Edit tour

Windows Analysis Report
EXPLRRAPE.exe

Overview

General Information

Sample name:EXPLRRAPE.exe
Analysis ID:1670057
MD5:a317c0913dfbf3a38ceb91123cecb76f
SHA1:f7b1d2c455ed9c7ea93efedbdb491bc84ba0e804
SHA256:81b0deaa1145dfe93ffef4235d04862bd83416517826cffaf602bf649065a3ec
Tags:exeuser-FelloBoiYuuka
Infos:

Detection

Score:2
Range:0 - 100
Confidence:60%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Found large amount of non-executed APIs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • EXPLRRAPE.exe (PID: 7020 cmdline: "C:\Users\user\Desktop\EXPLRRAPE.exe" MD5: A317C0913DFBF3A38CEB91123CECB76F)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: EXPLRRAPE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\EXPLRRAPE.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
Source: EXPLRRAPE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: EXPLRRAPE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean2.winEXE@1/0@0/0
Source: EXPLRRAPE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\EXPLRRAPE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
Source: EXPLRRAPE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: EXPLRRAPE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: EXPLRRAPE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: EXPLRRAPE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: EXPLRRAPE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: EXPLRRAPE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\EXPLRRAPE.exeCode function: 0_2_00C41A31 push ecx; ret 0_2_00C41A44
Source: C:\Users\user\Desktop\EXPLRRAPE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPLRRAPE.exeAPI coverage: 10.0 %
Source: C:\Users\user\Desktop\EXPLRRAPE.exeCode function: 0_2_00C41621 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00C41621
Source: C:\Users\user\Desktop\EXPLRRAPE.exeCode function: 0_2_00C41621 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00C41621
Source: C:\Users\user\Desktop\EXPLRRAPE.exeCode function: 0_2_00C41A98 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00C41A98
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1670057 Sample: EXPLRRAPE.exe Startdate: 21/04/2025 Architecture: WINDOWS Score: 2 4 EXPLRRAPE.exe 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EXPLRRAPE.exe1%VirustotalBrowse
EXPLRRAPE.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1670057
Start date and time:2025-04-21 04:19:14 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:EXPLRRAPE.exe
Detection:CLEAN
Classification:clean2.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 1
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.149.20.212, 184.29.183.29, 172.202.163.200
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):4.3451171497474395
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:EXPLRRAPE.exe
File size:59'392 bytes
MD5:a317c0913dfbf3a38ceb91123cecb76f
SHA1:f7b1d2c455ed9c7ea93efedbdb491bc84ba0e804
SHA256:81b0deaa1145dfe93ffef4235d04862bd83416517826cffaf602bf649065a3ec
SHA512:0ead496d50cdc8e27a2951097580151df4fed58c6cd74186b967b9910e2543673341f2d3685c42f8c1e3a771d31c63b2e8d002f52177107b3ffca26cbc33da4a
SSDEEP:384:mMbP0DRqQFhT1cOKDfKDRKDTN1xq3UZU9D:HP0osPW9ZU9D
TLSH:3B436425DA244458E3780B714AC9E6F80414EC3916B0B1AEE6E57F7F39B264367378CE
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... Yy.d8..d8..d8...w..e8..zj..f8..zj..e8..zj..p8..zj..f8..C.l.m8..d8..'8..zj..g8..zj..e8..zj..e8..Richd8..................PE..L..
Icon Hash:57cfadb09283925e
Entrypoint:0x401617
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x602EE106 [Thu Feb 18 21:49:58 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:036a83a9a2da5208a7efba852723271f
Instruction
call 00007F1F947EE7D1h
jmp 00007F1F947EE08Ch
mov edi, edi
push ebp
mov ebp, esp
sub esp, 00000328h
mov dword ptr [00403140h], eax
mov dword ptr [0040313Ch], ecx
mov dword ptr [00403138h], edx
mov dword ptr [00403134h], ebx
mov dword ptr [00403130h], esi
mov dword ptr [0040312Ch], edi
mov word ptr [00403158h], ss
mov word ptr [0040314Ch], cs
mov word ptr [00403128h], ds
mov word ptr [00403124h], es
mov word ptr [00403120h], fs
mov word ptr [0040311Ch], gs
pushfd
pop dword ptr [00403150h]
mov eax, dword ptr [ebp+00h]
mov dword ptr [00403144h], eax
mov eax, dword ptr [ebp+04h]
mov dword ptr [00403148h], eax
lea eax, dword ptr [ebp+08h]
mov dword ptr [00403154h], eax
mov eax, dword ptr [ebp-00000320h]
