Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oe8KMVNFEG.exe

Overview

General Information

Sample name:oe8KMVNFEG.exe
renamed because original name is a hash value
Original sample name:d64cdbe6ba08bc293e824dc87c3b0aca90e432514f18b189b5f37e59bfaa29b9.exe
Analysis ID:1588612
MD5:e10abad4b0666e5acf257e4603453975
SHA1:c5b02e62e6ad90541778f1b34ee9fc02f8e8d9b9
SHA256:d64cdbe6ba08bc293e824dc87c3b0aca90e432514f18b189b5f37e59bfaa29b9
Tags:exeuser-adrian__luca
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • oe8KMVNFEG.exe (PID: 7772 cmdline: "C:\Users\user\Desktop\oe8KMVNFEG.exe" MD5: E10ABAD4B0666E5ACF257E4603453975)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: oe8KMVNFEG.exeAvira: detected
Source: oe8KMVNFEG.exeReversingLabs: Detection: 60%
Source: oe8KMVNFEG.exeVirustotal: Detection: 63%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: oe8KMVNFEG.exeJoe Sandbox ML: detected
Source: oe8KMVNFEG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: oe8KMVNFEG.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 45.9.191.182 45.9.191.182
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Ekaopt.mp4 HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: xianggrhen.com
Source: oe8KMVNFEG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: oe8KMVNFEG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: oe8KMVNFEG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: oe8KMVNFEG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: oe8KMVNFEG.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: oe8KMVNFEG.exeString found in binary or memory: http://ocsp.digicert.com0
Source: oe8KMVNFEG.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: oe8KMVNFEG.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: oe8KMVNFEG.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002819000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: oe8KMVNFEG.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: oe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000286A000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002831000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002819000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com
Source: oe8KMVNFEG.exe, 00000000.00000002.3201152331.00000000027C1000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.00000000027A5000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.00000000027B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com/salad/Ekaopt.mp4
Source: oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002819000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002858000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com/salad/Ekaopt.mp4l
Source: oe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000286A000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002864000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002858000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000283A000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002870000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002878000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000285C000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002860000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comD
Source: oe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000286A000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comd
Source: oe8KMVNFEG.exeString found in binary or memory: https://www.paessler.com0
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_00C7E5F40_2_00C7E5F4
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_00C7F4E80_2_00C7F4E8
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_00C7F4F80_2_00C7F4F8
Source: oe8KMVNFEG.exeStatic PE information: invalid certificate
Source: oe8KMVNFEG.exe, 00000000.00000000.1335098887.00000000003EA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEzwjwazt.exe vs oe8KMVNFEG.exe
Source: oe8KMVNFEG.exe, 00000000.00000002.3200479146.000000000095E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs oe8KMVNFEG.exe
Source: oe8KMVNFEG.exeBinary or memory string: OriginalFilenameEzwjwazt.exe vs oe8KMVNFEG.exe
Source: oe8KMVNFEG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMutant created: NULL
Source: oe8KMVNFEG.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: oe8KMVNFEG.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: oe8KMVNFEG.exeReversingLabs: Detection: 60%
Source: oe8KMVNFEG.exeVirustotal: Detection: 63%
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: oe8KMVNFEG.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: oe8KMVNFEG.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_00C7EFC4 pushad ; retf 0_2_00C7EFC5
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_00C7EFC0 pushfd ; retf 0_2_00C7EFC1
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_04CA04F0 pushad ; retf 0_2_04CA04FD
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_04CA1178 push esp; ret 0_2_04CA1186
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeCode function: 0_2_04CA1392 push ebx; ret 0_2_04CA1393
