Edit tour

Windows Analysis Report
Payload.exe

Overview

General Information

Sample name:Payload.exe
Analysis ID:1646197
MD5:e3250ba3e962ddf90560e00c92659cf9
SHA1:f6904cfed503a1009923141b3028875bab2aa08c
SHA256:92123431a5d7c000dfa423656179055bc8b3e4c96ed94b90cd334b2feb8818b6
Tags:exeuser-BastianHein
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Disables zone checking for all users
Joe Sandbox ML detected suspicious sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Payload.exe (PID: 2660 cmdline: "C:\Users\user\Desktop\Payload.exe" MD5: E3250BA3E962DDF90560E00C92659CF9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{
  "Host": "size-ingredients.gl.at.ply.gg",
  "Port": "5407",
  "Version": "<- NjRAT 0.7d Horror Edition ->",
  "Registry Name": "a1cb840a8f8b330a9629751db128f43f",
  "Campaign ID": "Victim",
  "Network Seprator": "Y262SUCZ4UJJ"
}
SourceRuleDescriptionAuthorStrings
Payload.exeJoeSecurity_NjratYara detected NjratJoe Security
    Payload.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x933c:$a1: get_Registry
    • 0xc34c:$a2: SEE_MASK_NOZONECHECKS
    • 0xb156:$a3: Download ERROR
    • 0xc5a7:$a4: cmd.exe /c ping 0 -n 2 & del "
    Payload.exeRevengeRAT_Sep17Detects RevengeRAT malwareFlorian Roth
    • 0xa4d5:$x3: 03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
    Payload.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0xc5a7:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0xafb6:$s1: winmgmts:\\.\root\SecurityCenter2
    • 0xb17c:$s3: Executed As
    • 0x9b5f:$s5: Stub.exe
    • 0xb156:$s6: Download ERROR
    • 0xaf78:$s8: Select * From AntiVirusProduct
    Payload.exeUnknown_Malware_Sample_Jul17_2Detects unknown malware sample with pastebin RAW URLFlorian Roth
    • 0xcadd:$s1: 4System.Web.Services.Protocols.SoapHttpClientProtocol
    • 0xadc4:$s2: https://pastebin.com/raw/
    • 0xce27:$s3: My.Computer
    • 0xcab7:$s4: MyTemplate
    Click to see the 4 entries
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x913c:$a1: get_Registry
      • 0xc14c:$a2: SEE_MASK_NOZONECHECKS
      • 0xaf56:$a3: Download ERROR
      • 0xc3a7:$a4: cmd.exe /c ping 0 -n 2 & del "
      00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0xc14c:$a2: SEE_MASK_NOZONECHECKS
      • 0xc42f:$b1: [TAP]
      • 0xc3a7:$c3: cmd.exe /c ping
      00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0xc14c:$reg: SEE_MASK_NOZONECHECKS
      • 0xaf32:$msg: Execute ERROR
      • 0xaf96:$msg: Execute ERROR
      • 0xc3a7:$ping: cmd.exe /c ping 0 -n 2 & del
      Process Memory Space: Payload.exe PID: 2660JoeSecurity_NjratYara detected NjratJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.Payload.exe.350000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
          0.0.Payload.exe.350000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x933c:$a1: get_Registry
          • 0xc34c:$a2: SEE_MASK_NOZONECHECKS
          • 0xb156:$a3: Download ERROR
          • 0xc5a7:$a4: cmd.exe /c ping 0 -n 2 & del "
          0.0.Payload.exe.350000.0.unpackRevengeRAT_Sep17Detects RevengeRAT malwareFlorian Roth
          • 0xa4d5:$x3: 03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
          0.0.Payload.exe.350000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
          • 0xc5a7:$x1: cmd.exe /c ping 0 -n 2 & del "
          • 0xafb6:$s1: winmgmts:\\.\root\SecurityCenter2
          • 0xb17c:$s3: Executed As
          • 0x9b5f:$s5: Stub.exe
          • 0xb156:$s6: Download ERROR
          • 0xaf78:$s8: Select * From AntiVirusProduct
          0.0.Payload.exe.350000.0.unpackUnknown_Malware_Sample_Jul17_2Detects unknown malware sample with pastebin RAW URLFlorian Roth
          • 0xcadd:$s1: 4System.Web.Services.Protocols.SoapHttpClientProtocol
          • 0xadc4:$s2: https://pastebin.com/raw/
          • 0xce27:$s3: My.Computer
          • 0xcab7:$s4: MyTemplate
          Click to see the 4 entries
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Payload.exeAvira: detected
          Source: 0.0.Payload.exe.350000.0.unpackMalware Configuration Extractor: Njrat {"Host": "size-ingredients.gl.at.ply.gg", "Port": "5407", "Version": "<- NjRAT 0.7d Horror Edition ->", "Registry Name": "a1cb840a8f8b330a9629751db128f43f", "Campaign ID": "Victim", "Network Seprator": "Y262SUCZ4UJJ"}
          Source: Payload.exeVirustotal: Detection: 80%Perma Link
          Source: Payload.exeReversingLabs: Detection: 86%
          Source: Yara matchFile source: Payload.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Payload.exe PID: 2660, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: Payload.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\Payload.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: Payload.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: global trafficTCP traffic: 192.168.2.9:49683 -> 147.185.221.27:5407
          Source: Joe Sandbox ViewIP Address: 147.185.221.27 147.185.221.27
          Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: size-ingredients.gl.at.ply.gg
          Source: Payload.exeString found in binary or memory: https://pastebin.com/raw/???

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Payload.exe, kl.cs.Net Code: VKCodeToUnicode

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: Payload.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Payload.exe PID: 2660, type: MEMORYSTR

          System Summary

          barindex
          Source: Payload.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: Payload.exe, type: SAMPLEMatched rule: Detects RevengeRAT malware Author: Florian Roth
          Source: Payload.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
          Source: Payload.exe, type: SAMPLEMatched rule: Detects unknown malware sample with pastebin RAW URL Author: Florian Roth
          Source: Payload.exe, type: SAMPLEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
          Source: Payload.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: Payload.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: Payload.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Detects RevengeRAT malware Author: Florian Roth
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Detects unknown malware sample with pastebin RAW URL Author: Florian Roth
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
          Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\Payload.exeCode function: 0_2_04B203600_2_04B20360
          Source: C:\Users\user\Desktop\Payload.exeCode function: 0_2_04B20D700_2_04B20D70
          Source: C:\Users\user\Desktop\Payload.exeCode function: 0_2_04B20D230_2_04B20D23
          Source: Payload.exe, 00000000.00000002.3361415208.00000000008FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs Payload.exe
          Source: Payload.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: Payload.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: Payload.exe, type: SAMPLEMatched rule: RevengeRAT_Sep17 date = 2017-09-04, hash3 = fe00c4f9c8439eea50b44f817f760d8107f81e2dba7f383009fde508ff4b8967, hash2 = 7c271484c11795876972aabeb277c7b3035f896c9e860a852d69737df6e14213, hash1 = 2a86a4b2dcf1657bcb2922e70fc787aa9b66ec1c26dc2119f669bd2ce3f2e94a, author = Florian Roth, description = Detects RevengeRAT malware, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: Payload.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: Payload.exe, type: SAMPLEMatched rule: Unknown_Malware_Sample_Jul17_2 date = 2017-08-01, hash1 = 3530d480db082af1823a7eb236203aca24dc3685f08c301466909f0794508a52, author = Florian Roth, description = Detects unknown malware sample with pastebin RAW URL, reference = https://goo.gl/iqH8CK, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: Payload.exe, type: SAMPLEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
          Source: Payload.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: Payload.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: Payload.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: RevengeRAT_Sep17 date = 2017-09-04, hash3 = fe00c4f9c8439eea50b44f817f760d8107f81e2dba7f383009fde508ff4b8967, hash2 = 7c271484c11795876972aabeb277c7b3035f896c9e860a852d69737df6e14213, hash1 = 2a86a4b2dcf1657bcb2922e70fc787aa9b66ec1c26dc2119f669bd2ce3f2e94a, author = Florian Roth, description = Detects RevengeRAT malware, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Unknown_Malware_Sample_Jul17_2 date = 2017-08-01, hash1 = 3530d480db082af1823a7eb236203aca24dc3685f08c301466909f0794508a52, author = Florian Roth, description = Detects unknown malware sample with pastebin RAW URL, reference = https://goo.gl/iqH8CK, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
          Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@1/0@1/1
          Source: C:\Users\user\Desktop\Payload.exeCode function: 0_2_04D20F32 AdjustTokenPrivileges,0_2_04D20F32
          Source: C:\Users\user\Desktop\Payload.exeCode function: 0_2_04D20EFB AdjustTokenPrivileges,0_2_04D20EFB
          Source: C:\Users\user\Desktop\Payload.exeMutant created: NULL
          Source: C:\Users\user\Desktop\Payload.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Users\user\Desktop\Payload.exeMutant created: \Sessions\1\BaseNamedObjects\a1cb840a8f8b330a9629751db128f43f
          Source: Payload.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: Payload.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\Payload.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Payload.exeVirustotal: Detection: 80%
          Source: Payload.exeReversingLabs: Detection: 86%
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
          Source: Payload.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: C:\Users\user\Desktop\Payload.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: Payload.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Payload.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Payload.exeBinary or memory string: WIRESHARK.EXE9HTTPS://PASTEBIN.COM/RAW/???NULL
          Source: Payload.exe, 00000000.00000002.3362364190.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
          Source: C:\Users\user\Desktop\Payload.exeMemory allocated: D10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeMemory allocated: 29C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeMemory allocated: D10000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeWindow / User API: threadDelayed 3696Jump to behavior
          Source: C:\Users\user\Desktop\Payload.exeWindow / User API: threadDelayed 5570Jump to behavior
          Source: C:\Users\user\Desktop\Payload.exeWindow / User API: foregroundWindowGot 1765Jump to behavior
          Source: C:\Users\user\Desktop\Payload.exe TID: 6164Thread sleep count: 254 > 30Jump to behavior
          Source: C:\Users\user\Desktop\Payload.exe TID: 6164Thread sleep time: -254000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Payload.exe TID: 6340Thread sleep count: 3696 > 30Jump to behavior
          Source: C:\Users\user\Desktop\Payload.exe TID: 6164Thread sleep count: 5570 > 30Jump to behavior
          Source: C:\Users\user\Desktop\Payload.exe TID: 6164Thread sleep time: -5570000s >= -30000sJump to behavior
          Source: Payload.exeBinary or memory string: VBoxService%\\.\PhysicalDrive0
          Source: Payload.exe, 00000000.00000002.3361415208.000000000095E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW>
          Source: Payload.exe, 00000000.00000002.3361415208.000000000095E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\Payload.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\Payload.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: Payload.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
          Source: Payload.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
          Source: Payload.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
          Source: Payload.exeBinary or memory string: Program Manager
          Source: Payload.exeBinary or memory string: Progman
          Source: Payload.exeBinary or memory string: Shell_TrayWnd+set CDAudio door open/set CDAudio door closed
          Source: Payload.exe, 00000000.00000002.3362364190.0000000002A7D000.00000004.00000800.00020000.00000000.sdmp, Payload.exe, 00000000.00000002.3362364190.0000000002BB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
          Source: C:\Users\user\Desktop\Payload.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Users\user\Desktop\Payload.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
          Source: Payload.exe, 00000000.00000002.3362364190.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Wireshark.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Payload.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Payload.exe PID: 2660, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Payload.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.Payload.exe.350000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Payload.exe PID: 2660, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          1
          Input Capture
          111
          Security Software Discovery
          Remote Services1
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Process Injection
          11
          Disable or Modify Tools
          LSASS Memory2
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Access Token Manipulation
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA Secrets2
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646197 Sample: Payload.exe Startdate: 23/03/2025 Architecture: WINDOWS Score: 100 10 size-ingredients.gl.at.ply.gg 2->10 14 Found malware configuration 2->14 16 Malicious sample detected (through community Yara rule) 2->16 18 Antivirus / Scanner detection for submitted sample 2->18 20 7 other signatures 2->20 6 Payload.exe 3 4 2->6         started        signatures3 process4 dnsIp5 12 size-ingredients.gl.at.ply.gg 147.185.221.27, 5407 SALSGIVERUS United States 6->12 22 Disables zone checking for all users 6->22 24 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 6->24 signatures6

