Edit tour

Windows Analysis Report
250428-dq9xmaztft.bin.exe

Overview

General Information

Sample name:250428-dq9xmaztft.bin.exe
Analysis ID:1675861
MD5:dbc7c9b64696b92d0b551b08ba21cc45
SHA1:cd3fb7070e07b640df6a297fbdb6274345a3cf62
SHA256:3db2b13eb95ac2759b948f25b423ee1965b9c8e0badddea010a73bbb4bcd4300
Tags:user-UNP4CK
Infos:

Detection

CyberGate
Score:80
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CyberGate RAT
Contain functionality to detect virtual machines
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
One or more processes crash
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • 250428-dq9xmaztft.bin.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\250428-dq9xmaztft.bin.exe" MD5: DBC7C9B64696B92D0B551B08BA21CC45)
    • WerFault.exe (PID: 7700 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 476 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CyberGateAccording to Subex Secure, CyberGate is a Remote Access Trojan (RAT) that allows an attacker to gain unauthorized access tothe victims system. Attackers can remotely connect to the compromised system from anywherearound the world. The Malware author generally uses this program to steal private informationlike passwords, files, etc. It might also be used to install malicious software on the compromisedsystems.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cybergate
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_CyberGateYara detected CyberGate RATJoe Security
    00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpWindows_Trojan_CyberGate_517aac7dunknownunknown
    • 0xb140:$a1: IELOGIN.abc
    • 0x8ee8:$a2: xxxyyyzzz.dat
    • 0xb0e8:$a3: _x_X_PASSWORDLIST_X_x_
    • 0x6f30:$a4: L$_RasDefaultCredentials#0
    • 0x9db4:$a5: \signons1.txt
    00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpWindows_Trojan_CyberGate_9996d800unknownunknown
    • 0x9fa2:$a1: 24 08 8B 44 24 08 83 C4 14 5D 5F 5E 5B C3 55 8B EC 83 C4 F0
    Process Memory Space: 250428-dq9xmaztft.bin.exe PID: 7624JoeSecurity_CyberGateYara detected CyberGate RATJoe Security
      Process Memory Space: 250428-dq9xmaztft.bin.exe PID: 7624Windows_Trojan_CyberGate_517aac7dunknownunknown
      • 0x7d5a:$a1: IELOGIN.abc
      • 0x7943:$a2: xxxyyyzzz.dat
      • 0x7cff:$a3: _x_X_PASSWORDLIST_X_x_
      • 0x7d26:$a3: _x_X_PASSWORDLIST_X_x_
      • 0x760f:$a4: L$_RasDefaultCredentials#0
      • 0x7b7b:$a5: \signons1.txt
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 250428-dq9xmaztft.bin.exeAvira: detected
      Source: 250428-dq9xmaztft.bin.exeVirustotal: Detection: 58%Perma Link
      Source: 250428-dq9xmaztft.bin.exeReversingLabs: Detection: 86%
      Source: 250428-dq9xmaztft.bin.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 250428-dq9xmaztft.bin.exe PID: 7624, type: MEMORYSTR