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMemory allocated: C70000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMemory allocated: 2750000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMemory allocated: 4750000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeWindow / User API: threadDelayed 711Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeWindow / User API: threadDelayed 1361Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7848Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7848Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7880Thread sleep count: 711 > 30Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7880Thread sleep count: 1361 > 30Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7848Thread sleep time: -85750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exe TID: 7848Thread sleep time: -85562s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 85750Jump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeThread delayed: delay time: 85562Jump to behavior
Source: oe8KMVNFEG.exe, 00000000.00000002.3200479146.00000000009C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll<
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeQueries volume information: C:\Users\user\Desktop\oe8KMVNFEG.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\oe8KMVNFEG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
oe8KMVNFEG.exe61%ReversingLabsWin32.Trojan.Jalapeno
oe8KMVNFEG.exe64%VirustotalBrowse
oe8KMVNFEG.exe100%AviraHEUR/AGEN.1304477
oe8KMVNFEG.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://xianggrhen.com0%Avira URL Cloudsafe
http://xianggrhen.com/salad/Ekaopt.mp40%Avira URL Cloudsafe
http://xianggrhen.comD0%Avira URL Cloudsafe
https://www.paessler.com00%Avira URL Cloudsafe
http://xianggrhen.com/salad/Ekaopt.mp4l0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
xianggrhen.com
45.9.191.182
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://xianggrhen.com/salad/Ekaopt.mp4false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://xianggrhen.comoe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000286A000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002831000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002819000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameoe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002819000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://xianggrhen.com/salad/Ekaopt.mp4loe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002819000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002858000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xianggrhen.comDoe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000286A000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002864000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002858000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000283A000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002870000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002878000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000285C000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002860000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xianggrhen.comdoe8KMVNFEG.exe, 00000000.00000002.3201152331.000000000286A000.00000004.00000800.00020000.00000000.sdmp, oe8KMVNFEG.exe, 00000000.00000002.3201152331.0000000002831000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        https://www.paessler.com0oe8KMVNFEG.exefalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        45.9.191.182
        xianggrhen.comGermany
        47583AS-HOSTINGERLTfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1588612
        Start date and time:2025-01-11 03:15:23 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 0s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:oe8KMVNFEG.exe
        renamed because original name is a hash value
        Original Sample Name:d64cdbe6ba08bc293e824dc87c3b0aca90e432514f18b189b5f37e59bfaa29b9.exe
        Detection:MAL
        Classification:mal64.winEXE@1/0@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 94%
        • Number of executed functions: 15
        • Number of non-executed functions: 3
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        45.9.191.182PqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/basket/Snobzw.vdf
        PqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/basket/Snobzw.vdf
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/book/Fvrbzpfzrm.vdf
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/book/Fvrbzpfzrm.vdf
        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/book/Netnoyfq.mp3
        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/composure/Emmaj.vdf
        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/composure/Vuglyxyuvio.pdf
        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/camp/Reibbfkkyy.dat
        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
        • xianggrhen.com/desk/Tbddfcris.vdf
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        xianggrhen.comPqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        PqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        MN-PAYMENT20241206-5002-10259-410291-30198-281920-30183-21474.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        DecPayment410_F2103_S29103_M839_U4721_S381I_S98EEU_USD031224.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AS-HOSTINGERLTPqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        PqJockhBoA.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