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          No bigger version
          No bigger version
          No bigger version

          windows-stand
          SourceDetectionScannerLabelLink
          Payload.exe80%VirustotalBrowse
          Payload.exe86%ReversingLabsByteCode-MSIL.Backdoor.njRAT
          Payload.exe100%AviraTR/Dropper.Gen7
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches

          Download Network PCAP: filteredfull

          NameIPActiveMaliciousAntivirus DetectionReputation
          size-ingredients.gl.at.ply.gg
          147.185.221.27
          truetrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://pastebin.com/raw/???Payload.exefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              147.185.221.27
              size-ingredients.gl.at.ply.ggUnited States
              12087SALSGIVERUStrue
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1646197
              Start date and time:2025-03-23 16:17:16 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 18s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:13
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Payload.exe
              Detection:MAL
              Classification:mal100.phis.troj.spyw.evad.winEXE@1/0@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 67
              • Number of non-executed functions: 1
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.109.210.53, 23.204.23.20, 2.23.227.208
              • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              11:18:56API Interceptor1077269x Sleep call for process: Payload.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              147.185.221.27pisun.exeGet hashmaliciousNjratBrowse
                XClient.exeGet hashmaliciousXWormBrowse
                  Server.exe.bin.exeGet hashmaliciousNjratBrowse
                    RobloxInstaller.exeGet hashmaliciousUnknownBrowse
                      tsetup-x64.5.9.0.exeGet hashmaliciousRDPWrap ToolBrowse
                        123123.exe.bin.exeGet hashmaliciousNjratBrowse
                          Payload.exe.bin.exeGet hashmaliciousNjratBrowse
                            Payload1234.exe.bin.exeGet hashmaliciousNjratBrowse
                              remover.exeGet hashmaliciousUnknownBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                size-ingredients.gl.at.ply.gg123123.exe.bin.exeGet hashmaliciousNjratBrowse
                                • 147.185.221.27
                                Payload.exe.bin.exeGet hashmaliciousNjratBrowse
                                • 147.185.221.27
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                SALSGIVERUSpisun.exeGet hashmaliciousNjratBrowse
                                • 147.185.221.27
                                XClient.exeGet hashmaliciousXWormBrowse
                                • 147.185.221.27
                                winupdate.scr.exeGet hashmaliciousUnknownBrowse
                                • 147.185.221.26
                                Bootstrapper.exeGet hashmaliciousXWormBrowse
                                • 147.185.221.26
                                Microsoft Word Host.exeGet hashmaliciousSheetRatBrowse
                                • 147.185.221.26
                                Client.exe.bin.exeGet hashmaliciousSheetRatBrowse
                                • 147.185.221.26
                                Server.exe.bin.exeGet hashmaliciousNjratBrowse
                                • 147.185.221.27
                                8M42o4UI1xlnUeX.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                • 147.185.221.26
                                RobloxInstaller.exeGet hashmaliciousUnknownBrowse
                                • 147.185.221.27
                                tsetup-x64.5.9.0.exeGet hashmaliciousRDPWrap ToolBrowse
                                • 147.185.221.27
                                No context
                                No context
                                No created / dropped files found
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):5.617457264202004
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:Payload.exe
                                File size:55'808 bytes
                                MD5:e3250ba3e962ddf90560e00c92659cf9
                                SHA1:f6904cfed503a1009923141b3028875bab2aa08c
                                SHA256:92123431a5d7c000dfa423656179055bc8b3e4c96ed94b90cd334b2feb8818b6
                                SHA512:8e78bf75eec8fc294fc11e5fc6eb69230b7e6d9a8676944cf9b1fe581b6f1fc5d931fd3efedd6ffe63b396ee69de34e18c07501fb7f3b2c8df3a5993c9eafd5d
                                SSDEEP:768:CkoLg652Eslt/aNxND3O4JSNjxWQG35bmaePD5Pv+2XXJdxIEpm7g:CkSVGtiNjDTGdWQcGDxX3xIEpm7g
                                TLSH:DE432944BBE68A05E2BD8F3468F665150B34AA23E632DB1F8CD558DB13327C68C44FE5
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....2.g............................>.... ........@.. .......................@............@................................
                                Icon Hash:90cececece8e8eb0
                                Entrypoint:0x40f03e
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x67DC32E8 [Thu Mar 20 15:23:20 2025 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xeff00x4b.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x240.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xd0440xd20094112bf1b23749053389cd3436bae813False0.4519903273809524data5.638167311235547IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x100000x2400x4000da1702fee35fb285b88cc25720ab75aFalse0.310546875data4.964962934397579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x120000xc0x200a44a373176d72c27a795808f061fdec2False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_MANIFEST0x100580x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
                                DLLImport
                                mscoree.dll_CorExeMain

                                Download Network PCAP: filteredfull

                                • Total Packets: 55
                                • 5407 undefined
                                • 53 (DNS)
                                TimestampSource PortDest PortSource IPDest IP
                                Mar 23, 2025 16:18:27.231443882 CET496835407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:18:28.236660004 CET496835407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:18:30.252402067 CET496835407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:18:34.252348900 CET496835407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:18:42.252397060 CET496835407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:18:50.342982054 CET496915407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:18:51.346162081 CET496915407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:18:53.369100094 CET496915407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:18:57.377439976 CET496915407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:05.377597094 CET496915407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:13.410804987 CET496965407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:14.424447060 CET496965407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:16.424462080 CET496965407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:20.424493074 CET496965407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:28.440207005 CET496965407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:36.473608017 CET496975407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:37.502762079 CET496975407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:39.518446922 CET496975407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:43.534243107 CET496975407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:51.549840927 CET496975407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:19:59.598352909 CET496985407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:00.690345049 CET496985407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:02.690352917 CET496985407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:06.784116030 CET496985407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:14.785693884 CET496985407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:22.912817955 CET496995407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:24.065553904 CET496995407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:26.159224987 CET496995407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:30.253002882 CET496995407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:38.253015041 CET496995407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:46.270284891 CET497005407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:47.284344912 CET497005407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:49.284327030 CET497005407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:20:53.299974918 CET497005407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:01.315648079 CET497005407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:09.384160042 CET497015407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:10.456304073 CET497015407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:12.456350088 CET497015407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:16.550090075 CET497015407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:24.643882036 CET497015407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:32.661251068 CET497025407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:33.753319979 CET497025407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:35.753312111 CET497025407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:39.847100019 CET497025407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:47.956491947 CET497025407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:55.974251032 CET497035407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:57.065920115 CET497035407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:21:59.065917015 CET497035407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:22:03.065941095 CET497035407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:22:11.065970898 CET497035407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:22:19.083786964 CET497055407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:22:20.253566980 CET497055407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:22:22.253546953 CET497055407192.168.2.9147.185.221.27
                                Mar 23, 2025 16:22:26.253586054 CET497055407192.168.2.9147.185.221.27
                                TimestampSource PortDest PortSource IPDest IP
                                Mar 23, 2025 16:18:27.047147989 CET4953453192.168.2.91.1.1.1
                                Mar 23, 2025 16:18:27.227035046 CET53495341.1.1.1192.168.2.9
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Mar 23, 2025 16:18:27.047147989 CET192.168.2.91.1.1.10xe88fStandard query (0)size-ingredients.gl.at.ply.ggA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Mar 23, 2025 16:18:27.227035046 CET1.1.1.1192.168.2.90xe88fNo error (0)size-ingredients.gl.at.ply.gg147.185.221.27A (IP address)IN (0x0001)false
                                050100150200s020406080100