mov dword ptr [00403090h], 00010001h
mov eax, dword ptr [00403148h]
mov dword ptr [00403044h], eax
mov dword ptr [00403038h], C0000409h
mov dword ptr [0040303Ch], 00000001h
mov eax, dword ptr [00403000h]
mov dword ptr [ebp-00000328h], eax
mov eax, dword ptr [00403004h]
mov dword ptr [ebp-00000324h], eax
call dword ptr [00000028h]
Programming Language:
  • [IMP] VS2008 build 21022
  • [ASM] VS2008 build 21022
  • [ C ] VS2008 build 21022
  • [C++] VS2008 build 21022
  • [IMP] VS2005 build 50727
  • [RES] VS2008 build 21022
  • [LNK] VS2008 build 21022
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x22ac0x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000xc6a0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1d0.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x21e80x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x100.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xb9d0xc00d0f423033ce91dc719442847631a47eaFalse0.6201171875data5.943708606820056IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000x8680xa00895adbcebab7e9c56a9427f3aea15cb6False0.440234375data4.497849095408744IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x30000x53c0x200e2b23683a8b8935f281d74e560c5fad8False0.052734375data0.35275948821577235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x40000xc6a00xc8002b504797514d60c462e983f014e7498bFalse0.15515625data4.076423893859978IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x110000x2d00x40025b99bc1cc8cc8c6f5a4d8697d813c43False0.4501953125data3.7229559721822776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x44a80x668Device independent bitmap graphic, 48 x 96 x 4, image size 0EnglishUnited States0.15182926829268292
RT_ICON0x4b100x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.31586021505376344
RT_ICON0x4df80x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.46283783783783783
RT_ICON0x4f200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.21295309168443496
RT_ICON0x5dc80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.3483754512635379
RT_ICON0x66700x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.4703757225433526
RT_ICON0x6bd80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.03350622406639004
RT_ICON0x91800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.06824577861163227
RT_ICON0xa2280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.12322695035460993
RT_ICON0xa6900x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.14650537634408603
RT_ICON0xa9780x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.30405405405405406
RT_ICON0xaaa00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.3070362473347548
RT_ICON0xb9480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.4842057761732852
RT_ICON0xc1f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.3670520231213873
RT_ICON0xc7580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.1087136929460581
RT_ICON0xed000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.23170731707317074
RT_ICON0xfda80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.3599290780141844
RT_DIALOG0x102100xdedataEnglishUnited States0.6486486486486487
RT_STRING0x102f00x5cdataEnglishUnited States0.6847826086956522
RT_GROUP_ICON0x1034c0x84dataEnglishUnited States0.6363636363636364
RT_GROUP_ICON0x103d00x76dataEnglishUnited States0.6610169491525424
RT_MANIFEST0x104480x256ASCII text, with CRLF line terminatorsEnglishUnited States0.5100334448160535
DLLImport
KERNEL32.dllSleep, GetSystemTimeAsFileTime, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, OutputDebugStringA, GetModuleHandleA, LoadLibraryA, GetCurrentProcessId, GetProcAddress, GetStartupInfoW, InterlockedCompareExchange, InterlockedExchange
USER32.dllGetWindowRect, GetDlgItem, EndDialog, SetWindowPos, IsDlgButtonChecked, EnableWindow, DialogBoxParamA, SetDlgItemTextA, GetDesktopWindow
ADVAPI32.dllRegOpenKeyExA, RegCreateKeyA, RegSetValueExA, RegCloseKey
SHELL32.dllShellExecuteA
MSVCR90.dll_beginthreadex, _amsg_exit, __wgetmainargs, _cexit, _exit, _XcptFilter, exit, _wcmdln, _initterm, _initterm_e, _configthreadlocale, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, _encode_pointer, __set_app_type, _crt_debugger_hook, ?terminate@@YAXXZ, _unlock, __dllonexit, _lock, _onexit, _decode_pointer, _except_handler4_common, _invoke_watson, _controlfp_s
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found
050100s020406080100