        • 92.249.45.121
        rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
        • 45.9.191.182
        Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
        • 92.249.45.121
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):5.717986822258666
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
        • Win32 Executable (generic) a (10002005/4) 49.97%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:oe8KMVNFEG.exe
        File size:355'824 bytes
        MD5:e10abad4b0666e5acf257e4603453975
        SHA1:c5b02e62e6ad90541778f1b34ee9fc02f8e8d9b9
        SHA256:d64cdbe6ba08bc293e824dc87c3b0aca90e432514f18b189b5f37e59bfaa29b9
        SHA512:845f21d7e482cc5bdf226837e066b44db9a968cc20b5d36862ac2658c94ed7de11eca4163d8b324bd1dda8d0626cebf0b31316c97bf6901d6fe82117bc6b930a
        SSDEEP:6144:5PfmPMXk/cCRLxPJ2aQtr7beeozoI9QAjK0N:5TXk0C9eRwvn
        TLSH:BD74C3F4DFF4C024C68861F5E01D4624D2E0A9A9DF728E06AAA753AC15A27DCDDCC1E7
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Og.................j............... ........@.. ....................................`................................
        Icon Hash:1838d371e870710e
        Entrypoint:0x4288ce
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x674FE587 [Wed Dec 4 05:15:51 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Signature Valid:false
        Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
        Signature Validation Error:The digital signature of the object did not verify
        Error Number:-2146869232
        Not Before, Not After
        • 10/02/2022 01:00:00 13/02/2025 00:59:59
        Subject Chain
        • CN=Paessler AG, O=Paessler AG, L=N\xfcrnberg, C=DE
        Version:3
        Thumbprint MD5:234FA1A9133E1A346EA15776D9F6CCDF
        Thumbprint SHA-1:67F655F2440F1D2C453963909848E352D0EA89B2
        Thumbprint SHA-256:977E514E290BF4040604678E5E6615183CB8B77EC24D3A59B3C6794DD03CBC8E
        Serial:0CB1CD6F7F1F8923E738064FB0E9FECA
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x288800x4b.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2a0000x2d200.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x540000x2df0.rsrc
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x268d40x26a00bac9665143180cc6fff9248b01f10d3bFalse0.43673518406148865data6.045797265471035IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x2a0000x2d2000x2d200903029ae5522937eeeccf4d8202b8d14False0.24765192174515235data4.541245382679845IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x580000xc0x2007b8c32915a3a4ddef936e6c3fdb68033False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x2a2b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 11811 x 11811 px/m0.549645390070922
        RT_ICON0x2a7180x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 11811 x 11811 px/m0.39549180327868855
        RT_ICON0x2b0a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 11811 x 11811 px/m0.32082551594746717
        RT_ICON0x2c1480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 11811 x 11811 px/m0.23443983402489627
        RT_ICON0x2e6f00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 11811 x 11811 px/m0.19845299952763346
        RT_ICON0x329180x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 11811 x 11811 px/m0.17841959334565619
        RT_ICON0x37da00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 11811 x 11811 px/m0.14746689089762455
        RT_ICON0x412480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 11811 x 11811 px/m0.1194398438424228
        RT_ICON0x51a700x4dc9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.99598252397931
        RT_GROUP_ICON0x5683c0x84data0.7272727272727273
        RT_VERSION0x568c00x5a8data0.30455801104972374
        RT_MANIFEST0x56e680x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        TimestampSource PortDest PortSource IPDest IP
        Jan 11, 2025 03:16:27.800849915 CET4970380192.168.2.745.9.191.182
        Jan 11, 2025 03:16:27.805778027 CET804970345.9.191.182192.168.2.7
        Jan 11, 2025 03:16:27.805856943 CET4970380192.168.2.745.9.191.182
        Jan 11, 2025 03:16:27.806723118 CET4970380192.168.2.745.9.191.182
        Jan 11, 2025 03:16:27.811608076 CET804970345.9.191.182192.168.2.7
        Jan 11, 2025 03:16:49.178898096 CET804970345.9.191.182192.168.2.7
        Jan 11, 2025 03:16:49.179052114 CET4970380192.168.2.745.9.191.182
        Jan 11, 2025 03:16:49.189204931 CET4970380192.168.2.745.9.191.182
        Jan 11, 2025 03:16:49.189860106 CET4983380192.168.2.745.9.191.182
        Jan 11, 2025 03:16:49.194005013 CET804970345.9.191.182192.168.2.7
        Jan 11, 2025 03:16:49.194734097 CET804983345.9.191.182192.168.2.7
        Jan 11, 2025 03:16:49.194828987 CET4983380192.168.2.745.9.191.182
        Jan 11, 2025 03:16:49.195064068 CET4983380192.168.2.745.9.191.182
        Jan 11, 2025 03:16:49.199851036 CET804983345.9.191.182192.168.2.7