                                Click to jump to process

                                050100150200s0.0051015MB

                                Click to jump to process

                                • File
                                • Registry
                                • Network

                                Click to dive into process behavior distribution

                                Target ID:0
                                Start time:11:18:16
                                Start date:23/03/2025
                                Path:C:\Users\user\Desktop\Payload.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Payload.exe"
                                Imagebase:0x350000
                                File size:55'808 bytes
                                MD5 hash:E3250BA3E962DDF90560E00C92659CF9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:low
                                Has exited:false

                                Execution Graph

                                Execution Coverage

                                Dynamic/Packed Code Coverage

                                Signature Coverage

                                Execution Coverage:16.1%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:5.4%
                                Total number of Nodes:111
                                Total number of Limit Nodes:4
                                Show Legend
                                Hide Nodes/Edges
                                execution_graph 4618 4d20152 4619 4d20159 GetComputerNameW 4618->4619 4621 4d201dc 4619->4621 4622 4d21758 4623 4d2177a RegCreateKeyExW 4622->4623 4625 4d21824 4623->4625 4538 4d202dc 4539 4d20302 ConvertStringSecurityDescriptorToSecurityDescriptorW 4538->4539 4541 4d2037b 4539->4541 4578 4d2185d 4579 4d218a0 FormatMessageW 4578->4579 4581 4d2192a 4579->4581 4542 b3aea3 4544 b3aed2 closesocket 4542->4544 4545 b3af0c 4544->4545 4456 b3b722 4457 b3b75a CreateFileW 4456->4457 4459 b3b7a9 4457->4459 4582 4d2124b 4583 4d2126e SetProcessWorkingSetSize 4582->4583 4585 4d212cf 4583->4585 4472 b3ad2e 4473 b3ada4 4472->4473 4474 b3ad6c DuplicateHandle 4472->4474 4473->4474 4475 b3ad7a 4474->4475 4586 b3a612 4588 b3a646 CreateMutexW 4586->4588 4589 b3a6c1 4588->4589 4626 b3a710 4627 b3a74e CloseHandle 4626->4627 4629 b3a788 4627->4629 4630 4d20d76 4632 4d20db2 LookupPrivilegeValueW 4630->4632 4633 4d20e02 4632->4633 4546 4d20efb 4549 4d20f05 AdjustTokenPrivileges 4546->4549 4548 4d20f83 4549->4548 4502 4d2017e 4503 4d201ce GetComputerNameW 4502->4503 4504 4d201dc 4503->4504 4590 4d2107d 4593 4d210ae GetExitCodeProcess 4590->4593 4592 4d2110c 4593->4592 4606 4d209e0 4607 4d209fe GetProcessTimes 4606->4607 4609 4d20a85 4607->4609 4634 b3ad07 4635 b3ad2e DuplicateHandle 4634->4635 4637 b3ad7a 4635->4637 4638 4d21167 4639 4d2118a GetProcessWorkingSetSize 4638->4639 4641 4d211eb 4639->4641 4550 4d20ae8 4552 4d20b0a getaddrinfo 4550->4552 4553 4d20bb7 4552->4553 4554 4d20492 4557 4d204b2 MapViewOfFile 4554->4557 4556 4d20539 4557->4556 4432 b3bafa 4434 b3bb2f ReadFile 4432->4434 4435 b3bb61 4434->4435 4610 b3b7f8 4612 b3b83a GetFileType 4610->4612 4613 b3b89c 4612->4613 4448 b3a2fe 4449 b3a32a SetErrorMode 4448->4449 4451 b3a353 4448->4451 4450 b3a33f 4449->4450 4451->4449 4558 b3b6e2 4560 b3b722 CreateFileW 4558->4560 4561 b3b7a9 4560->4561 4594 b3a462 4596 b3a486 RegSetValueExW 4594->4596 4597 b3a507 4596->4597 4642 b3a361 4644 b3a392 RegQueryValueExW 4642->4644 4645 b3a41b 4644->4645 4484 4d20f32 4487 4d20f61 AdjustTokenPrivileges 4484->4487 4486 4d20f83 4487->4486 4488 b3aed2 4489 b3af34 4488->4489 4490 b3aefe closesocket 4488->4490 4489->4490 4491 b3af0c 4490->4491 4562 b3a2d2 4563 b3a2d6 SetErrorMode 4562->4563 4565 b3a33f 4563->4565 4566 4d20cba 4569 4d20cea WSAConnect 4566->4569 4568 4d20d3e 4569->4568 4570 b3bada 4572 b3bafa ReadFile 4570->4572 4573 b3bb61 4572->4573 4646 b3bd42 4647 b3bd62 WSASocketW 4646->4647 4649 b3bdd6 4647->4649 4574 b3a8c1 4576 b3a902 SendMessageTimeoutA 4574->4576 4577 b3a985 4576->4577 4509 4b21541 KiUserExceptionDispatcher 4510 4b21584 4509->4510 4614 b3a7c7 4615 b3a7fa RegOpenKeyExW 4614->4615 4617 b3a888 4615->4617 4518 b3a646 4520 b3a67e CreateMutexW 4518->4520 4521 b3a6c1 4520->4521 4534 b3a74e 4535 b3a77a CloseHandle 4534->4535 4536 b3a7b9 4534->4536 4537 b3a788 4535->4537 4536->4535

                                Executed Functions

                                APIs
                                • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 04D20F7B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: AdjustPrivilegesToken
                                • String ID:
                                • API String ID: 2874748243-0
                                • Opcode ID: 3a6c2568e8d099842fdd28e1e4b26be5382e97dfbe0a06a6ebcbff55491bb491
                                • Instruction ID: 3e62010240239350801a867a7478c4db15f78c109a66345c30bd643ee756d570
                                • Opcode Fuzzy Hash: 3a6c2568e8d099842fdd28e1e4b26be5382e97dfbe0a06a6ebcbff55491bb491
                                • Instruction Fuzzy Hash: 51219F755097809FDB138F25DC44B52BFB4FF16314F0984DAEA858B163D271A908DB62
                                APIs
                                • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 04D20F7B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: AdjustPrivilegesToken
                                • String ID:
                                • API String ID: 2874748243-0
                                • Opcode ID: 72549f7e7d0248558810b7e87f456308bc85180facc3addfd4fc2fe9d948e683
                                • Instruction ID: 7e0074b6b77a400246bea32cae36a9d3c8de467502cbf4a8974a993e885391c2
                                • Opcode Fuzzy Hash: 72549f7e7d0248558810b7e87f456308bc85180facc3addfd4fc2fe9d948e683
                                • Instruction Fuzzy Hash: 2B11A0715043009FDB21CF55D984B66FBE4FF08224F08C4AAEE458B652D371E414DFA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363349465.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4b20000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b3d089a44b90ec26bca2c66e36a9ce833758296af347d2dbf06dc998e604f3cb
                                • Instruction ID: 4436b71906cf16b27eb9af00dfed3effc16ab4a3cb47cd6336621a6c2f2ab47e
                                • Opcode Fuzzy Hash: b3d089a44b90ec26bca2c66e36a9ce833758296af347d2dbf06dc998e604f3cb
                                • Instruction Fuzzy Hash: 58923734A14218CFDB18EF74D990BAD77B2EB88308F5084A9D50AAB795DF31AD85CF50
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363349465.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4b20000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 29335f2efdcf62a879c1523e570daf16524ef0b21fc58a3eb4773dd9530402f5
                                • Instruction ID: 763bdf0f2e6ff3bb916b75e6bf0bdaa46036c85b02f642b0b765db93a0456d2c
                                • Opcode Fuzzy Hash: 29335f2efdcf62a879c1523e570daf16524ef0b21fc58a3eb4773dd9530402f5
                                • Instruction Fuzzy Hash: 08F13934A142188FDB18EB74C990BAD77B2FB88308F5084A9D509AFB95DF71AD85CF50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 4b21550-4b21595 KiUserExceptionDispatcher 4 4b21598-4b2159e 0->4 5 4b215a4-4b215a7 4->5 6 4b2169c-4b216c7 4->6 7 4b215a9 5->7 41 4b215ab call b405e4 7->41 42 4b215ab call b40606 7->42 9 4b215b0-4b215dd 15 4b21624-4b21627 9->15 16 4b215df-4b215e1 9->16 15->6 17 4b21629-4b2162f 15->17 37 4b215e3 call b405e4 16->37 38 4b215e3 call b40606 16->38 39 4b215e3 call 4b22076 16->39 40 4b215e3 call 4b21b48 16->40 17->7 20 4b21635-4b2163c 17->20 18 4b215e9-4b215f0 23 4b215f2-4b21619 18->23 24 4b21621 18->24 21 4b2163e-4b21654 20->21 22 4b2168d 20->22 21->6 29 4b21656-4b2165e 21->29 28 4b21697 22->28 23->24 24->15 28->4 30 4b21660-4b2166b 29->30 31 4b2167f-4b21687 call 4b226e9 29->31 30->6 33 4b2166d-4b21677 30->33 31->22 33->31 37->18 38->18 39->18 40->18 41->9 42->9
                                APIs
                                • KiUserExceptionDispatcher.NTDLL ref: 04B21577
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363349465.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4b20000_Payload.jbxd
                                Similarity
                                • API ID: DispatcherExceptionUser
                                • String ID:
                                • API String ID: 6842923-0
                                • Opcode ID: 60c855d5e93be3ff8a3d29dda9ac2b0fc4ac270b4069fdd2b5a87765c356c7ff
                                • Instruction ID: f46a4a5049ac916b7cbdf4913695be0731136e627ebd2d327d7eda77f4222773
                                • Opcode Fuzzy Hash: 60c855d5e93be3ff8a3d29dda9ac2b0fc4ac270b4069fdd2b5a87765c356c7ff
                                • Instruction Fuzzy Hash: 95417435B002148FCB04EF78C5946ADB7E2EF88219B1981A9D809DB759DB34AD85CBA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 44 4b21541-4b2157d KiUserExceptionDispatcher 45 4b21584-4b21595 44->45 48 4b21598-4b2159e 45->48 49 4b215a4-4b215a7 48->49 50 4b2169c-4b216c7 48->50 51 4b215a9 49->51 85 4b215ab call b405e4 51->85 86 4b215ab call b40606 51->86 53 4b215b0-4b215dd 59 4b21624-4b21627 53->59 60 4b215df-4b215e1 53->60 59->50 61 4b21629-4b2162f 59->61 81 4b215e3 call b405e4 60->81 82 4b215e3 call b40606 60->82 83 4b215e3 call 4b22076 60->83 84 4b215e3 call 4b21b48 60->84 61->51 64 4b21635-4b2163c 61->64 62 4b215e9-4b215f0 67 4b215f2-4b21619 62->67 68 4b21621 62->68 65 4b2163e-4b21654 64->65 66 4b2168d 64->66 65->50 73 4b21656-4b2165e 65->73 72 4b21697 66->72 67->68 68->59 72->48 74 4b21660-4b2166b 73->74 75 4b2167f-4b21687 call 4b226e9 73->75 74->50 77 4b2166d-4b21677 74->77 75->66 77->75 81->62 82->62 83->62 84->62 85->53 86->53
                                APIs
                                • KiUserExceptionDispatcher.NTDLL ref: 04B21577
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363349465.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4b20000_Payload.jbxd
                                Similarity
                                • API ID: DispatcherExceptionUser
                                • String ID:
                                • API String ID: 6842923-0
                                • Opcode ID: 190b449ab249eaf8c3ed9a3414bf0b8911f536e4173d6409ff5b72be30402791
                                • Instruction ID: 49eea8035706a1dca8447cf1a1c355e5d42e25322401f0eb64a439b5ab56c66b
                                • Opcode Fuzzy Hash: 190b449ab249eaf8c3ed9a3414bf0b8911f536e4173d6409ff5b72be30402791
                                • Instruction Fuzzy Hash: 48418035A00214CFCB04DF38C9856ADB7F2EF88344B1985A9D809DB399DB34ED85CBA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 88 b3b6e2-b3b77a 92 b3b77f-b3b78b 88->92 93 b3b77c 88->93 94 b3b790-b3b799 92->94 95 b3b78d 92->95 93->92 96 b3b79b-b3b7bf CreateFileW 94->96 97 b3b7ea-b3b7ef 94->97 95->94 100 b3b7f1-b3b7f6 96->100 101 b3b7c1-b3b7e7 96->101 97->96 100->101
                                APIs
                                • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00B3B7A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 17fa68c2dba58298357c4a5c3e55ea97129a6d655f11343e260d4d2ed53f506c
                                • Instruction ID: 34a00c59f8b9a16e68cbae310aa784e5c7d23df8f0c38e83b4bf51a07c7f4ded
                                • Opcode Fuzzy Hash: 17fa68c2dba58298357c4a5c3e55ea97129a6d655f11343e260d4d2ed53f506c
                                • Instruction Fuzzy Hash: 4F31A271508380AFE712CB65DC45F62BFF8EF46314F08449AE9858B252D375A809DB71