Click to jump to process

050100s0.00246810MB

Click to jump to process

Target ID:0
Start time:22:20:10
Start date:20/04/2025
Path:C:\Users\user\Desktop\EXPLRRAPE.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\EXPLRRAPE.exe"
Imagebase:0xc40000
File size:59'392 bytes
MD5 hash:A317C0913DFBF3A38CEB91123CECB76F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:8.1%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:8.2%
Total number of Nodes:85
Total number of Limit Nodes:1
Show Legend
Hide Nodes/Edges
execution_graph 213 c41a45 _except_handler4_common 214 c414e5 215 c41501 214->215 216 c414fa _exit 214->216 217 c41509 _cexit 215->217 218 c4150f __onexit 215->218 216->215 217->218 219 c41727 220 c41763 219->220 222 c41739 219->222 221 c4175e ?terminate@ 221->220 222->220 222->221 195 c41020 196 c41248 RegOpenKeyExA 195->196 197 c4103b 195->197 198 c41285 RegSetValueExA RegCloseKey 196->198 199 c4126e RegCreateKeyA 196->199 200 c41154 RegOpenKeyExA 197->200 201 c41046 197->201 204 c412ab 198->204 199->198 202 c41191 7 API calls 200->202 203 c4117a RegCreateKeyA 200->203 201->204 205 c4113d EndDialog 201->205 206 c41067 201->206 203->202 206->204 207 c41071 IsDlgButtonChecked 206->207 208 c4108d 207->208 209 c4107f EnableWindow 207->209 210 c4111c SetDlgItemTextA 208->210 211 c4109a 6 API calls 208->211 209->208 223 c412c0 224 c412d3 ShellExecuteA OutputDebugStringA 223->224 224->224 225 c412f6 224->225 226 c41621 IsDebuggerPresent _crt_debugger_hook SetUnhandledExceptionFilter UnhandledExceptionFilter 227 c41713 GetCurrentProcess TerminateProcess 226->227 228 c4170b _crt_debugger_hook 226->228 228->227 212 c4100b DialogBoxParamA 229 c41536 231 c41544 __set_app_type _encode_pointer __p__fmode __p__commode 229->231 232 c415e3 _pre_c_init __RTC_Initialize 231->232 233 c415f1 __setusermatherr 232->233 234 c415fd 232->234 233->234 239 c41a6a _controlfp_s 234->239 237 c41614 238 c4160b _configthreadlocale 238->237 240 c41a86 _invoke_watson 239->240 241 c41602 239->241 240->241 241->237 241->238 242 c41617 245 c41a98 242->245 244 c4161c 244->244 246 c41abd 245->246 247 c41aca GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 245->247 246->247 248 c41ac1 246->248 247->248 248->244 250 c41b70 GetProcAddress 251 c414d1 _XcptFilter 252 c41312 257 c41823 252->257 255 c41357 256 c4134f _amsg_exit 256->255 260 c4177e 257->260 259 c41317 __wgetmainargs 259->255 259->256 267 c419ec 260->267 262 c4178a _decode_pointer 263 c417a1 _onexit 262->263 264 c417ad 7 API calls 262->264 265 c41811 __onexit 263->265 268 c4181a _unlock 264->268 265->259 267->262 268->265 269 c41358 289 c419ec 269->289 271 c41364 GetStartupInfoW 272 c41395 InterlockedCompareExchange 271->272 273 c413a2 272->273 274 c413a6 272->274 273->274 275 c413ae Sleep 273->275 276 c413c7 _amsg_exit 274->276 277 c413d1 274->277 275->272 278 c413fa 276->278 277->278 279 c413da _initterm_e 277->279 281 c41424 278->281 282 c41409 _initterm 278->282 279->278 280 c413f5 __onexit 279->280 283 c41429 InterlockedExchange 281->283 285 c41431 __IsNonwritableInCurrentImage 281->285 282->281 283->285 285->280 286 c414b5 exit 285->286 287 c41501 285->287 290 c41000 285->290 286->285 287->280 288 c41509 _cexit 287->288 288->280 289->271 291 c4100b DialogBoxParamA 290->291 291->285