        Jan 11, 2025 03:17:10.575511932 CET804983345.9.191.182192.168.2.7
        Jan 11, 2025 03:17:10.575586081 CET4983380192.168.2.745.9.191.182
        Jan 11, 2025 03:17:10.576800108 CET4983380192.168.2.745.9.191.182
        Jan 11, 2025 03:17:10.583318949 CET804983345.9.191.182192.168.2.7
        Jan 11, 2025 03:17:10.586653948 CET4997380192.168.2.745.9.191.182
        Jan 11, 2025 03:17:10.593082905 CET804997345.9.191.182192.168.2.7
        Jan 11, 2025 03:17:10.593216896 CET4997380192.168.2.745.9.191.182
        Jan 11, 2025 03:17:10.593487024 CET4997380192.168.2.745.9.191.182
        Jan 11, 2025 03:17:10.599849939 CET804997345.9.191.182192.168.2.7
        Jan 11, 2025 03:17:32.008014917 CET804997345.9.191.182192.168.2.7
        Jan 11, 2025 03:17:32.008095980 CET4997380192.168.2.745.9.191.182
        Jan 11, 2025 03:17:32.053456068 CET4997380192.168.2.745.9.191.182
        Jan 11, 2025 03:17:32.058274984 CET804997345.9.191.182192.168.2.7
        Jan 11, 2025 03:17:32.063805103 CET4997580192.168.2.745.9.191.182
        Jan 11, 2025 03:17:32.068625927 CET804997545.9.191.182192.168.2.7
        Jan 11, 2025 03:17:32.068720102 CET4997580192.168.2.745.9.191.182
        Jan 11, 2025 03:17:32.078267097 CET4997580192.168.2.745.9.191.182
        Jan 11, 2025 03:17:32.083028078 CET804997545.9.191.182192.168.2.7
        Jan 11, 2025 03:17:53.464746952 CET804997545.9.191.182192.168.2.7
        Jan 11, 2025 03:17:53.465022087 CET4997580192.168.2.745.9.191.182
        Jan 11, 2025 03:17:53.466089010 CET4997580192.168.2.745.9.191.182
        Jan 11, 2025 03:17:53.468044996 CET4997780192.168.2.745.9.191.182
        Jan 11, 2025 03:17:53.470909119 CET804997545.9.191.182192.168.2.7
        Jan 11, 2025 03:17:53.472876072 CET804997745.9.191.182192.168.2.7
        Jan 11, 2025 03:17:53.472954035 CET4997780192.168.2.745.9.191.182
        Jan 11, 2025 03:17:53.473114967 CET4997780192.168.2.745.9.191.182
        Jan 11, 2025 03:17:53.477910042 CET804997745.9.191.182192.168.2.7
        Jan 11, 2025 03:18:14.889580965 CET804997745.9.191.182192.168.2.7
        Jan 11, 2025 03:18:14.889695883 CET4997780192.168.2.745.9.191.182
        Jan 11, 2025 03:18:14.890753984 CET4997780192.168.2.745.9.191.182
        Jan 11, 2025 03:18:14.891458035 CET4997880192.168.2.745.9.191.182
        Jan 11, 2025 03:18:14.895575047 CET804997745.9.191.182192.168.2.7
        Jan 11, 2025 03:18:14.896372080 CET804997845.9.191.182192.168.2.7
        Jan 11, 2025 03:18:14.896563053 CET4997880192.168.2.745.9.191.182
        Jan 11, 2025 03:18:14.896693945 CET4997880192.168.2.745.9.191.182
        Jan 11, 2025 03:18:14.901587963 CET804997845.9.191.182192.168.2.7
        Jan 11, 2025 03:18:36.275034904 CET804997845.9.191.182192.168.2.7
        Jan 11, 2025 03:18:36.275202990 CET4997880192.168.2.745.9.191.182
        Jan 11, 2025 03:18:36.277177095 CET4997880192.168.2.745.9.191.182
        Jan 11, 2025 03:18:36.280663013 CET4997980192.168.2.745.9.191.182
        Jan 11, 2025 03:18:36.282068014 CET804997845.9.191.182192.168.2.7
        Jan 11, 2025 03:18:36.285599947 CET804997945.9.191.182192.168.2.7
        Jan 11, 2025 03:18:36.285707951 CET4997980192.168.2.745.9.191.182
        Jan 11, 2025 03:18:36.285893917 CET4997980192.168.2.745.9.191.182
        Jan 11, 2025 03:18:36.290714025 CET804997945.9.191.182192.168.2.7
        Jan 11, 2025 03:18:57.650383949 CET804997945.9.191.182192.168.2.7
        Jan 11, 2025 03:18:57.650557995 CET4997980192.168.2.745.9.191.182
        Jan 11, 2025 03:18:57.651608944 CET4997980192.168.2.745.9.191.182
        Jan 11, 2025 03:18:57.652436018 CET4998080192.168.2.745.9.191.182
        Jan 11, 2025 03:18:57.656429052 CET804997945.9.191.182192.168.2.7
        Jan 11, 2025 03:18:57.657252073 CET804998045.9.191.182192.168.2.7
        Jan 11, 2025 03:18:57.657347918 CET4998080192.168.2.745.9.191.182
        Jan 11, 2025 03:18:57.657597065 CET4998080192.168.2.745.9.191.182
        Jan 11, 2025 03:18:57.662317038 CET804998045.9.191.182192.168.2.7
        Jan 11, 2025 03:19:19.046072960 CET804998045.9.191.182192.168.2.7
        Jan 11, 2025 03:19:19.046318054 CET4998080192.168.2.745.9.191.182
        Jan 11, 2025 03:19:19.047158003 CET4998080192.168.2.745.9.191.182
        Jan 11, 2025 03:19:19.049257040 CET4998180192.168.2.745.9.191.182
        Jan 11, 2025 03:19:19.051935911 CET804998045.9.191.182192.168.2.7
        Jan 11, 2025 03:19:19.054070950 CET804998145.9.191.182192.168.2.7
        Jan 11, 2025 03:19:19.054162979 CET4998180192.168.2.745.9.191.182
        Jan 11, 2025 03:19:19.054394960 CET4998180192.168.2.745.9.191.182
        Jan 11, 2025 03:19:19.076916933 CET804998145.9.191.182192.168.2.7
        TimestampSource PortDest PortSource IPDest IP
        Jan 11, 2025 03:16:27.777818918 CET6224953192.168.2.71.1.1.1
        Jan 11, 2025 03:16:27.790286064 CET53622491.1.1.1192.168.2.7
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 11, 2025 03:16:27.777818918 CET192.168.2.71.1.1.10xa4cStandard query (0)xianggrhen.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 11, 2025 03:16:27.790286064 CET1.1.1.1192.168.2.70xa4cNo error (0)xianggrhen.com45.9.191.182A (IP address)IN (0x0001)false
        • xianggrhen.com
