Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Discord.exe

Overview

General Information

Sample name:Discord.exe
Analysis ID:1590493
MD5:9dcd35fe3cafec7a25aa3cdd08ded1f4
SHA1:13f199bfd3f8b2925536144a1b42424675d7c8e4
SHA256:ce4f85d935fe68a1c92469367b945f26c40c71feb656ef844c30a5483dc5c0be
Tags:AsyncRATexeuser-lontze7
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • Discord.exe (PID: 7504 cmdline: "C:\Users\user\Desktop\Discord.exe" MD5: 9DCD35FE3CAFEC7A25AA3CDD08DED1F4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "2.tcp.eu.ngrok.io", "Ports": "19695", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "NqgX4cCmmE903Zi62xsKnekCElA9CS4M", "Mutex": "gonq3XlXWgiz", "Certificate": "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", "ServerSignature": "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", "BDOS": "false", "External_config_on_Pastebin": "null"}
SourceRuleDescriptionAuthorStrings
Discord.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    Discord.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Discord.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0x991b:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xac38:$a2: Stub.exe
      • 0xacc8:$a2: Stub.exe
      • 0x6703:$a3: get_ActivatePong
      • 0x9b33:$a4: vmware
      • 0x99ab:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x7452:$a6: get_SslClient
      Discord.exerat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
      • 0x6703:$str01: get_ActivatePong
      • 0x7452:$str02: get_SslClient
      • 0x746e:$str03: get_TcpClient
      • 0x5d0e:$str04: get_SendSync
      • 0x5d5e:$str05: get_IsConnected
      • 0x6495:$str06: set_UseShellExecute
      • 0x9c51:$str07: Pastebin
      • 0x9cd3:$str08: Select * from AntivirusProduct
      • 0xac38:$str09: Stub.exe
      • 0xacc8:$str09: Stub.exe
      • 0x9a2b:$str10: timeout 3 > NUL
      • 0x991b:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
      • 0x99ab:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      Discord.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0x99ad:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0x97ad:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        Process Memory Space: Discord.exe PID: 7504JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: Discord.exe PID: 7504INDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0x3c2f2:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          SourceRuleDescriptionAuthorStrings
          0.0.Discord.exe.ea0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.0.Discord.exe.ea0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.Discord.exe.ea0000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0x991b:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0xac38:$a2: Stub.exe
              • 0xacc8:$a2: Stub.exe
              • 0x6703:$a3: get_ActivatePong
              • 0x9b33:$a4: vmware
              • 0x99ab:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0x7452:$a6: get_SslClient
              0.0.Discord.exe.ea0000.0.unpackrat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
              • 0x6703:$str01: get_ActivatePong
              • 0x7452:$str02: get_SslClient
              • 0x746e:$str03: get_TcpClient
              • 0x5d0e:$str04: get_SendSync
              • 0x5d5e:$str05: get_IsConnected
              • 0x6495:$str06: set_UseShellExecute
              • 0x9c51:$str07: Pastebin
              • 0x9cd3:$str08: Select * from AntivirusProduct
              • 0xac38:$str09: Stub.exe
              • 0xacc8:$str09: Stub.exe
              • 0x9a2b:$str10: timeout 3 > NUL
              • 0x991b:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
              • 0x99ab:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              0.0.Discord.exe.ea0000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0x99ad:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Discord.exeAvira: detected
              Source: 2.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
              Source: Discord.exeMalware Configuration Extractor: AsyncRAT {"Server": "2.tcp.eu.ngrok.io", "Ports": "19695", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "NqgX4cCmmE903Zi62xsKnekCElA9CS4M", "Mutex": "gonq3XlXWgiz", "Certificate": "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", "ServerSignature": "F16HEKRGmDveP59ZWNHrIKJnOoOgkTCqtfpo0YdfgUvZsl7RlghXY1RewN8Z9fOLS3grlsnbISI1AN8PbruBAbVYvKpFTE4BrcyAoPqcO7j0j3cYR/PGxs92VgHC08DV5LTssICTfAh3sCTLYfaxclSC+hO024lZ7JVPyyjYroqJ0N4z1QFz84orIFDeer44n9dT5nawSG+RU1dJggO/i9aBx873aYOsN4/3LAXOxeahVjsPuAzigBeQEuzf0yOGpR8KhZYCIxqpHzJwh//A57xeg5Wt0bV2Y/uey1D329GW7V0LCTIDZIGa3t1RAwl9AYaV7zwhciIceR6uh3AIlxY+FtGDDRGdoGXakkMOwVWUF7Ocmz8Eoh5U/pVJO2LiG3wE80BjbNM3QQWgmchqYErYCXLJAINgUsD36JBpllntov+v3PiPYcyESzNLSmuLWZ7rgAA1QB4RDii9i/teBfdh3lIfrbO9RjFukFqiCa8F+IwFB+fV8YNRUZhw2nEBjPxwDfOUB2snd/yhkHeLWDi6PMKR6InYEa4OeDqMaM5mB3tTLCQLRnj4/cvw6aJBLD7NCpcdSBNTQjZReoESPaFWVzccyCJMlMIuGIWqIYTKoNPhWVJyy3TOcwCDe5kFV+MYvN2rxJbXlCxDPP7VEgO+FWstUN12ef7Iy7A7Z5c=", "BDOS": "false", "External_config_on_Pastebin": "null"}
              Source: Discord.exeReversingLabs: Detection: 86%
              Source: Discord.exeVirustotal: Detection: 80%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: Discord.exeJoe Sandbox ML: detected
              Source: Discord.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Discord.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Malware configuration extractorURLs: 2.tcp.eu.ngrok.io
              Source: Yara matchFile source: Discord.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 18.156.13.209:19695