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 104 4d21758-4d217d2 108 4d217d7-4d217e3 104->108 109 4d217d4 104->109 110 4d217e5 108->110 111 4d217e8-4d217f1 108->111 109->108 110->111 112 4d217f3 111->112 113 4d217f6-4d2180d 111->113 112->113 115 4d2184f-4d21854 113->115 116 4d2180f-4d21822 RegCreateKeyExW 113->116 115->116 117 4d21856-4d2185b 116->117 118 4d21824-4d2184c 116->118 117->118
                                APIs
                                • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 04D21815
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: c8c24d538f4372a404fe3a511bc9d9b30a626df37bad9fabf864087e1bf921c7
                                • Instruction ID: bd9e0c7777ac580308f3aa7753217ce4c0b91adc8165fbb38b5dc8aa81810103
                                • Opcode Fuzzy Hash: c8c24d538f4372a404fe3a511bc9d9b30a626df37bad9fabf864087e1bf921c7
                                • Instruction Fuzzy Hash: 6C318EB2504344AFEB218B65CC44F67FBFCEF49614F08855AEA89CB552D320E908CBB1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 123 b3bc4f-b3bc6f 124 b3bc91-b3bcc3 123->124 125 b3bc71-b3bc90 123->125 129 b3bcc6-b3bd1e RegQueryValueExW 124->129 125->124 131 b3bd24-b3bd3a 129->131
                                APIs
                                • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 00B3BD16
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: QueryValue
                                • String ID:
                                • API String ID: 3660427363-0
                                • Opcode ID: fa555dbcdd9cf4c3ac6188a5218b71e0c2d33d1d8382f5ed5b70d8d1917a6a62
                                • Instruction ID: e489edfd348adfbf40b5f69fddcb884c206229a4d27089611e3877f0126588e0
                                • Opcode Fuzzy Hash: fa555dbcdd9cf4c3ac6188a5218b71e0c2d33d1d8382f5ed5b70d8d1917a6a62
                                • Instruction Fuzzy Hash: 69317A7510E3C0AFD3138B258C65A21BFB4EF47610F0E85CBD9C48B6A3D6696809C7B2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 132 b3a7c7-b3a855 136 b3a857 132->136 137 b3a85a-b3a871 132->137 136->137 139 b3a8b3-b3a8b8 137->139 140 b3a873-b3a886 RegOpenKeyExW 137->140 139->140 141 b3a8ba-b3a8bf 140->141 142 b3a888-b3a8b0 140->142 141->142
                                APIs
                                • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00B3A879
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: Open
                                • String ID:
                                • API String ID: 71445658-0
                                • Opcode ID: 9024d3199a57599a30965c7d7c4c1903b75517614f558bd6c44ac708517e6a2d
                                • Instruction ID: 4912a01afb685e4a6e2e89c5ddb510d3e368ecdd432362f6ba0ba03d2b8eca12
                                • Opcode Fuzzy Hash: 9024d3199a57599a30965c7d7c4c1903b75517614f558bd6c44ac708517e6a2d
                                • Instruction Fuzzy Hash: AB3181B24083846FE7228B55DC44FA7BFB8EF0A314F19449AE9858B193D364A909C7B1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 147 4d20ae8-4d20ba7 153 4d20bf9-4d20bfe 147->153 154 4d20ba9-4d20bb1 getaddrinfo 147->154 153->154 155 4d20bb7-4d20bc9 154->155 157 4d20c00-4d20c05 155->157 158 4d20bcb-4d20bf6 155->158 157->158
                                APIs
                                • getaddrinfo.WS2_32(?,00000E24), ref: 04D20BAF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: getaddrinfo
                                • String ID:
                                • API String ID: 300660673-0
                                • Opcode ID: 688476786c7a5bed47cc8682338744242636cc271f1df23e7ce6e948ac6a6569
                                • Instruction ID: 9e6ee5b60c16e16a1001846608bc59317a537bf8fdf0110ecc69295f3c4a5b12
                                • Opcode Fuzzy Hash: 688476786c7a5bed47cc8682338744242636cc271f1df23e7ce6e948ac6a6569
                                • Instruction Fuzzy Hash: 0F31A4B1504344AFE721CB51DC44FA6FBBCEF08714F04489AFA489B192D375A908CB75

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 162 4d2185d-4d218cf 164 4d218d2-4d21924 FormatMessageW 162->164 166 4d2192a-4d21953 164->166
                                APIs
                                • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 04D21922
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: FormatMessage
                                • String ID:
                                • API String ID: 1306739567-0
                                • Opcode ID: 4c1fcab0118963a3464088a90a1b1a0cae5f4bc6995e4aa8bc1e181b7c19828a
                                • Instruction ID: d7b2e32be7343b8e5f0ed443ed688a9213800ba07806a715a7f36976c255eb1c
                                • Opcode Fuzzy Hash: 4c1fcab0118963a3464088a90a1b1a0cae5f4bc6995e4aa8bc1e181b7c19828a
                                • Instruction Fuzzy Hash: BD318D7250D3C05FD7038B758C65A66BFB4EF47610F0E84CBD8848F5A3D624A909C7A2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 168 4d209e0-4d20a75 173 4d20ac2-4d20ac7 168->173 174 4d20a77-4d20a7f GetProcessTimes 168->174 173->174 176 4d20a85-4d20a97 174->176 177 4d20ac9-4d20ace 176->177 178 4d20a99-4d20abf 176->178 177->178
                                APIs
                                • GetProcessTimes.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D20A7D
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: ProcessTimes
                                • String ID:
                                • API String ID: 1995159646-0
                                • Opcode ID: c856ffe107fd3d9ee88f49d31ee3717b31bdc3e9cd2e66647e3a9d88a6813f04
                                • Instruction ID: bd9301c017968eab1fe237a8c1d26ebdfc49985cc4e9c457ad97e6b6edecb922
                                • Opcode Fuzzy Hash: c856ffe107fd3d9ee88f49d31ee3717b31bdc3e9cd2e66647e3a9d88a6813f04
                                • Instruction Fuzzy Hash: F631D7724097806FD7128F61DC45B66FFB8EF06314F0984DAE9858F193D324A909CBB5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 197 4d202dc-4d2035d 201 4d20362-4d2036b 197->201 202 4d2035f 197->202 203 4d203c3-4d203c8 201->203 204 4d2036d-4d20375 ConvertStringSecurityDescriptorToSecurityDescriptorW 201->204 202->201 203->204 205 4d2037b-4d2038d 204->205 207 4d203ca-4d203cf 205->207 208 4d2038f-4d203c0 205->208 207->208
                                APIs
                                • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 04D20373
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: DescriptorSecurity$ConvertString
                                • String ID:
                                • API String ID: 3907675253-0
                                • Opcode ID: 75a5ba875afdff9efff20cb88604073b1556b945db073189fe9401bd97f16ddc
                                • Instruction ID: 1c632c49710930ad2ab6cff92f0681945dc48b181318c58f59ff57bf43658556
                                • Opcode Fuzzy Hash: 75a5ba875afdff9efff20cb88604073b1556b945db073189fe9401bd97f16ddc
                                • Instruction Fuzzy Hash: ED318F72508384AFEB228F65DC45F67BBB8EF05214F08849AEA44DB152D364A808CBB5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 181 b3a612-b3a695 185 b3a697 181->185 186 b3a69a-b3a6a3 181->186 185->186 187 b3a6a5 186->187 188 b3a6a8-b3a6b1 186->188 187->188 189 b3a6b3-b3a6d7 CreateMutexW 188->189 190 b3a702-b3a707 188->190 193 b3a709-b3a70e 189->193 194 b3a6d9-b3a6ff 189->194 190->189 193->194
                                APIs
                                • CreateMutexW.KERNELBASE(?,?), ref: 00B3A6B9
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: CreateMutex
                                • String ID:
                                • API String ID: 1964310414-0
                                • Opcode ID: fa3dc4e06fc5a9106f08fc909b9b077323e99793ccd94ac64941ef8d000b2b0f
                                • Instruction ID: 16c11263772a2115893f543a3b12ff86be3b573bcbae04abf454f88972b6a287
                                • Opcode Fuzzy Hash: fa3dc4e06fc5a9106f08fc909b9b077323e99793ccd94ac64941ef8d000b2b0f
                                • Instruction Fuzzy Hash: F531A1B15093805FE712CB65CC85B66FFF8EF06310F1984DAE984CB292D374A809C762