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.74970345.9.191.182807772C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:16:27.806723118 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.74983345.9.191.182807772C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:16:49.195064068 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.74997345.9.191.182807772C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:17:10.593487024 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.74997545.9.191.182807772C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:17:32.078267097 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.74997745.9.191.182807772C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:17:53.473114967 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        5192.168.2.74997845.9.191.182807772C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:18:14.896693945 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        6192.168.2.74997945.9.191.182807772C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:18:36.285893917 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        7192.168.2.74998045.9.191.182807772C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:18:57.657597065 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        8192.168.2.74998145.9.191.182807772C:\Users\user\Desktop\oe8KMVNFEG.exe
        TimestampBytes transferredDirectionData
        Jan 11, 2025 03:19:19.054394960 CET80OUTGET /salad/Ekaopt.mp4 HTTP/1.1
        Host: xianggrhen.com
        Connection: Keep-Alive


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:0
        Start time:21:16:26
        Start date:10/01/2025
        Path:C:\Users\user\Desktop\oe8KMVNFEG.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\oe8KMVNFEG.exe"
        Imagebase:0x3c0000
        File size:355'824 bytes
        MD5 hash:E10ABAD4B0666E5ACF257E4603453975
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:11%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:100
          Total number of Limit Nodes:5
          execution_graph 20665 4ca369f 20666 4ca36f9 20665->20666 20667 4ca36f2 20665->20667 20667->20666 20668 4ca374a CallWindowProcW 20667->20668 20668->20666 20637 c7cd60 DuplicateHandle 20638 c7cdf6 20637->20638 20669 c7a390 20673 c7a478 20669->20673 20678 c7a488 20669->20678 20670 c7a39f 20674 c7a4bc 20673->20674 20676 c7a499 20673->20676 20674->20670 20675 c7a6c0 GetModuleHandleW 20677 c7a6ed 20675->20677 20676->20674 20676->20675 20677->20670 20679 c7a4bc 20678->20679 20681 c7a499 20678->20681 20679->20670 20680 c7a6c0 GetModuleHandleW 20682 c7a6ed 20680->20682 20681->20679 20681->20680 20682->20670 20639 91d01c 20640 91d034 20639->20640 20641 91d08e 20640->20641 20646 4ca1178 20640->20646 20651 4ca2288 20640->20651 20655 4ca1128 20640->20655 20659 4ca1118 20640->20659 20647 4ca117b 20646->20647 20648 4ca112f 20646->20648 20647->20641 20650 4ca2288 CallWindowProcW 20648->20650 20649 4ca116f 20649->20641 20650->20649 20653 4ca22b5 20651->20653 20654 4ca22d9 20653->20654 20664 4ca1e84 CallWindowProcW 20653->20664 20656 4ca112f 20655->20656 20658 4ca2288 CallWindowProcW 20656->20658 20657 4ca116f 20657->20641 20658->20657 20660 4ca10f4 20659->20660 20661 4ca111b 20659->20661 20660->20641 20663 4ca2288 CallWindowProcW 20661->20663 20662 4ca116f 20662->20641 20663->20662 20664->20654 20683 c74698 20684 c746a6 20683->20684 20687 c73e70 20684->20687 20686 c746af 20688 c73e7b 20687->20688 20691 c74260 20688->20691 20690 c746d5 20690->20686 20692 c7426b 20691->20692 20695 c74270 20692->20695 20694 c7476d 20694->20690 20696 c7427b 20695->20696 20699 c74408 20696->20699 20698 c74842 20698->20694 20700 c74413 20699->20700 20703 c74438 20700->20703 20702 c74954 20702->20698 20704 c74443 20703->20704 20706 c776e0 20704->20706 20709 c77988 20704->20709 20705 c77979 20705->20702 20706->20705 20714 c7c441 20706->20714 20710 c7796c 20709->20710 20712 c77993 20709->20712 20711 c77979 20710->20711 20713 c7c441 2 API calls 20710->20713 20711->20706 20712->20706 20713->20711 20715 c7c471 20714->20715 20716 c7c495 20715->20716 20719 c7c600 20715->20719 20723 c7c5ff 20715->20723 20716->20705 20720 c7c60d 20719->20720 20721 c7c647 20720->20721 20727 c7ace0 20720->20727 20721->20716 20724 c7c60d 20723->20724 20725 c7ace0 2 API calls 20724->20725 20726 c7c647 20724->20726 20725->20726 20726->20716 20728 c7aceb 20727->20728 20730 c7d358 20728->20730 20731 c7c774 20728->20731 20730->20730 20732 c7c77f 20731->20732 20733 c74438 2 API calls 20732->20733 20734 c7d3c7 20733->20734 20738 c7f130 20734->20738 20743 c7f148 20734->20743 20735 c7d401 20735->20730 20739 c7f185 20738->20739 20740 c7f179 20738->20740 20739->20735 20740->20739 20741 4ca0040 CreateWindowExW CreateWindowExW 20740->20741 20742 4ca0021 CreateWindowExW CreateWindowExW 20740->20742 20741->20739 20742->20739 20744 c7f179 20743->20744 20745 c7f185 20743->20745 20744->20745 20746 4ca0040 CreateWindowExW CreateWindowExW 20744->20746 20747 4ca0021 CreateWindowExW CreateWindowExW 20744->20747 20745->20735 20746->20745 20747->20745 20748 c7cb18 20749 c7cb5e GetCurrentProcess 20748->20749 20751 c7cbb0 GetCurrentThread 20749->20751 20752 c7cba9 20749->20752 20753 c7cbe6 20751->20753 20754 c7cbed GetCurrentProcess 20751->20754 20752->20751 20753->20754 20755 c7cc23 20754->20755 20756 c7cc4b GetCurrentThreadId 20755->20756 20757 c7cc7c 20756->20757