              Source: global trafficTCP traffic: 192.168.2.4:49797 -> 3.127.138.57:19695
              Source: Joe Sandbox ViewIP Address: 18.156.13.209 18.156.13.209
              Source: Joe Sandbox ViewIP Address: 3.127.138.57 3.127.138.57
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: 2.tcp.eu.ngrok.io

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: Discord.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 7504, type: MEMORYSTR

              System Summary

              barindex
              Source: Discord.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: Discord.exe, type: SAMPLEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
              Source: Discord.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
              Source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: Discord.exe PID: 7504, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Discord.exe, 00000000.00000000.1690061826.0000000000EAE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs Discord.exe
              Source: Discord.exeBinary or memory string: OriginalFilenameStub.exe" vs Discord.exe
              Source: Discord.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Discord.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: Discord.exe, type: SAMPLEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
              Source: Discord.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
              Source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: Discord.exe PID: 7504, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@2/2
              Source: C:\Users\user\Desktop\Discord.exeMutant created: NULL
              Source: C:\Users\user\Desktop\Discord.exeMutant created: \Sessions\1\BaseNamedObjects\gonq3XlXWgiz
              Source: Discord.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: Discord.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\Discord.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Discord.exeReversingLabs: Detection: 86%
              Source: Discord.exeVirustotal: Detection: 80%
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeSection loaded: schannel.dllJump to behavior
              Source: Discord.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Discord.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Boot Survival

              barindex
              Source: Yara matchFile source: Discord.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 7504, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Discord.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 7504, type: MEMORYSTR
              Source: Discord.exeBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\Discord.exeMemory allocated: 1430000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeMemory allocated: 31D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeMemory allocated: 51D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Discord.exe TID: 7508Thread sleep time: -70000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\Discord.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: Discord.exeBinary or memory string: vmware
              Source: Discord.exe, 00000000.00000002.2933515051.00000000014BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\Discord.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeQueries volume information: C:\Users\user\Desktop\Discord.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Discord.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: Discord.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.Discord.exe.ea0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Discord.exe PID: 7504, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              2
              Virtualization/Sandbox Evasion
              OS Credential Dumping11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory2
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              DLL Side-Loading
              Security Account Manager13
              System Information Discovery
              SMB/Windows Admin SharesData from Network Shared Drive11
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Discord.exe87%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
              Discord.exe80%VirustotalBrowse
              Discord.exe100%AviraTR/Dropper.Gen
              Discord.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              2.tcp.eu.ngrok.io100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              2.tcp.eu.ngrok.io
              18.156.13.209
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                2.tcp.eu.ngrok.iotrue
                • Avira URL Cloud: malware
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                18.156.13.209
                2.tcp.eu.ngrok.ioUnited States
                16509AMAZON-02USfalse
                3.127.138.57
                unknownUnited States
                16509AMAZON-02USfalse
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1590493
                Start date and time:2025-01-14 06:06:07 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 3m 54s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:5
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:Discord.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@1/0@2/2
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 20