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 224 4d2177a-4d217d2 227 4d217d7-4d217e3 224->227 228 4d217d4 224->228 229 4d217e5 227->229 230 4d217e8-4d217f1 227->230 228->227 229->230 231 4d217f3 230->231 232 4d217f6-4d2180d 230->232 231->232 234 4d2184f-4d21854 232->234 235 4d2180f-4d21822 RegCreateKeyExW 232->235 234->235 236 4d21856-4d2185b 235->236 237 4d21824-4d2184c 235->237 236->237
                                APIs
                                • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 04D21815
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 79521941aacd9712c8987e56985f5a1587067e72087b62bb130f28e4e00c9d97
                                • Instruction ID: c545667f21e54c7aa2c41034c2565358ceb9d61f5124ded39138df37d803248f
                                • Opcode Fuzzy Hash: 79521941aacd9712c8987e56985f5a1587067e72087b62bb130f28e4e00c9d97
                                • Instruction Fuzzy Hash: 05218D72504204AFEB219F55CD84F6BFBECEF08714F08855AEA49C7652E720F5088BB5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 212 b3a8c1-b3a975 216 b3a977-b3a97f SendMessageTimeoutA 212->216 217 b3a9b9-b3a9be 212->217 218 b3a985-b3a997 216->218 217->216 220 b3a9c0-b3a9c5 218->220 221 b3a999-b3a9b6 218->221 220->221
                                APIs
                                • SendMessageTimeoutA.USER32(?,00000E24), ref: 00B3A97D
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: MessageSendTimeout
                                • String ID:
                                • API String ID: 1599653421-0
                                • Opcode ID: 83bbe1408897171d4e99583fabd012bfcccb4f119098ca39c63f379c25a11039
                                • Instruction ID: 909a530026e3a12df78c94022222bc804d0873dbad493d6b63b02e552ed0cbc4
                                • Opcode Fuzzy Hash: 83bbe1408897171d4e99583fabd012bfcccb4f119098ca39c63f379c25a11039
                                • Instruction Fuzzy Hash: 6531D671009780AFEB228F61CC45F62FFB8EF06314F18849EE9855B193D375A808CB65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 242 b3a361-b3a3cf 245 b3a3d1 242->245 246 b3a3d4-b3a3dd 242->246 245->246 247 b3a3e2-b3a3e8 246->247 248 b3a3df 246->248 249 b3a3ea 247->249 250 b3a3ed-b3a404 247->250 248->247 249->250 252 b3a406-b3a419 RegQueryValueExW 250->252 253 b3a43b-b3a440 250->253 254 b3a442-b3a447 252->254 255 b3a41b-b3a438 252->255 253->252 254->255
                                APIs
                                • RegQueryValueExW.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 00B3A40C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: QueryValue
                                • String ID:
                                • API String ID: 3660427363-0
                                • Opcode ID: 592cfc93d6c251a67601182f6ddc2c3094e4b939703b18b6e5460838d04c7241
                                • Instruction ID: ba90fdcc696313d83f931264533d90a4e3704bb83116cdc11e2f78c0573de23c
                                • Opcode Fuzzy Hash: 592cfc93d6c251a67601182f6ddc2c3094e4b939703b18b6e5460838d04c7241
                                • Instruction Fuzzy Hash: EC316175509780AFE721CF15CC84F62FBF8EF05710F1984DAE9858B292D364E909CB66