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 526 c7cb08-c7cba7 GetCurrentProcess 530 c7cbb0-c7cbe4 GetCurrentThread 526->530 531 c7cba9-c7cbaf 526->531 532 c7cbe6-c7cbec 530->532 533 c7cbed-c7cc21 GetCurrentProcess 530->533 531->530 532->533 535 c7cc23-c7cc29 533->535 536 c7cc2a-c7cc45 call c7cce7 533->536 535->536 539 c7cc4b-c7cc7a GetCurrentThreadId 536->539 540 c7cc83-c7cce5 539->540 541 c7cc7c-c7cc82 539->541 541->540
          APIs
          • GetCurrentProcess.KERNEL32 ref: 00C7CB96
          • GetCurrentThread.KERNEL32 ref: 00C7CBD3
          • GetCurrentProcess.KERNEL32 ref: 00C7CC10
          • GetCurrentThreadId.KERNEL32 ref: 00C7CC69
          Memory Dump Source
          • Source File: 00000000.00000002.3200708289.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c70000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 1d3020976cd2170fce822670b06add7b3e937200f310199d3ccbcacba8170795
          • Instruction ID: 80b9f55cfff64466ead0d52ae28a4ae0c581acee2d380e1cbfb42efc298665b8
          • Opcode Fuzzy Hash: 1d3020976cd2170fce822670b06add7b3e937200f310199d3ccbcacba8170795
          • Instruction Fuzzy Hash: 9A5166B1901749CFEB14DFA9D588B9EBBF1EB48300F24C059E019AB2A1D774A944CB66

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 548 c7cb18-c7cba7 GetCurrentProcess 552 c7cbb0-c7cbe4 GetCurrentThread 548->552 553 c7cba9-c7cbaf 548->553 554 c7cbe6-c7cbec 552->554 555 c7cbed-c7cc21 GetCurrentProcess 552->555 553->552 554->555 557 c7cc23-c7cc29 555->557 558 c7cc2a-c7cc45 call c7cce7 555->558 557->558 561 c7cc4b-c7cc7a GetCurrentThreadId 558->561 562 c7cc83-c7cce5 561->562 563 c7cc7c-c7cc82 561->563 563->562
          APIs
          • GetCurrentProcess.KERNEL32 ref: 00C7CB96
          • GetCurrentThread.KERNEL32 ref: 00C7CBD3
          • GetCurrentProcess.KERNEL32 ref: 00C7CC10
          • GetCurrentThreadId.KERNEL32 ref: 00C7CC69
          Memory Dump Source
          • Source File: 00000000.00000002.3200708289.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c70000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 4d15e5c820055fca9f82de939b0635065e187cc0480f1b3fc46bd67ee81bcad1
          • Instruction ID: ba50e21fe503a79484cd2318d066c36dbea718f0e5c06c6da26d3ad3353b1405
          • Opcode Fuzzy Hash: 4d15e5c820055fca9f82de939b0635065e187cc0480f1b3fc46bd67ee81bcad1
          • Instruction Fuzzy Hash: 475136B0900709CFEB14DFAAD588B9EBBF1EB48314F24C059E419A7390D774A944CF66

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 677 c7a488-c7a497 678 c7a4c3-c7a4c7 677->678 679 c7a499-c7a4a6 call c797f4 677->679 681 c7a4db-c7a51c 678->681 682 c7a4c9-c7a4d3 678->682 684 c7a4bc 679->684 685 c7a4a8 679->685 688 c7a51e-c7a526 681->688 689 c7a529-c7a537 681->689 682->681 684->678 733 c7a4ae call c7a720 685->733 734 c7a4ae call c7a71f 685->734 688->689 690 c7a55b-c7a55d 689->690 691 c7a539-c7a53e 689->691 696 c7a560-c7a567 690->696 693 c7a540-c7a547 call c79800 691->693 694 c7a549 691->694 692 c7a4b4-c7a4b6 692->684 695 c7a5f8-c7a605 692->695 698 c7a54b-c7a559 693->698 694->698 706 c7a60b-c7a670 695->706 699 c7a574-c7a57b 696->699 700 c7a569-c7a571 696->700 698->696 702 c7a57d-c7a585 699->702 703 c7a588-c7a591 call c79810 699->703 700->699 702->703 708 c7a593-c7a59b 703->708 709 c7a59e-c7a5a3 703->709 727 c7a672-c7a6b8 706->727 708->709 710 c7a5a5-c7a5ac 709->710 711 c7a5c1-c7a5c5 709->711 710->711 713 c7a5ae-c7a5be call c79820 call c79830 710->713 735 c7a5c8 call c7ae20 711->735 736 c7a5c8 call c7adff 711->736 713->711 716 c7a5cb-c7a5ce 718 c7a5f1-c7a5f7 716->718 719 c7a5d0-c7a5ee 716->719 719->718 728 c7a6c0-c7a6eb GetModuleHandleW 727->728 729 c7a6ba-c7a6bd 727->729 730 c7a6f4-c7a708 728->730 731 c7a6ed-c7a6f3 728->731 729->728 731->730 733->692 734->692 735->716 736->716
          APIs
          • GetModuleHandleW.KERNEL32(00000000), ref: 00C7A6DE
          Memory Dump Source
          • Source File: 00000000.00000002.3200708289.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c70000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 6eac1f6ec692511a196c97db032c5df63007bd84291df89fa0f4df8d988a5f45
          • Instruction ID: 50252602c498dc8d14db0482fbcf443cc5e204215f74680308dcb3185d6141d3
          • Opcode Fuzzy Hash: 6eac1f6ec692511a196c97db032c5df63007bd84291df89fa0f4df8d988a5f45
          • Instruction Fuzzy Hash: A9813570A00B058FD764DF29D44575ABBF2FF88304F008A2EE49AD7A50DB75E945CB92

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 737 4ca0f64-4ca0fd6 738 4ca0fd8-4ca0fde 737->738 739 4ca0fe1-4ca0fe8 737->739 738->739 740 4ca0fea-4ca0ff0 739->740 741 4ca0ff3-4ca1092 CreateWindowExW 739->741 740->741 743 4ca109b-4ca10d3 741->743 744 4ca1094-4ca109a 741->744 748 4ca10e0 743->748 749 4ca10d5-4ca10d8 743->749 744->743 750 4ca10e1 748->750 749->748 750->750
          APIs
          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04CA1082
          Memory Dump Source