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target Discord.exe, PID 7504 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                18.156.13.209http://www.sdrclm.cn/vendor/phpdocumentor/P800/P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                • 2.tcp.eu.ngrok.io:17685/
                3.127.138.57f3aef511705f37f9792c6032b936ca61.exeGet hashmaliciousNjratBrowse
                  En3e396wX1.exeGet hashmaliciousNjratBrowse
                    ea1Wv7aq.posh.ps1Get hashmaliciousMetasploitBrowse
                      R3ov8eFFFP.exeGet hashmaliciousNjratBrowse
                        b8UsrDOVGV.exeGet hashmaliciousNjratBrowse
                          2G8CgDVl3K.exeGet hashmaliciousNjratBrowse
                            tiodtk2cfy.exeGet hashmaliciousNjratBrowse
                              QUuUm3J8x3.exeGet hashmaliciousNjratBrowse
                                RWqHoCWEPI.exeGet hashmaliciousNjratBrowse
                                  OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    2.tcp.eu.ngrok.iooiA5KmV0f0.exeGet hashmaliciousNjratBrowse
                                    • 3.126.37.18
                                    7166_output.vbsGet hashmaliciousAsyncRATBrowse
                                    • 18.156.13.209
                                    fBpY1pYq34.exeGet hashmaliciousNjratBrowse
                                    • 18.157.68.73
                                    f3aef511705f37f9792c6032b936ca61.exeGet hashmaliciousNjratBrowse
                                    • 3.126.37.18
                                    W9UAjNR4L6.exeGet hashmaliciousNjratBrowse
                                    • 3.126.37.18
                                    ULNZPn6D33.exeGet hashmaliciousSliverBrowse
                                    • 18.197.239.5
                                    Injector.exeGet hashmaliciousZTratBrowse
                                    • 18.197.239.5
                                    7zFM.exeGet hashmaliciousZTratBrowse
                                    • 3.126.37.18
                                    Game Laucher.exeGet hashmaliciousNjratBrowse
                                    • 18.192.93.86
                                    10.exeGet hashmaliciousUnknownBrowse
                                    • 18.192.93.86
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    AMAZON-02UShttp://locrmhelp.comGet hashmaliciousUnknownBrowse
                                    • 52.84.151.46
                                    https://imtcoken.im/Get hashmaliciousUnknownBrowse
                                    • 143.204.215.6
                                    http://www.toekan.im/Get hashmaliciousUnknownBrowse
                                    • 143.204.215.6
                                    http://bu9.fysou.web.id/webs6/cx.aktifkn.fiturrGet hashmaliciousUnknownBrowse
                                    • 108.138.26.27
                                    http://bu9.fysou.web.id/webs6/aktrfn.fitur.pylterGet hashmaliciousUnknownBrowse
                                    • 108.138.26.116
                                    http://pub-dfc04553e9094cfc93a2df6d57084097.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 3.75.10.80
                                    https://metahorizonsfacebooksupport.tempisite.com/italy39Get hashmaliciousHTMLPhisherBrowse
                                    • 54.229.247.168
                                    http://ubiquitous-twilight-c9292b.netlify.app/Get hashmaliciousUnknownBrowse
                                    • 3.75.10.80
                                    http://mattamaks_walletus.godaddysites.com/Get hashmaliciousHTMLPhisherBrowse
                                    • 13.248.243.5
                                    http://quizzical-dubinsky-9105e4.netlify.app/Get hashmaliciousUnknownBrowse
                                    • 3.124.100.143
                                    AMAZON-02UShttp://locrmhelp.comGet hashmaliciousUnknownBrowse
                                    • 52.84.151.46
                                    https://imtcoken.im/Get hashmaliciousUnknownBrowse
                                    • 143.204.215.6
                                    http://www.toekan.im/Get hashmaliciousUnknownBrowse
                                    • 143.204.215.6
                                    http://bu9.fysou.web.id/webs6/cx.aktifkn.fiturrGet hashmaliciousUnknownBrowse
                                    • 108.138.26.27
                                    http://bu9.fysou.web.id/webs6/aktrfn.fitur.pylterGet hashmaliciousUnknownBrowse
                                    • 108.138.26.116
                                    http://pub-dfc04553e9094cfc93a2df6d57084097.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 3.75.10.80
                                    https://metahorizonsfacebooksupport.tempisite.com/italy39Get hashmaliciousHTMLPhisherBrowse
                                    • 54.229.247.168
                                    http://ubiquitous-twilight-c9292b.netlify.app/Get hashmaliciousUnknownBrowse
                                    • 3.75.10.80
                                    http://mattamaks_walletus.godaddysites.com/Get hashmaliciousHTMLPhisherBrowse
                                    • 13.248.243.5
                                    http://quizzical-dubinsky-9105e4.netlify.app/Get hashmaliciousUnknownBrowse
                                    • 3.124.100.143
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):5.449594665780697
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:Discord.exe
                                    File size:46'080 bytes