Callgraph

Hide Legend
  • Executed
  • Not Executed
  • Opacity -> Relevance
  • Disassembly available
callgraph 0 Function_00C41A45 1 Function_00C41305 2 Function_00C412C0 3 Function_00C41000 4 Function_00C41308 5 Function_00C4100B 6 Function_00C41A95 7 Function_00C41617 14 Function_00C41A98 7->14 8 Function_00C41890 9 Function_00C418D0 10 Function_00C41B90 11 Function_00C414D1 12 Function_00C41312 24 Function_00C41823 12->24 13 Function_00C4151D 15 Function_00C41358 15->3 20 Function_00C41920 15->20 25 Function_00C419EC 15->25 31 Function_00C41A31 15->31 16 Function_00C4181A 17 Function_00C414E5 17->31 18 Function_00C41727 19 Function_00C41020 20->8 20->9 21 Function_00C41860 22 Function_00C41621 23 Function_00C41521 23->31 32 Function_00C4177E 24->32 26 Function_00C41A6A 27 Function_00C419AB 28 Function_00C41774 29 Function_00C41536 29->6 29->26 34 Function_00C4183A 29->34 30 Function_00C41B70 32->16 32->25 32->31 33 Function_00C419BF

Executed Functions

Control-flow Graph

APIs
  • IsDlgButtonChecked.USER32(?,0000006E), ref: 00C41074
  • EnableWindow.USER32(?,00000000), ref: 00C41087
  • SetDlgItemTextA.USER32(?,00000068,End), ref: 00C410AC
  • _beginthreadex.MSVCR90 ref: 00C410C7
  • _beginthreadex.MSVCR90 ref: 00C410D8
  • _beginthreadex.MSVCR90 ref: 00C410E9
  • _beginthreadex.MSVCR90 ref: 00C410FD
  • _beginthreadex.MSVCR90 ref: 00C4110E
  • SetDlgItemTextA.USER32(?,00000068,Begin), ref: 00C4112E
  • EndDialog.USER32(?), ref: 00C41142
  • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\Windows\CurrentVersion\Policies\System\,00000000,000F003F,00C4344C), ref: 00C4116A
  • RegCreateKeyA.ADVAPI32(?,DisableTaskmgr,00C4344C), ref: 00C4118B
  • RegSetValueExA.ADVAPI32(?,DisableTaskmgr,00000000,00000004,00C43378,00000004), ref: 00C411A8
  • RegCloseKey.ADVAPI32(?), ref: 00C411B5
  • GetDesktopWindow.USER32 ref: 00C411BB
  • GetWindowRect.USER32(00000000,?), ref: 00C411D2
  • GetWindowRect.USER32(?,?), ref: 00C411DA
  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000001), ref: 00C41227
  • GetDlgItem.USER32(?,00000068), ref: 00C41230
  • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Policies\System\,00000000,000F003F,00C4344C), ref: 00C4125E
  • RegCreateKeyA.ADVAPI32(?,DisableTaskmgr,00C4344C), ref: 00C4127F
  • RegSetValueExA.ADVAPI32(?,DisableTaskmgr,00000000,00000004,00000000,00000004), ref: 00C41299
  • RegCloseKey.ADVAPI32(?), ref: 00C412A5
Strings
Memory Dump Source
  • Source File: 00000000.00000002.2113463938.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
  • Associated: 00000000.00000002.2113379617.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.2113511231.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.2113554679.0000000000C44000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_c40000_EXPLRRAPE.jbxd
Similarity
  • API ID: Window_beginthreadex$Item$CloseCreateOpenRectTextValue$ButtonCheckedDesktopDialogEnable
  • String ID: Begin$DisableTaskmgr$End$Software\Microsoft\Windows\CurrentVersion\Policies\System\
  • API String ID: 2276799061-556417016
  • Opcode ID: 60c519d07d5586eb984365e597580f290a2201e7d4be9a41d0c4e3895621b057
  • Instruction ID: 8b4d2e2f4176965f976296a580a01c75abf8065cdc72e15a37f4e941c9fe8816
  • Opcode Fuzzy Hash: 60c519d07d5586eb984365e597580f290a2201e7d4be9a41d0c4e3895621b057
  • Instruction Fuzzy Hash: 7551B7797803007BE3349B68DC4BF9E7AE5BB85F10F584514FB45E61D0D6F0A980C659