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 259 4d20b0a-4d20ba7 264 4d20bf9-4d20bfe 259->264 265 4d20ba9-4d20bb1 getaddrinfo 259->265 264->265 266 4d20bb7-4d20bc9 265->266 268 4d20c00-4d20c05 266->268 269 4d20bcb-4d20bf6 266->269 268->269
                                APIs
                                • getaddrinfo.WS2_32(?,00000E24), ref: 04D20BAF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: getaddrinfo
                                • String ID:
                                • API String ID: 300660673-0
                                • Opcode ID: c8e2762a36e74adf77f8c279398be96f844e2df1778c0ebc9cfa3ed8fe3ca63b
                                • Instruction ID: 6b3f962037c9c8a150ff840d1c9270ff83d130507e305a286ed7297686ce8cca
                                • Opcode Fuzzy Hash: c8e2762a36e74adf77f8c279398be96f844e2df1778c0ebc9cfa3ed8fe3ca63b
                                • Instruction Fuzzy Hash: BC21D171104200AEEB319F54CD84FAAF7ACEF08718F14885AFB489A181D7B5B9088BB5
                                APIs
                                • GetFileType.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 00B3B88D
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: FileType
                                • String ID:
                                • API String ID: 3081899298-0
                                • Opcode ID: 6f45522662ea8729047a53229f1b34e7355b377b18ade888d2be77beca07fc65
                                • Instruction ID: 4a99e143190be41547a8cd88ae653807b9b448bf18dc47023ec57c51ed7db129
                                • Opcode Fuzzy Hash: 6f45522662ea8729047a53229f1b34e7355b377b18ade888d2be77beca07fc65
                                • Instruction Fuzzy Hash: 93212B754093806FE7128B259C44BA2FFBCEF0A720F0980D6E9848B193D3646909C7B1
                                APIs
                                • GetExitCodeProcess.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D21104
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: CodeExitProcess
                                • String ID:
                                • API String ID: 3861947596-0
                                • Opcode ID: 14a971652bdb1d49f565badbeef3c8a821dfefab77bc5f38d4662c898ffc5166
                                • Instruction ID: 62c3e488a02b683003b7bbdc0be5d1f4e9d17986b06f4001e0534a64101d4bac
                                • Opcode Fuzzy Hash: 14a971652bdb1d49f565badbeef3c8a821dfefab77bc5f38d4662c898ffc5166
                                • Instruction Fuzzy Hash: EE21C1715093806FE712CB64CC45FA6FFB8EF06214F0880DAE944DF193D264A908C7A5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: FileView
                                • String ID:
                                • API String ID: 3314676101-0
                                • Opcode ID: fca9e2dc0593c572713ecb1b7b62468ed06f4e298d461ac02c1a161829a33e79
                                • Instruction ID: 3bf271d7e15e69f6e0e684127301387ab86e06bcbe41d99b583466873b9eee40
                                • Opcode Fuzzy Hash: fca9e2dc0593c572713ecb1b7b62468ed06f4e298d461ac02c1a161829a33e79
                                • Instruction Fuzzy Hash: F6218671409384AFE722CF55DC45F66FFF8EF09214F04849EEA858B152D375A508CBA6
                                APIs
                                • RegSetValueExW.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 00B3A4F8
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: Value
                                • String ID:
                                • API String ID: 3702945584-0
                                • Opcode ID: f1d33b8fc364b752ebcf453c05389f6405b5ef1b15b9469538369530071e5beb
                                • Instruction ID: c174cabe2f5462fd0f778bf855e905376512e6ced154bded0ab2f15fe899aa55
                                • Opcode Fuzzy Hash: f1d33b8fc364b752ebcf453c05389f6405b5ef1b15b9469538369530071e5beb
                                • Instruction Fuzzy Hash: 672181725083806FD7228B55DC44F67FFF8EF4A610F18849AE9858B292D364E808C7B2
                                APIs
                                • WSASocketW.WS2_32(?,?,?,?,?), ref: 00B3BDCE
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: Socket
                                • String ID:
                                • API String ID: 38366605-0
                                • Opcode ID: 4da0705cb5fef87c15a1f1a0b64f7d1aab9970ff6dfc4a56421e74995cae3db9
                                • Instruction ID: 53986633bc6a53c4ed177d60c7cefeecbc8a31c259a090610c8e5395f9e418ed
                                • Opcode Fuzzy Hash: 4da0705cb5fef87c15a1f1a0b64f7d1aab9970ff6dfc4a56421e74995cae3db9
                                • Instruction Fuzzy Hash: 75218271409380AFD721CF55DC45F66FFF8EF09214F08889EEA858B552D375A818CB66
                                APIs
                                • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 04D20373
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: DescriptorSecurity$ConvertString
                                • String ID:
                                • API String ID: 3907675253-0
                                • Opcode ID: 190e9d6c25e08bfc1a7352be277eec07c27e58bc7f6826370b87ef0000bad417
                                • Instruction ID: a0e8b7be8de00237b425d3c7c46f0fa1cd1d5c2fce00816cc6161c413752de5b
                                • Opcode Fuzzy Hash: 190e9d6c25e08bfc1a7352be277eec07c27e58bc7f6826370b87ef0000bad417
                                • Instruction Fuzzy Hash: 4F21C271504204AFEB219F65DC45F6BFBACEF04214F08845AEA45CB242D374E8048BB5
                                APIs
                                • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00B3B7A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 04d3eef4fca8af86e94d85ab00b348f4441035e4ece26c02875e089203979a2a
                                • Instruction ID: d4d390a5cdf56dccddf20159c8d7466e7fc93ff0e21fe401d30adac2e9384a8d
                                • Opcode Fuzzy Hash: 04d3eef4fca8af86e94d85ab00b348f4441035e4ece26c02875e089203979a2a
                                • Instruction Fuzzy Hash: FB21A171504240AFE720CF65DC85F66FBE8EF48310F188899EA458B651D371E804CBA2
                                APIs
                                • RegQueryValueExW.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D20288
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: QueryValue
                                • String ID:
                                • API String ID: 3660427363-0
                                • Opcode ID: ecf374404fa506f7534c48880b16197c08df193c5c192b6cc4a4c2ed4b8a14d8
                                • Instruction ID: 7d0d5841627c74abc185dfc33b8e6bfc1d1f86586bceeb0750a1173ce6e57f8f
                                • Opcode Fuzzy Hash: ecf374404fa506f7534c48880b16197c08df193c5c192b6cc4a4c2ed4b8a14d8
                                • Instruction Fuzzy Hash: D7219D72508380AFD722CF55CC44F66FBF8EF49614F08849AEA458B292D364E948CBA5
                                APIs
                                • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 04D20DFA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: LookupPrivilegeValue
                                • String ID:
                                • API String ID: 3899507212-0
                                • Opcode ID: 4d72a5defe55ce4072f4a58676cc591a085c2a091bb2e0ec68d74d3d04631d1e
                                • Instruction ID: b0cf583e7592257bd27bd19ee14f028143ab54f8b25506ea9980c1bb58ad09d6
                                • Opcode Fuzzy Hash: 4d72a5defe55ce4072f4a58676cc591a085c2a091bb2e0ec68d74d3d04631d1e
                                • Instruction Fuzzy Hash: 6A218E725093C05FDB128B25DC55BA2BFF8AF06214F0D84DAE985CB263D224E848CB61
                                APIs
                                • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00B3A879
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: Open
                                • String ID:
                                • API String ID: 71445658-0
                                • Opcode ID: b2a4b9443a57071eb81ac6acbb6778f693ffb91798c0a73963fd8fe2d5acbe1e
                                • Instruction ID: a4cd39d2d7932df1a1c97f8de9ecab10ee83bb3797836bbe119485fe3fc45012
                                • Opcode Fuzzy Hash: b2a4b9443a57071eb81ac6acbb6778f693ffb91798c0a73963fd8fe2d5acbe1e
                                • Instruction Fuzzy Hash: 2021F671408204AFE7209F55CC84F6BFBFCEF08314F24845AEA4587652D770E8098BB6
                                APIs
                                • SetProcessWorkingSetSize.KERNEL32(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D212C7
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: ProcessSizeWorking
                                • String ID:
                                • API String ID: 3584180929-0
                                • Opcode ID: e4e59a2908724e90fe376a42f1dcf87c41d57175831ce5e55ab92023efd945a2
                                • Instruction ID: f7179c31af30760ce27ff1e039703b6869c49851649d99a6aa2a3599965b60d2
                                • Opcode Fuzzy Hash: e4e59a2908724e90fe376a42f1dcf87c41d57175831ce5e55ab92023efd945a2
                                • Instruction Fuzzy Hash: 3121D4715093806FDB22CF55CC48F6BFFB8EF45224F08849AE944CB192D374A808CBA5
                                APIs
                                • GetProcessWorkingSetSize.KERNEL32(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D211E3
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: ProcessSizeWorking
                                • String ID:
                                • API String ID: 3584180929-0
                                • Opcode ID: e4e59a2908724e90fe376a42f1dcf87c41d57175831ce5e55ab92023efd945a2
                                • Instruction ID: 02d7040a2628a8cdfa07fdba5d4785f5eaa4e24c62e8f02f8960a92991eb44bc
                                • Opcode Fuzzy Hash: e4e59a2908724e90fe376a42f1dcf87c41d57175831ce5e55ab92023efd945a2
                                • Instruction Fuzzy Hash: EF21D4715093806FD712CF55DC49F6AFFB8EF45214F0884AAF944CB192D374A904CBA5
                                APIs
                                • CreateMutexW.KERNELBASE(?,?), ref: 00B3A6B9
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: CreateMutex
                                • String ID:
                                • API String ID: 1964310414-0
                                • Opcode ID: 2aa07399f683b32489e341c14c9f704be0a0e4d5dfd0332bd6e6a53b292d149f
                                • Instruction ID: 5be2d32fb16beec3d7ff75caa8365daa18f970d66e4bb2b5e987cba8429ae2f8
                                • Opcode Fuzzy Hash: 2aa07399f683b32489e341c14c9f704be0a0e4d5dfd0332bd6e6a53b292d149f
                                • Instruction Fuzzy Hash: 102195715042409FE710DF65DC85F66F7E8EF04314F2884A9E9498B641D775E805CA66
                                APIs
                                • ReadFile.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 00B3BB59
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: 801b0a10dfde291cdf5ab05de14cfead501da176e9b6371a801ab0d2fed7894b
                                • Instruction ID: a61d7f1121166bc30fe2caaa720b32ab9914453f316e0a1596dedd9522d46efa
                                • Opcode Fuzzy Hash: 801b0a10dfde291cdf5ab05de14cfead501da176e9b6371a801ab0d2fed7894b
                                • Instruction Fuzzy Hash: EA219271409380AFDB22CF55DC44F67FFB8EF49310F08849AEA458B156D364A808CBB5
                                APIs
                                • RegQueryValueExW.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 00B3A40C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: QueryValue
                                • String ID:
                                • API String ID: 3660427363-0
                                • Opcode ID: 217773b711aed84ba88fbc3413179aba77fa34df34a6ade203db2b9778fe0940
                                • Instruction ID: a5fe165b8b6b8fe1ce707ea21944b7468bfd938816f8e8834d00a9a050cd3b14
                                • Opcode Fuzzy Hash: 217773b711aed84ba88fbc3413179aba77fa34df34a6ade203db2b9778fe0940
                                • Instruction Fuzzy Hash: 4121A2755042049FE720CF15CC84F66F7ECEF08710F28849AEA85CB291D774E809CAB6