                                    MD5:9dcd35fe3cafec7a25aa3cdd08ded1f4
                                    SHA1:13f199bfd3f8b2925536144a1b42424675d7c8e4
                                    SHA256:ce4f85d935fe68a1c92469367b945f26c40c71feb656ef844c30a5483dc5c0be
                                    SHA512:9a4293b2f2d0f1b86f116c5560a238ea5910454d5235aedb60695254d7cc2c3b1cd9dd1b890b9f94249ee0ca25a9fb457a66ca52398907a6d5775b0d2e2b70d3
                                    SSDEEP:768:KuPfZTg4pYiWUU9jjmo2qrGQ6vincPI9rjbQgX3i6cPlSZ8OoriBDZSx:KuPfZTgKa2AKU9/bXXS6ckUrcdSx
                                    TLSH:0F232B003BE9C127F2BF5B78ADF26105467AF2632A03D64E1CC4519B5613FC68A526FA
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....-e................................. ........@.. ....................... ............@................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x40c70e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x652DADE5 [Mon Oct 16 21:40:53 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc6b40x57.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x7ff.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xa7140xa8009d24fb5c6d931052766ec9573fb3764cFalse0.49923270089285715data5.504696129609637IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xe0000x7ff0x8000f68ce4dd77ed0bb9c1e6b31f6995d94False0.41748046875data4.88506844918463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x100000xc0x200f65a5e081190af50315d9bc15ce55ce3False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0xe0a00x2ccdata0.43575418994413406
                                    RT_MANIFEST0xe36c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 14, 2025 06:07:05.332602978 CET4973019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:05.337646008 CET196954973018.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:05.337779045 CET4973019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:05.349502087 CET4973019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:05.355328083 CET196954973018.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:06.984033108 CET196954973018.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:06.984270096 CET4973019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:12.021197081 CET4973019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:12.022241116 CET4973119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:12.026304960 CET196954973018.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:12.027439117 CET196954973118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:12.027661085 CET4973119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:12.028069973 CET4973119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:12.033030987 CET196954973118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:13.688561916 CET196954973118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:13.688767910 CET4973119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:18.691102982 CET4973119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:18.692384958 CET4973519695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:18.696106911 CET196954973118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:18.697300911 CET196954973518.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:18.697499037 CET4973519695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:18.698009968 CET4973519695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:18.702960014 CET196954973518.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:20.340380907 CET196954973518.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:20.344280958 CET4973519695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:25.347954988 CET4973519695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:25.350455999 CET4973919695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:25.352952957 CET196954973518.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:25.355343103 CET196954973918.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:25.355432034 CET4973919695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:25.357460022 CET4973919695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:25.362302065 CET196954973918.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:26.998084068 CET196954973918.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:26.998207092 CET4973919695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:32.003309965 CET4973919695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:32.004503012 CET4974019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:32.008378029 CET196954973918.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:32.009388924 CET196954974018.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:32.009473085 CET4974019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:32.009865046 CET4974019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:32.014729977 CET196954974018.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:33.654287100 CET196954974018.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:33.654376030 CET4974019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:38.659298897 CET4974019695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:38.660160065 CET4974119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:38.664360046 CET196954974018.