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 19 c41000-c41005 20 c4100b-c4101c DialogBoxParamA 19->20
APIs
  • DialogBoxParamA.USER32(?,00000067,?,00C41020,00000000), ref: 00C41016
Memory Dump Source
  • Source File: 00000000.00000002.2113463938.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
  • Associated: 00000000.00000002.2113379617.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.2113511231.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.2113554679.0000000000C44000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_c40000_EXPLRRAPE.jbxd
Similarity
  • API ID: DialogParam
  • String ID:
  • API String ID: 665744214-0
  • Opcode ID: 7afad151a48fd263912a92644d7361ef378f2671261b6cf75be994cd887315ed
  • Instruction ID: 2be6dc4fa2d92cc20558bb852a6f4365d1982794a9c69de9e392c9339cbee196
  • Opcode Fuzzy Hash: 7afad151a48fd263912a92644d7361ef378f2671261b6cf75be994cd887315ed
  • Instruction Fuzzy Hash: 11C09B79790341FBE134CF60ED4AF2D3755F389B00F118504B641561F4CBE1A951DA14

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 21 c4100b-c4101c DialogBoxParamA
APIs
  • DialogBoxParamA.USER32(?,00000067,?,00C41020,00000000), ref: 00C41016
Memory Dump Source
  • Source File: 00000000.00000002.2113463938.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
  • Associated: 00000000.00000002.2113379617.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.2113511231.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.2113554679.0000000000C44000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_c40000_EXPLRRAPE.jbxd
Similarity
  • API ID: DialogParam
  • String ID:
  • API String ID: 665744214-0
  • Opcode ID: 229f5d4c4f69d443e7d25c089a4eeb79aa5e68dfac3f66946c3af9eb8f627d37
  • Instruction ID: 852030ff325aeabb7aa221a3ba01625ca5dd8831e834298b16df5e5da1027326
  • Opcode Fuzzy Hash: 229f5d4c4f69d443e7d25c089a4eeb79aa5e68dfac3f66946c3af9eb8f627d37
  • Instruction Fuzzy Hash: CCB012702C030175E03043101D07F2A2409B300B00F1104003681640C8C1D15450D424

Non-executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 22 c412c0-c412cd 23 c412d3-c412f4 ShellExecuteA OutputDebugStringA 22->23 23->23 24 c412f6-c412fb 23->24
APIs
  • ShellExecuteA.SHELL32(?,open,explorer.exe,00000000,00000000,00000005), ref: 00C412E4
  • OutputDebugStringA.KERNEL32(Invoke Notepad), ref: 00C412EB
Strings
Memory Dump Source
  • Source File: 00000000.00000002.2113463938.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
  • Associated: 00000000.00000002.2113379617.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.2113511231.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.2113554679.0000000000C44000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_c40000_EXPLRRAPE.jbxd
Similarity
  • API ID: DebugExecuteOutputShellString
  • String ID: Invoke Notepad$explorer.exe$open
  • API String ID: 4251854420-848213852
  • Opcode ID: cf5504839b3958b476e95455b09b44e3de9a72bbdc20283a9618fbd086c086fc
  • Instruction ID: 3f5d2b7737eb775878a8cda539c1c5de20c2c6e9ad1a0a97552a645e65abbd90
  • Opcode Fuzzy Hash: cf5504839b3958b476e95455b09b44e3de9a72bbdc20283a9618fbd086c086fc
  • Instruction Fuzzy Hash: CDE0123A391250BAD620A655AC87F4F67A8BB86B11F954025F710F719191A06D40C7B4