71565da7c24d1a2be
                              • Opcode Fuzzy Hash: bf4bb8cf9bcee569f1ded6703481b633cdc023c1b89e4cceff3ac2fd9ff90bb1
                              • Instruction Fuzzy Hash: 49A14F32E002168FCF09DFB9C94459EFBB2FF85300B25456AE905AB269DF71D95ACB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2546797993.0000000005610000.00000040.00000800.00020000.00000000.sdmp, Offset: 05610000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5610000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 30486c0af850c573553422b4027315c46e347c9c34f462ea2dcc10fc3c4235eb
                              • Instruction ID: 153cbc5c916c6e998d043cf4d414e231af406994a608bf9a8c549625079d1905
                              • Opcode Fuzzy Hash: 30486c0af850c573553422b4027315c46e347c9c34f462ea2dcc10fc3c4235eb
                              • Instruction Fuzzy Hash: 24D13CB04A27858FE710CF6CE85A1893FB1BB81324F95431AE1616B2D1EFB4158EEF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2548503996.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7930000_NUGMrDcg4v.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0c15a72e5399b5ac619fc750a2978d8ab1f3e4257f3d500057094562465ffbbf
                              • Instruction ID: 68df3ed0dcb7d1e654f59893e0400b5ad66b0012e909a30b62f0c1c6edbd2c93
                              • Opcode Fuzzy Hash: 0c15a72e5399b5ac619fc750a2978d8ab1f3e4257f3d500057094562465ffbbf
                              • Instruction Fuzzy Hash: 7D5129B5E002198FDB14CFA9C5809AEFBF6FF89304F2481AAD418AB255D7359941CFA0