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:38.664979935 CET196954974118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:38.665055990 CET4974119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:38.665385962 CET4974119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:38.670191050 CET196954974118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:40.310528040 CET196954974118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:40.310669899 CET4974119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:45.315799952 CET4974119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:45.317064047 CET4974219695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:45.320624113 CET196954974118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:45.321866035 CET196954974218.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:45.321947098 CET4974219695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:45.322321892 CET4974219695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:45.327205896 CET196954974218.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:46.970494032 CET196954974218.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:46.970611095 CET4974219695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:51.971903086 CET4974219695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:51.972966909 CET4974319695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:51.976839066 CET196954974218.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:51.977910995 CET196954974318.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:51.978002071 CET4974319695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:51.978347063 CET4974319695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:51.983185053 CET196954974318.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:53.625164032 CET196954974318.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:53.625303984 CET4974319695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:58.628204107 CET4974319695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:58.629220963 CET4975119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:58.633107901 CET196954974318.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:58.634176016 CET196954975118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:07:58.634290934 CET4975119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:58.634751081 CET4975119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:07:58.639636040 CET196954975118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:08:00.280348063 CET196954975118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:08:00.280440092 CET4975119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:08:05.285882950 CET4975119695192.168.2.418.156.13.209
                                    Jan 14, 2025 06:08:05.290786028 CET196954975118.156.13.209192.168.2.4
                                    Jan 14, 2025 06:08:05.297043085 CET4979719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:05.302000046 CET19695497973.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:05.302087069 CET4979719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:05.302545071 CET4979719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:05.307400942 CET19695497973.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:06.955172062 CET19695497973.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:06.955363989 CET4979719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:11.956192970 CET4979719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:11.956924915 CET4983219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:11.961025953 CET19695497973.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:11.961910963 CET19695498323.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:11.963957071 CET4983219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:11.964227915 CET4983219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:11.969106913 CET19695498323.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:13.591449976 CET19695498323.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:13.591572046 CET4983219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:18.596910000 CET4983219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:18.598440886 CET4987719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:18.601799965 CET19695498323.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:18.603285074 CET19695498773.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:18.603363037 CET4987719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:18.603703022 CET4987719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:18.608468056 CET19695498773.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:20.251400948 CET19695498773.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:20.251477957 CET4987719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:25.253062963 CET4987719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:25.253880024 CET4992219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:25.257884979 CET19695498773.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:25.258737087 CET19695499223.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:25.258825064 CET4992219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:25.259079933 CET4992219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:25.263866901 CET19695499223.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:26.940983057 CET19695499223.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:26.941346884 CET4992219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:31.956110954 CET4992219695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:31.956996918 CET4996119695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:31.961069107 CET19695499223.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:31.961819887 CET19695499613.