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: FileView
                                • String ID:
                                • API String ID: 3314676101-0
                                • Opcode ID: b6a62b0a741ba1e6bcabafdd06576053b5a0c3b35a6bceaaf1590ca8e841b5e0
                                • Instruction ID: b7f846d002452050e0be8aaae7172edbde2ff627bf621333cc0b920482833cc8
                                • Opcode Fuzzy Hash: b6a62b0a741ba1e6bcabafdd06576053b5a0c3b35a6bceaaf1590ca8e841b5e0
                                • Instruction Fuzzy Hash: 6521F371504200AFE721CF15DD48F66FBF8EF08224F048859EA498B251D375F408CBA6
                                APIs
                                • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 04D20D36
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: Connect
                                • String ID:
                                • API String ID: 3144859779-0
                                • Opcode ID: 1babb76f51413dcdc758672ef3c2e757c9e889f5daf301ee4326e491d7c58b2e
                                • Instruction ID: fa0b49a39d4dc2c3ce313b46c46dbab52b0cbb42ed5251acb13b275bd82f142a
                                • Opcode Fuzzy Hash: 1babb76f51413dcdc758672ef3c2e757c9e889f5daf301ee4326e491d7c58b2e
                                • Instruction Fuzzy Hash: 82219F71409380AFDB228F51DC44B62FFF4EF0A310F0884DAEA858B663D375A818DB61
                                APIs
                                • WSASocketW.WS2_32(?,?,?,?,?), ref: 00B3BDCE
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: Socket
                                • String ID:
                                • API String ID: 38366605-0
                                • Opcode ID: 78215aa0ee0fe910dd57155b48c63b7844ddec8641159a4d281dedd5c5b1e302
                                • Instruction ID: 7519f9a4c366da43354a267825fe1657cfdccd603293a3a39f9a72576d58b3bb
                                • Opcode Fuzzy Hash: 78215aa0ee0fe910dd57155b48c63b7844ddec8641159a4d281dedd5c5b1e302
                                • Instruction Fuzzy Hash: 5121F671404240AFE721CF55DC45F66FBF4EF08314F14889EEA458B652D375A814CB62
                                APIs
                                • SendMessageTimeoutA.USER32(?,00000E24), ref: 00B3A97D
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: MessageSendTimeout
                                • String ID:
                                • API String ID: 1599653421-0
                                • Opcode ID: 6b2024928e884e7c7c00bd553d75123b7fec51881411e1f1b788de7c697e15ef
                                • Instruction ID: 971ca7346385e2b5d712d7e0aa4ad6267e7c538cf2463fbd2deb951df014387a
                                • Opcode Fuzzy Hash: 6b2024928e884e7c7c00bd553d75123b7fec51881411e1f1b788de7c697e15ef
                                • Instruction Fuzzy Hash: 1921E171004200AFEB218F51DC84F76FBF8EF08710F28859AEE855A691D371B808DBB6
                                APIs
                                • RegQueryValueExW.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D20288
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: QueryValue
                                • String ID:
                                • API String ID: 3660427363-0
                                • Opcode ID: f7e815c1fa9fce01e1cb39ed85243b990dc9db12ad363c75fdd707903b5262eb
                                • Instruction ID: 342796dd33eb581173550f35f46a8e3907d0fddd2d2378d013c67498c530e1a7
                                • Opcode Fuzzy Hash: f7e815c1fa9fce01e1cb39ed85243b990dc9db12ad363c75fdd707903b5262eb
                                • Instruction Fuzzy Hash: 7511BE71504204AFEB21CF15DD84F66FBECEF58718F08845AEA458B692D760F808CBB5
                                APIs
                                • RegSetValueExW.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 00B3A4F8
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: Value
                                • String ID:
                                • API String ID: 3702945584-0
                                • Opcode ID: edf14ccfadb96179e53da56a585cc04856a01309c416d324a6abb81acc0a7a3b
                                • Instruction ID: 4698ac3f35243a253dc78838da7777050c9caa98a1b0753170b0345d7eb10664
                                • Opcode Fuzzy Hash: edf14ccfadb96179e53da56a585cc04856a01309c416d324a6abb81acc0a7a3b
                                • Instruction Fuzzy Hash: E911B171504200AFEB208E15DC84F66FBECEF08710F28849AEE458A692D370E8048AB2
                                APIs
                                • GetProcessTimes.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D20A7D
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: ProcessTimes
                                • String ID:
                                • API String ID: 1995159646-0
                                • Opcode ID: 26bb4ee989c271bc3798372a274cdfdb9734dcb174be74edc10bcd1bc557c3e0
                                • Instruction ID: 050195f3c4461f4a23776c67472dcc6563ee5194c59f94934d8fdc3a417c0f20
                                • Opcode Fuzzy Hash: 26bb4ee989c271bc3798372a274cdfdb9734dcb174be74edc10bcd1bc557c3e0
                                • Instruction Fuzzy Hash: 9411C471604200AFEB21CF55DD45F6AFBF8EF48724F08846AEA458B651D774E804CBB5
                                APIs
                                • SetProcessWorkingSetSize.KERNEL32(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D212C7
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: ProcessSizeWorking
                                • String ID:
                                • API String ID: 3584180929-0
                                • Opcode ID: 2436317c5bbd699d2aa53d0a6873eddd5bfed5f562a6993ae89b199b8e6d0979
                                • Instruction ID: 5e4f395aa62d4e0d614215a4bfc4fce0237bccf9ae3a2bc226c1662ab03c26ce
                                • Opcode Fuzzy Hash: 2436317c5bbd699d2aa53d0a6873eddd5bfed5f562a6993ae89b199b8e6d0979
                                • Instruction Fuzzy Hash: 1B11BF71504200AFEB218F55DD85B6AF7E8EF48224F08C4AAEA49CB691D774A8048AB5
                                APIs
                                • GetProcessWorkingSetSize.KERNEL32(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D211E3
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: ProcessSizeWorking
                                • String ID:
                                • API String ID: 3584180929-0
                                • Opcode ID: 2436317c5bbd699d2aa53d0a6873eddd5bfed5f562a6993ae89b199b8e6d0979
                                • Instruction ID: b87d9d283d3edec8dd91070c63735cc6e16968e07cdd1808539d9e9abfef1be1
                                • Opcode Fuzzy Hash: 2436317c5bbd699d2aa53d0a6873eddd5bfed5f562a6993ae89b199b8e6d0979
                                • Instruction Fuzzy Hash: A311BF71504200AFEB21CF55DC85F6AF7E8EF48224F08C46AEA49DB291D774E8048BA5
                                APIs
                                • GetExitCodeProcess.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 04D21104
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: CodeExitProcess
                                • String ID:
                                • API String ID: 3861947596-0
                                • Opcode ID: ddea99974a02ffbbe7f88c681680126a5bc74019ae78f2e6a4cc63a02d061411
                                • Instruction ID: 0fd824f63d65e8c76edec652bc2b7821b894e24737782e0c2e9f8ca7b96bc8ef
                                • Opcode Fuzzy Hash: ddea99974a02ffbbe7f88c681680126a5bc74019ae78f2e6a4cc63a02d061411
                                • Instruction Fuzzy Hash: 2C11E371604210AFEB118F15DD85F6AF7E8EF44624F18C4AAEE09DB286D774E8048AA5
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B3AD72
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: e5d1b2f07bb4ebd451c5811fe966f43985abd522ebea78e872669d2b39fb0b4f
                                • Instruction ID: 0b749b8ed192cc6c6ce3889a1eb04a1bfb2fb1eb0336ed9475be1fd02ceaf963
                                • Opcode Fuzzy Hash: e5d1b2f07bb4ebd451c5811fe966f43985abd522ebea78e872669d2b39fb0b4f
                                • Instruction Fuzzy Hash: AD117F71409380AFDB228F51DC44A62FFF4EF4A310F0884DAE9858B563C275A819DB62
                                APIs
                                • ReadFile.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 00B3BB59
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: 62355b6565c411c0d02d803b098e3b3c872e58e9510c636dbef4c0810f6f9804
                                • Instruction ID: 5148789090a35ceda51fb2d3971e27fbb6645a3689e0779e2c92af9d3af73948
                                • Opcode Fuzzy Hash: 62355b6565c411c0d02d803b098e3b3c872e58e9510c636dbef4c0810f6f9804
                                • Instruction Fuzzy Hash: A111C171404200AFEB21CF55DC84F6AFBF8EF48724F18849AEA498B255D774A8048BB6
                                APIs
                                • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 04D201CE
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: ComputerName
                                • String ID:
                                • API String ID: 3545744682-0
                                • Opcode ID: 962abbe82cd96b483d3a24879b64bad63cb62d61c150f8601713dec44c6a4216
                                • Instruction ID: ae1fcc396ad3c613aa4ccd8463b8bb9773268e95f10b79ac6c51d6bffa391cbe
                                • Opcode Fuzzy Hash: 962abbe82cd96b483d3a24879b64bad63cb62d61c150f8601713dec44c6a4216
                                • Instruction Fuzzy Hash: 8E1104715093806FD311CB55CC45F26FFB8EF8A620F09808FE9489B683D325B804CBA2
                                APIs
                                • SetErrorMode.KERNELBASE(?), ref: 00B3A330
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: ErrorMode
                                • String ID:
                                • API String ID: 2340568224-0
                                • Opcode ID: 480b45ec4d4ed272d603401fc19c271312c31dbcc4e7a5baabb7c118e9f380e8
                                • Instruction ID: 01fe0edcec186a1ea5af53afab0a10cc88042a57aed04d06d95f663fbb2d28b7
                                • Opcode Fuzzy Hash: 480b45ec4d4ed272d603401fc19c271312c31dbcc4e7a5baabb7c118e9f380e8
                                • Instruction Fuzzy Hash: 231170754093C0AFDB128B15DC58B62BFB4EF47724F1D80DAED858B263D265A808DB72
                                APIs
                                • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 04D20DFA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: LookupPrivilegeValue
                                • String ID:
                                • API String ID: 3899507212-0
                                • Opcode ID: 4c26955ad0fdd6ddb4b106ac47691d035e53b9e0c62bd7586bb3af3ac9a2f85f
                                • Instruction ID: 3b7ededa18b7a5f6535b2d9df365fbef1b6dde487731e583753bc4b918cf2e1f
                                • Opcode Fuzzy Hash: 4c26955ad0fdd6ddb4b106ac47691d035e53b9e0c62bd7586bb3af3ac9a2f85f
                                • Instruction Fuzzy Hash: 0811A1B16052008FDB61CF25D985B66FBE8EF14224F08C4AADE49CB742E775F844CBA1
                                APIs
                                • GetFileType.KERNELBASE(?,00000E24,655B8F1F,00000000,00000000,00000000,00000000), ref: 00B3B88D
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: FileType
                                • String ID:
                                • API String ID: 3081899298-0
                                • Opcode ID: f4dbba49079f4b2540bee1509da5eda8997e95e6030d3e003fcab5ba5278059f
                                • Instruction ID: bcf3293c7a811ff6aa8f2af7a95fddc2b25a9a9e0db460d79bc4f4e76bd66fb9
                                • Opcode Fuzzy Hash: f4dbba49079f4b2540bee1509da5eda8997e95e6030d3e003fcab5ba5278059f
                                • Instruction Fuzzy Hash: 29018475508204AEE710DB15DC85F66F7ECDF48724F188096EE058B295D774A9048AA5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: closesocket
                                • String ID:
                                • API String ID: 2781271927-0
                                • Opcode ID: 0f7e3229b1908d52c0ffd22f09707028d807ec40be0a09285521a00dcbbba8e4