          • Source File: 00000000.00000002.3201989820.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4ca0000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: CreateWindow
          • String ID:
          • API String ID: 716092398-0
          • Opcode ID: f99e4a2d67c952e9caeebf53b0b3291de916bd5a3d4816d4955e7842f80815c4
          • Instruction ID: 013074f75420530066997ad8dffcce4db3fe5393028ebb860efb144a93a762c9
          • Opcode Fuzzy Hash: f99e4a2d67c952e9caeebf53b0b3291de916bd5a3d4816d4955e7842f80815c4
          • Instruction Fuzzy Hash: AE51C0B1D00359DFDB14CF9AC884ADEBBB6FF48314F24812AE819AB250D775A941CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 751 4ca0f70-4ca0fd6 752 4ca0fd8-4ca0fde 751->752 753 4ca0fe1-4ca0fe8 751->753 752->753 754 4ca0fea-4ca0ff0 753->754 755 4ca0ff3-4ca1092 CreateWindowExW 753->755 754->755 757 4ca109b-4ca10d3 755->757 758 4ca1094-4ca109a 755->758 762 4ca10e0 757->762 763 4ca10d5-4ca10d8 757->763 758->757 764 4ca10e1 762->764 763->762 764->764
          APIs
          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04CA1082
          Memory Dump Source
          • Source File: 00000000.00000002.3201989820.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4ca0000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: CreateWindow
          • String ID:
          • API String ID: 716092398-0
          • Opcode ID: 7547e1b6695cee30eac6b1e55183d5227960fe8ed19133c4dd2828a2a6a57be9
          • Instruction ID: 32f8fde0ca9f616625a556a32f3527f6f60c1d132c20a15514e29e3094204d80
          • Opcode Fuzzy Hash: 7547e1b6695cee30eac6b1e55183d5227960fe8ed19133c4dd2828a2a6a57be9
          • Instruction Fuzzy Hash: 9D41C0B1D00359DFDB14CF9AC884ADEBBB6FF48314F24812AE818AB250D775A945CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 765 4ca1e84-4ca36ec 768 4ca379c-4ca37bc 765->768 769 4ca36f2-4ca36f7 765->769 776 4ca37bf-4ca37cc 768->776 770 4ca374a-4ca3782 CallWindowProcW 769->770 771 4ca36f9-4ca3730 769->771 772 4ca378b-4ca379a 770->772 773 4ca3784-4ca378a 770->773 777 4ca3739-4ca3748 771->777 778 4ca3732-4ca3738 771->778 772->776 773->772 777->776 778->777
          APIs
          • CallWindowProcW.USER32(?,?,?,?,?), ref: 04CA3771
          Memory Dump Source
          • Source File: 00000000.00000002.3201989820.0000000004CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4ca0000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: CallProcWindow
          • String ID:
          • API String ID: 2714655100-0
          • Opcode ID: dc5c99615809c119c1af45f19de82fa5554eae38a412d73c668cd8f185c354df
          • Instruction ID: d94d964048c3231eaaa34a9136da6817749e4fa73eee6c26c3619af5d1804de4
          • Opcode Fuzzy Hash: dc5c99615809c119c1af45f19de82fa5554eae38a412d73c668cd8f185c354df
          • Instruction Fuzzy Hash: CB413AB9900345DFDB14CF99C488BAABBF6FB88314F24C459D819AB321D334A841CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 781 c7cd60-c7cdf4 DuplicateHandle 782 c7cdf6-c7cdfc 781->782 783 c7cdfd-c7ce1a 781->783 782->783
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C7CDE7
          Memory Dump Source
          • Source File: 00000000.00000002.3200708289.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c70000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 289686efb21409e1da135b73c45a01bc348e4fd1362040ff391249a9a0816593
          • Instruction ID: 21b69dc812fd1934a63a886a7b99a1af0c16847b9716adf2af20ff09576aa7ee
          • Opcode Fuzzy Hash: 289686efb21409e1da135b73c45a01bc348e4fd1362040ff391249a9a0816593
          • Instruction Fuzzy Hash: 1421B3B5D00249DFDB10CF9AD984ADEBBF9EB48310F14841AE918A7350D379A944CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 786 c7cd58-c7cdf4 DuplicateHandle 787 c7cdf6-c7cdfc 786->787 788 c7cdfd-c7ce1a 786->788 787->788
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C7CDE7
          Memory Dump Source
          • Source File: 00000000.00000002.3200708289.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c70000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 151e9f38d7c8e754c53cf43ebc16a9eabc82ff30ba9e12457680d119f8af96aa
          • Instruction ID: 2e2ce40082cb4685ced26e4ec907891f76075183a7bf525cfa77f3ce9d42a693
          • Opcode Fuzzy Hash: 151e9f38d7c8e754c53cf43ebc16a9eabc82ff30ba9e12457680d119f8af96aa
          • Instruction Fuzzy Hash: F421E2B5D00259DFDB10CFA9D580ADEBBF5FB48310F14802AE918A7350D378A954CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 791 c7a678-c7a6b8 792 c7a6c0-c7a6eb GetModuleHandleW 791->792 793 c7a6ba-c7a6bd 791->793 794 c7a6f4-c7a708 792->794 795 c7a6ed-c7a6f3 792->795 793->792 795->794
          APIs
          • GetModuleHandleW.KERNEL32(00000000), ref: 00C7A6DE
          Memory Dump Source
          • Source File: 00000000.00000002.3200708289.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c70000_oe8KMVNFEG.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 6a26aeab621cebbdd2867df4c626879e1885d9c6b1acc50fcf8bf13d4eb9ad0f
          • Instruction ID: 8d3bfe53efbba2d7decb0f306718b24222c2ce75afbd4c1991611b25176f15bb
          • Opcode Fuzzy Hash: 6a26aeab621cebbdd2867df4c626879e1885d9c6b1acc50fcf8bf13d4eb9ad0f
          • Instruction Fuzzy Hash: 2011E0B6C00649CFDB20DF9AC444BDEFBF8EB88314F15841AD829A7610C379A545CFA5