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:31.961941957 CET4996119695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:31.962507010 CET4996119695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:31.967302084 CET19695499613.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:33.628348112 CET19695499613.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:33.628484011 CET4996119695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:38.643721104 CET4996119695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:38.644591093 CET5000519695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:38.648629904 CET19695499613.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:38.649422884 CET19695500053.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:38.649504900 CET5000519695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:38.650104046 CET5000519695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:38.656948090 CET19695500053.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:40.279841900 CET19695500053.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:40.280035973 CET5000519695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:45.284337997 CET5000519695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:45.285201073 CET5001719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:45.289159060 CET19695500053.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:45.290154934 CET19695500173.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:45.290241957 CET5001719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:45.290599108 CET5001719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:45.295403957 CET19695500173.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:47.811255932 CET19695500173.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:47.811480999 CET5001719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:47.813889027 CET19695500173.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:47.813972950 CET19695500173.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:47.814054966 CET5001719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:47.814054966 CET5001719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:47.814477921 CET19695500173.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:47.814610004 CET5001719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:52.815524101 CET5001719695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:52.816584110 CET5001819695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:52.820370913 CET19695500173.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:52.821461916 CET19695500183.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:52.821579933 CET5001819695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:52.822000980 CET5001819695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:52.826761007 CET19695500183.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:54.450695992 CET19695500183.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:54.450776100 CET5001819695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:59.456098080 CET5001819695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:59.457019091 CET5001919695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:59.460901022 CET19695500183.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:59.461889982 CET19695500193.127.138.57192.168.2.4
                                    Jan 14, 2025 06:08:59.461987019 CET5001919695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:59.462294102 CET5001919695192.168.2.43.127.138.57
                                    Jan 14, 2025 06:08:59.467058897 CET19695500193.127.138.57192.168.2.4
                                    Jan 14, 2025 06:09:01.092858076 CET19695500193.127.138.57192.168.2.4
                                    Jan 14, 2025 06:09:01.092976093 CET5001919695192.168.2.43.127.138.57
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 14, 2025 06:07:05.320638895 CET5558353192.168.2.41.1.1.1
                                    Jan 14, 2025 06:07:05.330457926 CET53555831.1.1.1192.168.2.4
                                    Jan 14, 2025 06:08:05.287142992 CET6162553192.168.2.41.1.1.1
                                    Jan 14, 2025 06:08:05.296385050 CET53616251.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 14, 2025 06:07:05.320638895 CET192.168.2.41.1.1.10x66a9Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                    Jan 14, 2025 06:08:05.287142992 CET192.168.2.41.1.1.10x390aStandard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 14, 2025 06:07:05.330457926 CET1.1.1.1192.168.2.40x66a9No error (0)2.tcp.eu.ngrok.io18.156.13.209A (IP address)IN (0x0001)false
                                    Jan 14, 2025 06:08:05.296385050 CET1.1.1.1192.168.2.40x390aNo error (0)2.tcp.eu.ngrok.io3.127.138.57A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Target ID:0
                                    Start time:00:07:00
                                    Start date:14/01/2025
                                    Path:C:\Users\user\Desktop\Discord.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\Discord.exe"
                                    Imagebase:0xea0000
                                    File size:46'080 bytes
                                    MD5 hash:9DCD35FE3CAFEC7A25AA3CDD08DED1F4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.1690024074.0000000000EA2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:false

                                    Reset < >