                                • Instruction ID: 8856dbc35caaeb6401ea20135c868cb9c44ff2b2051c4e557eb4bba0db4d1d30
                                • Opcode Fuzzy Hash: 0f7e3229b1908d52c0ffd22f09707028d807ec40be0a09285521a00dcbbba8e4
                                • Instruction Fuzzy Hash: BA1191714493809FDB11CF15DC49B52BFB4EF06324F1884DAED458B293D375A808CB62
                                APIs
                                • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 04D20D36
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: Connect
                                • String ID:
                                • API String ID: 3144859779-0
                                • Opcode ID: 5d3b3e0d6840c5784e4a41c0e08ca7ec022760f3dde63e3288f5504e6811bfc0
                                • Instruction ID: 8747f42b6b9ab9b572d4409c822ba60cceea36fd668f35529cc7406d908f6db7
                                • Opcode Fuzzy Hash: 5d3b3e0d6840c5784e4a41c0e08ca7ec022760f3dde63e3288f5504e6811bfc0
                                • Instruction Fuzzy Hash: 2511CE715042009FDB21CF51D944B66FBE4FF08314F0888AAEE858BA62D371F418DFA1
                                APIs
                                • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 04D21922
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: FormatMessage
                                • String ID:
                                • API String ID: 1306739567-0
                                • Opcode ID: c70e0aefb0fa16a1fb8683014528db2d7e48d8a2c32b37673be8181eba71545e
                                • Instruction ID: 9317886d43c37bf634a8b2b9392c9e6019222a7be6631c89b6973e63a615df59
                                • Opcode Fuzzy Hash: c70e0aefb0fa16a1fb8683014528db2d7e48d8a2c32b37673be8181eba71545e
                                • Instruction Fuzzy Hash: CB017171500200ABD310DF5ADC46B26FBE8EB88A20F14855AED089B642D771F915CBE5
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B3AD72
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 1aa94f07c73dd9b209d9a6e2f50180de85e555517c8c95f4d6b825f3de2f905e
                                • Instruction ID: 60aa5a9bfd71564847ce50415b3cb23767f74860a104df8fafd1c0d61988a965
                                • Opcode Fuzzy Hash: 1aa94f07c73dd9b209d9a6e2f50180de85e555517c8c95f4d6b825f3de2f905e
                                • Instruction Fuzzy Hash: 9301A1314042409FDB218F55D844B16FBE0EF48710F1884AADE854AA62C375E414DF62
                                APIs
                                • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 04D201CE
                                Memory Dump Source
                                • Source File: 00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4d20000_Payload.jbxd
                                Similarity
                                • API ID: ComputerName
                                • String ID:
                                • API String ID: 3545744682-0
                                • Opcode ID: bf6ab0a43376be08f78ae56e01f26de2a69ee5197db81dc334b52f6a0edf5633
                                • Instruction ID: 6a2216bae995bdc012b83d96cbdc0bb11af68ea55d8a2e4fd4e45841ad9fe442
                                • Opcode Fuzzy Hash: bf6ab0a43376be08f78ae56e01f26de2a69ee5197db81dc334b52f6a0edf5633
                                • Instruction Fuzzy Hash: 44018175600200ABD310DF1ADC86B26FBF8FB88A20F14815AED085B782D775F915CBE6
                                APIs
                                • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 00B3BD16
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: QueryValue
                                • String ID:
                                • API String ID: 3660427363-0
                                • Opcode ID: 27f39da9655558d5d04016d51582657212e482582769fdf267cc6fb0700fd732
                                • Instruction ID: b9ff7d6e67e9ca7a713777dca81039552f4c256768ec077869590de2cc122e85
                                • Opcode Fuzzy Hash: 27f39da9655558d5d04016d51582657212e482582769fdf267cc6fb0700fd732
                                • Instruction Fuzzy Hash: 42016D75600200ABD210DF1ADC86B26FBE8FB88A20F14815AED485B782D771F915CBE6
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: closesocket
                                • String ID:
                                • API String ID: 2781271927-0
                                • Opcode ID: e6f94569c5f39ea67857b9172925cd81b005e2ecbbc4e43dd27d68f2e5ad66cd
                                • Instruction ID: 3fd64a3810500789281acc315e756d567d0e3df1c0bfc91e09ae0ccb87071a63
                                • Opcode Fuzzy Hash: e6f94569c5f39ea67857b9172925cd81b005e2ecbbc4e43dd27d68f2e5ad66cd
                                • Instruction Fuzzy Hash: F201D1B08042409FDB10DF15D888B65FBE4EF44320F28C4EADD498F686D379A844CFA2
                                APIs
                                • SetErrorMode.KERNELBASE(?), ref: 00B3A330
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: ErrorMode
                                • String ID:
                                • API String ID: 2340568224-0
                                • Opcode ID: 3875ac43276b6ec26cb544109359879b24802a9bd179ad0f3da136b6cfafec4f
                                • Instruction ID: de1c8bb9976b29dbf00f4638f957f73bdf41b30255c0a303eb881ef934dd6881
                                • Opcode Fuzzy Hash: 3875ac43276b6ec26cb544109359879b24802a9bd179ad0f3da136b6cfafec4f
                                • Instruction Fuzzy Hash: DEF08C348082408FDB108F09D888B25FBE0EF44720F2CC0DADE894B696D3B5A804CAA2
                                APIs
                                • CloseHandle.KERNELBASE(?), ref: 00B3A780
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: 2d17ecab94a14c637319770ecb6ffb1e23c56e980cfd4e38528265f52ccb20c5
                                • Instruction ID: 23e77a29ad8bb66f3649f4fcc0f4c3bf1e5bb4aee855539646ba0e98f189fa25
                                • Opcode Fuzzy Hash: 2d17ecab94a14c637319770ecb6ffb1e23c56e980cfd4e38528265f52ccb20c5
                                • Instruction Fuzzy Hash: 8421E4B55043809FD711CF15DD85B52BFB4EF02324F1984EAED858B293D335A909DBA2
                                APIs
                                • CloseHandle.KERNELBASE(?), ref: 00B3A780
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3A000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b3a000_Payload.jbxd
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: ffd28c6808886c0e65c3f18697278598d7b902e3c49bdeb83b164b007452482d
                                • Instruction ID: 8bd226653e84481a80135a1b6bec839cc2d815b038fd8f7f6cc4dd7a5e378ca4
                                • Opcode Fuzzy Hash: ffd28c6808886c0e65c3f18697278598d7b902e3c49bdeb83b164b007452482d
                                • Instruction Fuzzy Hash: EC01DF74504240CFDB108F15D8C9B66FBE4EF04320F28C4EBDD498B682D775A804CEA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361820080.0000000000B40000.00000040.00000020.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b40000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e525c587823432e22309097f6421c3dd1a5c3e30e33970991fc8e916fd529d23
                                • Instruction ID: 2d3bb5a23524324c3f4123d3a55965f415fcea92066ef434d573a374319da56a
                                • Opcode Fuzzy Hash: e525c587823432e22309097f6421c3dd1a5c3e30e33970991fc8e916fd529d23
                                • Instruction Fuzzy Hash: F311B4306182409FC715DB10DA80F25B7E5EB89708F28C9EDEA491B693C777D903EA91
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361820080.0000000000B40000.00000040.00000020.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b40000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 32cf6a9a503ef45251987dd48d5ab541054a704950ae31d5e527d90e84a48864
                                • Instruction ID: 440862997a6622fe95743f9fa2982340fb03df6663ce91e1e1aee1adefc4b5ae
                                • Opcode Fuzzy Hash: 32cf6a9a503ef45251987dd48d5ab541054a704950ae31d5e527d90e84a48864
                                • Instruction Fuzzy Hash: 57118235108780CFC712DB10D640B21BBF1EB8A718F28C6EED9494BA93C33A9D16DB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361820080.0000000000B40000.00000040.00000020.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b40000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c2b168486605a82492699f14017ab3e60470d93b275555af1dcefb6f28fd4d48
                                • Instruction ID: 8785fd58d60aa3cf90183df3e1127249adc5b5272f8262f5255ee7279bd45baf
                                • Opcode Fuzzy Hash: c2b168486605a82492699f14017ab3e60470d93b275555af1dcefb6f28fd4d48
                                • Instruction Fuzzy Hash: D0F0A4B65097806FC7118B06AC54853FFE8DF8623070984ABED498B612D175B909CBB2
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361820080.0000000000B40000.00000040.00000020.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b40000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 205cfd5bc394be039cc93c627c2b00c269e0bb332f6101cb71b993992a6c944d
                                • Instruction ID: 1d2276b4c6efd5988f616928699962998ee73dffb674f332c3d195b50962a0b5
                                • Opcode Fuzzy Hash: 205cfd5bc394be039cc93c627c2b00c269e0bb332f6101cb71b993992a6c944d
                                • Instruction Fuzzy Hash: F9F0FB35108644DFC705DF00D680B25FBE2EB89718F24CAADE94917A52C7379912EA81
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361820080.0000000000B40000.00000040.00000020.00020000.00000000.sdmp, Offset: 00B40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b40000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bf9f31ee0eb8ebcd6c310bdb10559763868137da0f294651723122765e7adb58
                                • Instruction ID: 4b25f90159f806ef3630c865c3113678463e6d184c5ecff2c3645989161f85d3
                                • Opcode Fuzzy Hash: bf9f31ee0eb8ebcd6c310bdb10559763868137da0f294651723122765e7adb58
                                • Instruction Fuzzy Hash: 62E092B66046004B9650DF0BEC45452F7D8EB88630718C47FDD0D8B701D275B904CEA6
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361746304.0000000000B32000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B32000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b32000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 22a5ff026445c51edbfe47cbff2f23737191d95dcfc8eb8471c1fed189b73e63
                                • Instruction ID: b2a378b246d56497956cb7bbf196d99ea038a88330612036518e47cf8bebbe2e
                                • Opcode Fuzzy Hash: 22a5ff026445c51edbfe47cbff2f23737191d95dcfc8eb8471c1fed189b73e63
                                • Instruction Fuzzy Hash: B5D05E792056814FD3169B1CC1A5B9537D4AB91714F5A44FAE8008B763C768E981D610
                                Memory Dump Source
                                • Source File: 00000000.00000002.3361746304.0000000000B32000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B32000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_b32000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e58b6308074706a9e535632ab776da71f58d18b14fcf51139df6d25e8080927b
                                • Instruction ID: 50a74e28359c7df5bcc63d6567228859cda08be78a70c69d29feafc2c6c14c2b
                                • Opcode Fuzzy Hash: e58b6308074706a9e535632ab776da71f58d18b14fcf51139df6d25e8080927b
                                • Instruction Fuzzy Hash: 14D05E352402814FC719DB0CC2D4F5973D4AB80B14F1644E9AC108B762C7A8ECC0CA04

                                Non-executed Functions

                                Memory Dump Source
                                • Source File: 00000000.00000002.3363349465.0000000004B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B20000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4b20000_Payload.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ce5a5cbd6440aca3a43462d99cbbef747c44651d00303e536e6066f7676074c6
                                • Instruction ID: 0e2e73f77828854f4dbc4ae30aa773157ffae7354895cf3faea6cdfd65c6c205
                                • Opcode Fuzzy Hash: ce5a5cbd6440aca3a43462d99cbbef747c44651d00303e536e6066f7676074c6
                                • Instruction Fuzzy Hash: CCF12834A042188FDB18EB74C990BAD77B2FB88308F5084A9D549ABB95DF71AD85CF50