          Memory Dump Source
          • Source File: 00000000.00000002.3200351593.000000000090D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_90d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4bca8d6794c91525bba45b328a8f99b4f0fd3afeebbacbd899dfbff2b16b6356
          • Instruction ID: caf057ab7ef63e0c49cfb5297ed89e406b99132f4ed8525bd78166d843bb2146
          • Opcode Fuzzy Hash: 4bca8d6794c91525bba45b328a8f99b4f0fd3afeebbacbd899dfbff2b16b6356
          • Instruction Fuzzy Hash: 38210672504200DFDB15DF54D9C0B26BF65FB94318F208569ED090B29AC33AD856CAA2
          Memory Dump Source
          • Source File: 00000000.00000002.3200379024.000000000091D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0091D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_91d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ed6952fa91021334f60e93173944dfd48a8c810aa9f26a7ca310fa8ec5497669
          • Instruction ID: f1e244f559028cf5045ce4aafa6292a1ddce128abc4d9962539507ad4601954d
          • Opcode Fuzzy Hash: ed6952fa91021334f60e93173944dfd48a8c810aa9f26a7ca310fa8ec5497669
          • Instruction Fuzzy Hash: 2721F875604308DFDB14DF14D5C4B56BB65FB88314F20C96DD8094B296C33AD887CA62
          Memory Dump Source
          • Source File: 00000000.00000002.3200379024.000000000091D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0091D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_91d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 37ccedf2634f70b6688f4fa1b67d69d983e16e063743c38167f93a55659c7926
          • Instruction ID: 497f3ac316ed024913ddcefde960bc60080863b7f051ab8c7778aa07b56be626
          • Opcode Fuzzy Hash: 37ccedf2634f70b6688f4fa1b67d69d983e16e063743c38167f93a55659c7926
          • Instruction Fuzzy Hash: 1A21CF755093C48FDB02CF20D990715BF71EB4A314F28C5EAD8498F6A3C33A984ACB62
          Memory Dump Source
          • Source File: 00000000.00000002.3200351593.000000000090D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_90d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
          • Instruction ID: fe7326b6a9ff8fb42b01e7f43cd685c87d22e34a1b6171cfcffb137431f7db85
          • Opcode Fuzzy Hash: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
          • Instruction Fuzzy Hash: B611E1B2804240DFCB16CF44D9C0B16BF71FB84324F24C5A9ED094B69AC336D856CBA2
          Memory Dump Source
          • Source File: 00000000.00000002.3200351593.000000000090D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_90d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4f80d9997116992fa3814cd2efc0d57c441306a772db4120a2ab080b3ee2d6de
          • Instruction ID: 520c7659bb475771a2dcda4be7b817a5149a4acc19e27b893f519701ef8bbe0e
          • Opcode Fuzzy Hash: 4f80d9997116992fa3814cd2efc0d57c441306a772db4120a2ab080b3ee2d6de
          • Instruction Fuzzy Hash: 7101DB714053449EE7204B65DD84B66FBDCEF41764F14C45AED094E2C2C3789840CAB6
          Memory Dump Source
          • Source File: 00000000.00000002.3200351593.000000000090D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0090D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_90d000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: aa85460726a7fcdfb66a64d1bfda12c2518e37b11cec361efd8d33ef5a15f938
          • Instruction ID: 13d6746cbbd1228cd2ab6bd3fbec197081569bff85077efb97304651e501a76c
          • Opcode Fuzzy Hash: aa85460726a7fcdfb66a64d1bfda12c2518e37b11cec361efd8d33ef5a15f938
          • Instruction Fuzzy Hash: 0FF06D72445344AEEB208A16D984B62FFECEB51724F18C55AED484F6C7C3799C44CAB1
          Memory Dump Source
          • Source File: 00000000.00000002.3200708289.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c70000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: cb7cf08d60e6d9a38a0ee20842e9b8539fb89b1f6094e2ab5715660228481e4a
          • Instruction ID: 76239b5d20d1c1035f1ae46d2c3693bb78335d38f7c9b6476fe59e2f344344dc
          • Opcode Fuzzy Hash: cb7cf08d60e6d9a38a0ee20842e9b8539fb89b1f6094e2ab5715660228481e4a
          • Instruction Fuzzy Hash: 1A12C6B0405F458AE730CF25FC4C9993BB1BBA5328B904609D161AB3F9EBB9114BDF64
          Memory Dump Source
          • Source File: 00000000.00000002.3200708289.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c70000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 83ef2cea891c55ce571de85ef5db555d775bcacb55f1033c0fff158e5c415f15
          • Instruction ID: 2c760f9e46c16c65afb634447fa776bd3157d3a3408faa736e50274992be50d1
          • Opcode Fuzzy Hash: 83ef2cea891c55ce571de85ef5db555d775bcacb55f1033c0fff158e5c415f15
          • Instruction Fuzzy Hash: 9AA17E32E00219CFCF15DFB5C84459EBBB2FF99300B1585AAF809AB261DB71E906CB50
          Memory Dump Source
          • Source File: 00000000.00000002.3200708289.0000000000C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_c70000_oe8KMVNFEG.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ab8a09ba84d5a3e5aabe9b193857f3ef5c98f16e7f5108c8e935c82c68347d5b
          • Instruction ID: f8a6cb044ed2b9f8bfa83fd7710c4bef588ba6f50c17c055df343de4e37ab075
          • Opcode Fuzzy Hash: ab8a09ba84d5a3e5aabe9b193857f3ef5c98f16e7f5108c8e935c82c68347d5b
          • Instruction Fuzzy Hash: 38C10AB0801B458BE720CF65FC48A997BB1BBA5324F504709D161AB3F8EBB4144BDF64