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a^q$ a^q$,$xbq
                                      • API String ID: 0-2180861429
                                      • Opcode ID: 3ef7a0c4cf24dcc2abc3bdb3271289a083ae00bfcafb3a0e2c07cdd43dcdc53e
                                      • Instruction ID: 12c9207bdd9ac87dc0bf4f8eb35bf62916988ae20cb233a794050aa539fe4d77
                                      • Opcode Fuzzy Hash: 3ef7a0c4cf24dcc2abc3bdb3271289a083ae00bfcafb3a0e2c07cdd43dcdc53e
                                      • Instruction Fuzzy Hash: 6002ADB07012049FC715DF29D444B2E7BE2FF98705F148A69E4169F3A5DB74AC86CB82
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a^q$ a^q$xbq
                                      • API String ID: 0-2081302502
                                      • Opcode ID: 4972cd715cde34188d1cb9d8abaa980e48e0549fa0326a6ff0a19c9b4e353b42
                                      • Instruction ID: cfacd9563e3f5caadff5f0fba3154050d9f970ebeb688f013092b484003ce267
                                      • Opcode Fuzzy Hash: 4972cd715cde34188d1cb9d8abaa980e48e0549fa0326a6ff0a19c9b4e353b42
                                      • Instruction Fuzzy Hash: 07617AB07003048FD7259F29D444B6A7BE2FB98705F108A69E5169F3A4DBB1AD86CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (bq$Te^q$d7p
                                      • API String ID: 0-1699803613
                                      • Opcode ID: 9c11f169796b012e0ac03aed44eae8518472299941e1c452956f91fecae5252d
                                      • Instruction ID: 64f88ac103c0239e314ee273462c298495d78199fa5945410cc3db28962ce656
                                      • Opcode Fuzzy Hash: 9c11f169796b012e0ac03aed44eae8518472299941e1c452956f91fecae5252d
                                      • Instruction Fuzzy Hash: 2A519D74B102148FCB54DF6DD458A5EBBF6FF89710F2581AAE802DB3A5CA759C01CB80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hbq$dLdq
                                      • API String ID: 0-411705877
                                      • Opcode ID: b443507dcfd1a702e781d4f460b5d0cc008ecf8baea6f64dea717ebb354f6074
                                      • Instruction ID: ff23265e82b5dcb36fe3c4971ac1265f4ed5342e31263fc460ebba7899ad2541
                                      • Opcode Fuzzy Hash: b443507dcfd1a702e781d4f460b5d0cc008ecf8baea6f64dea717ebb354f6074
                                      • Instruction Fuzzy Hash: 5741D331B042148FCB19DF6CD458A9EBBF2BF88310F1445AAE406EB3A2CB759C05CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR^q
                                      • API String ID: 0-2625958711
                                      • Opcode ID: ef5b3bd7c63dc5c881a9bb8b726ed82e9abf9e5abc90f90cbca4eca5babb34a7
                                      • Instruction ID: db2244af32def377af7f81cf61eb2cc00218396d1d6b152d87e0c12d774feb08
                                      • Opcode Fuzzy Hash: ef5b3bd7c63dc5c881a9bb8b726ed82e9abf9e5abc90f90cbca4eca5babb34a7
                                      • Instruction Fuzzy Hash: 8D31E174F002168FDB14AB7C945096FBBF6EFC9614B14416EE54ADB3A1EE308C028792
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: dLdq
                                      • API String ID: 0-3390252261
                                      • Opcode ID: 95dc2ae487ba17d70b7a444598443b183716b30bab9031501d15fdcdb2bcd41e
                                      • Instruction ID: 9063a083a32ce97e0c54601e9a247a699a8e26fe29136172d4b4d09e47283728
                                      • Opcode Fuzzy Hash: 95dc2ae487ba17d70b7a444598443b183716b30bab9031501d15fdcdb2bcd41e
                                      • Instruction Fuzzy Hash: 36316D71A002158FDB14DF69D488BAEBBF2BF88300F14856AE406AB361CB75ED45CF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hbq
                                      • API String ID: 0-1245868
                                      • Opcode ID: 3af0d0d4936838ecffdfe9a91e03fe16afa88b249cdcfb5245c4142145232502
                                      • Instruction ID: 5917a884fac4c71239c90076ee9b848f552851d5d430168c7d5e433e35340494
                                      • Opcode Fuzzy Hash: 3af0d0d4936838ecffdfe9a91e03fe16afa88b249cdcfb5245c4142145232502
                                      • Instruction Fuzzy Hash: B6F02231B043904FC3969B3CA41446E3FE3AFDA22032508FAE10ACB3A2DD2C8C068761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 25dd6d2be9d105c7da1b43afd794b52346505570de3f0f16bd3a1290c34a18d1
                                      • Instruction ID: 94d4a187521a2425aefeb631dffd1149685eb37f4935c66f4bd563101ba4bbf0
                                      • Opcode Fuzzy Hash: 25dd6d2be9d105c7da1b43afd794b52346505570de3f0f16bd3a1290c34a18d1
                                      • Instruction Fuzzy Hash: 895109B4503319CFC725DF26E44454A77B6FB8430AB108A69D8168B298DB39AD86CF92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a6c4effa8d81d94eeb19ce0f92beff78f755231bc04c7b67d82de92c5fbf2e23
                                      • Instruction ID: 3346e21254bde9753fe2b4d469a70e0b3b6aa3058ed5befe5bb1d72c1b0df4f0
                                      • Opcode Fuzzy Hash: a6c4effa8d81d94eeb19ce0f92beff78f755231bc04c7b67d82de92c5fbf2e23
                                      • Instruction Fuzzy Hash: 9F4168B1E00209AFCB44EFB9854466EBBFAFFC8701F20856AD54AD7345DB349D428B91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a81ba6ee1402ddc0f0cdc4dc986ab10479a8dbbb52c89d0ccb8aea2db4d55bdf
                                      • Instruction ID: b3dd97323b1085ba4d7df6758de4277378641eb1bbcf1c335f738f34d7bce9d9
                                      • Opcode Fuzzy Hash: a81ba6ee1402ddc0f0cdc4dc986ab10479a8dbbb52c89d0ccb8aea2db4d55bdf
                                      • Instruction Fuzzy Hash: AB212B75B001059FD714DB69C594BAEBBF2BF8CB20F248159E901EB3A5CB719C01CB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933227477.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13dd000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e8274b7fbf2e406868ea08d3692ab5b34949df7065caf7ba8c17d46b4dff4bee
                                      • Instruction ID: 7dae0e504fbddb09f8fd96af6fc4c7bc60e7c38dce3209ce03a25b63cb6db9c7
                                      • Opcode Fuzzy Hash: e8274b7fbf2e406868ea08d3692ab5b34949df7065caf7ba8c17d46b4dff4bee
                                      • Instruction Fuzzy Hash: 402128B2504204DFDB06DF98E9C0B26BF66FB94328F64C56DE90A0B296C336D416C7A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 546b5f425413e42fdbf4bd2b595f4823f46d30136742233e3ea895c1b21e2128
                                      • Instruction ID: b90ab25c0bbca18faa19ad296cbeef72c5eae327ce8dc4f38dad18d8e06f5608
                                      • Opcode Fuzzy Hash: 546b5f425413e42fdbf4bd2b595f4823f46d30136742233e3ea895c1b21e2128
                                      • Instruction Fuzzy Hash: 712153707013068FDB79AB79A55427F3AE8AFA8305F10472EF847D72A4EA348942CB55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6283052732121da592004c88e3df8b462fa2f43498d8fc805fa17003ac3c012b
                                      • Instruction ID: 4e665edb283a6f6fb861562096a33737c71793c023edbbf31a44cb6b03e4fac8
                                      • Opcode Fuzzy Hash: 6283052732121da592004c88e3df8b462fa2f43498d8fc805fa17003ac3c012b
                                      • Instruction Fuzzy Hash: A32136707112068FDF74BBB9B51462F3AE8AF98705F00472AB507C7295EE34C942CB56
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933227477.00000000013DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013DD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_13dd000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                      • Instruction ID: 0b25cd185515732551ae1dfffb2a7cba7405c351976663c387b8784d4f965f94
                                      • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                      • Instruction Fuzzy Hash: 9611D376904240DFDB16CF58D9C4B16BF72FB84328F24C5A9D9090B297C336D45ACBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 879da8792fd059b2bc852c87e1e3e78cba130909eae282e8f3a69bfdb78cfb79
                                      • Instruction ID: 3c600ab2758d684d5de99ca7789f583441d2e7a08a040dec1d5680d590a8bed7
                                      • Opcode Fuzzy Hash: 879da8792fd059b2bc852c87e1e3e78cba130909eae282e8f3a69bfdb78cfb79
                                      • Instruction Fuzzy Hash: 8A11CE70A01309DFCB54DFB9C50466A77F5EF88710B0004BAD405CB360EA35DC42CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f7ad7204e38d1991f6a3907682077c666981fdaefb6519ac10e9211310fc20ec
                                      • Instruction ID: a521e93aa1f583841a32464e2f45d935a0bb981f2651463672da7d115fc0798b
                                      • Opcode Fuzzy Hash: f7ad7204e38d1991f6a3907682077c666981fdaefb6519ac10e9211310fc20ec
                                      • Instruction Fuzzy Hash: 0511A1B0B01209DFCB54DBB9D504A2B7BE6EF8C605B1004B9D409CB360EA35DC42CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5adbef34ad0304c8a4426f209e3ddb7763fbf6d976dbd748d092b21302a60d94
                                      • Instruction ID: cc942d488663d7129692f738cef9e00506c6c5dbca4a301f67d54b8b734145ff
                                      • Opcode Fuzzy Hash: 5adbef34ad0304c8a4426f209e3ddb7763fbf6d976dbd748d092b21302a60d94
                                      • Instruction Fuzzy Hash: DE015A70B02215CFEB58DFA990006BE77B4EF98614F08416EC81997361DB345D428B82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 812b902ec87fc426a089568bb4b83489314e356802ec89804d10e58894af653b
                                      • Instruction ID: 0f4d2ec66aeeda6c14b21f0065e29cc10f1e1c9631b389024f41835ed0579200
                                      • Opcode Fuzzy Hash: 812b902ec87fc426a089568bb4b83489314e356802ec89804d10e58894af653b
                                      • Instruction Fuzzy Hash: 3AE08C363002045F87549A2EF88885AB7DAEBC862432408B9E10AC7365DD60CC014390
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b0060946c11d271e6d234d574d8ce81f9c1531ddf462113e2e304fa7fcd6c934
                                      • Instruction ID: fb28cf89966f819fab31223f6200de48630bdc0068311f13703ec4e2171cc4e8
                                      • Opcode Fuzzy Hash: b0060946c11d271e6d234d574d8ce81f9c1531ddf462113e2e304fa7fcd6c934
                                      • Instruction Fuzzy Hash: 87C0122410534ACADB3223E4A008A283AA8A7E830AF00030BF1024A9E58E340803871A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2933495710.0000000001430000.00000040.00000800.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_1430000_Discord.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 564fd0803b757f38fdae702064076fa9d076a371376fa903b6b0f05f0c1d4cd4
                                      • Instruction ID: 2a78c0bba50ec6c940567cdaf7f74fdca3da3c857ad5d5b65d01168d1dc2a5e4
                                      • Opcode Fuzzy Hash: 564fd0803b757f38fdae702064076fa9d076a371376fa903b6b0f05f0c1d4cd4
                                      • Instruction Fuzzy Hash: 9CC0122810530ACED33233E4A008A2C39A8ABE830AF000306F1024A9E58E340803431A