      System Summary

      barindex
      Source: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_517aac7d Author: unknown
      Source: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 Author: unknown
      Source: Process Memory Space: 250428-dq9xmaztft.bin.exe PID: 7624, type: MEMORYSTRMatched rule: Windows_Trojan_CyberGate_517aac7d Author: unknown
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 476
      Source: 250428-dq9xmaztft.bin.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_517aac7d reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = 3d998bda8e56de6fd6267abdacffece8bcf1c62c2e06540a54244dc6ea816825, id = 517aac7d-2737-4917-9aa1-c0bd1c3e9801, last_modified = 2022-04-12
      Source: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_CyberGate_9996d800 reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = eb39d2ff211230aedcf1b5ec0d1dfea108473cc7cba68f5dc1a88479734c02b0, id = 9996d800-a833-4535-972b-3ee320215bb6, last_modified = 2022-04-12
      Source: Process Memory Space: 250428-dq9xmaztft.bin.exe PID: 7624, type: MEMORYSTRMatched rule: Windows_Trojan_CyberGate_517aac7d reference_sample = 07b8f25e7b536f5b6f686c12d04edc37e11347c8acd5c53f98a174723078c365, os = windows, severity = x86, creation_date = 2022-02-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CyberGate, fingerprint = 3d998bda8e56de6fd6267abdacffece8bcf1c62c2e06540a54244dc6ea816825, id = 517aac7d-2737-4917-9aa1-c0bd1c3e9801, last_modified = 2022-04-12
      Source: classification engineClassification label: mal80.troj.evad.winEXE@2/5@0/0
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7624
      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\35e63d88-21d9-4e04-a279-386848f23e62Jump to behavior
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 250428-dq9xmaztft.bin.exeVirustotal: Detection: 58%
      Source: 250428-dq9xmaztft.bin.exeReversingLabs: Detection: 86%
      Source: unknownProcess created: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exe "C:\Users\user\Desktop\250428-dq9xmaztft.bin.exe"
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 476
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeSection loaded: pstorec.dllJump to behavior
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00404846 push 00404874h; ret 0_2_0040486C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00404848 push 00404874h; ret 0_2_0040486C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_004048E4 push 00404910h; ret 0_2_00404908
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_004050EC push 00405118h; ret 0_2_00405110
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_0040B080 push 0040B0ACh; ret 0_2_0040B0A4
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_004058A8 push 004058D4h; ret 0_2_004058CC
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00409948 push 00409974h; ret 0_2_0040996C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00407100 push 0040712Ch; ret 0_2_00407124
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00408918 push 00408954h; ret 0_2_0040894C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_0040891C push 00408954h; ret 0_2_0040894C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00407138 push 00407164h; ret 0_2_0040715C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_004071C4 push 004071F0h; ret 0_2_004071E8
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_0040718C push 004071B8h; ret 0_2_004071B0
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_0040898E push 004089BCh; ret 0_2_004089B4
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00408990 push 004089BCh; ret 0_2_004089B4
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_0040720A push 00407238h; ret 0_2_00407230
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_0040720C push 00407238h; ret 0_2_00407230
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00404216 push 00404244h; ret 0_2_0040423C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00404218 push 00404244h; ret 0_2_0040423C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_0040BAD0 push 0040BB00h; ret 0_2_0040BAF8
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00407AE8 push 00407B24h; ret 0_2_00407B1C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00407AEC push 00407B24h; ret 0_2_00407B1C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_004032B8 push 004032F2h; ret 0_2_004032EA
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00406B10 push 00406B48h; ret 0_2_00406B40
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_0040345C push 00403494h; ret 0_2_0040348C
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00404C88 push 00404E05h; ret 0_2_00404DFD
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_004034A0 push 004034CCh; ret 0_2_004034C4
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_004045CB push 004045F8h; ret 0_2_004045F0
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_004045CC push 004045F8h; ret 0_2_004045F0
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00404644 push 00404697h; ret 0_2_0040468F
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_0040AE50 push 0040AE88h; ret 0_2_0040AE80
      Source: initial sampleStatic PE information: section name: UPX0
      Source: initial sampleStatic PE information: section name: UPX1
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: VBoxService.exe VBoxService.exe 0_2_004051CC
      Source: 250428-dq9xmaztft.bin.exe, 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: SBIEDLL.DLLS3
      Source: 250428-dq9xmaztft.bin.exe, 250428-dq9xmaztft.bin.exe, 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: SBIEDLL.DLL
      Source: Amcache.hve.3.drBinary or memory string: VMware
      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: 250428-dq9xmaztft.bin.exe, 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VBoxService.exeS3
      Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.3.drBinary or memory string: vmci.sys
      Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
      Source: 250428-dq9xmaztft.bin.exe, 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VBoxService.exe
      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.3.drBinary or memory string: VMware20,1
      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00401000 LdrInitializeThunk,0_2_00401000
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_004056DC mov eax, dword ptr fs:[00000030h]0_2_004056DC
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00405684 mov eax, dword ptr fs:[00000030h]0_2_00405684
      Source: C:\Users\user\Desktop\250428-dq9xmaztft.bin.exeCode function: 0_2_00405770 mov eax, dword ptr fs:[00000030h]0_2_00405770
      Source: 250428-dq9xmaztft.bin.exe, 250428-dq9xmaztft.bin.exe, 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_TrayWnd
      Source: 250428-dq9xmaztft.bin.exe, 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: explorer.exeexplorer.exeshell_traywndopenU
      Source: 250428-dq9xmaztft.bin.exe, 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_TrayWndU
      Source: 250428-dq9xmaztft.bin.exe, 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: _PERSISTShell_TrayWndexplorer.exeU
      Source: 250428-dq9xmaztft.bin.exe, 250428-dq9xmaztft.bin.exe, 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: shell_traywnd
      Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 250428-dq9xmaztft.bin.exe PID: 7624, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      2
      Process Injection
      11
      Virtualization/Sandbox Evasion
      OS Credential Dumping221
      Security Software Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Software Packing
      LSASS Memory11
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
      Process Injection
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      DLL Side-Loading
      NTDS1
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1675861 Sample: 250428-dq9xmaztft.bin.exe Startdate: 28/04/2025 Architecture: WINDOWS Score: 80 11 Malicious sample detected (through community Yara rule) 2->11 13 Antivirus / Scanner detection for submitted sample 2->13 15 Multi AV Scanner detection for submitted file 2->15 17 2 other signatures 2->17 6 250428-dq9xmaztft.bin.exe 2->6         started        process3 signatures4 19 Contain functionality to detect virtual machines 6->19 21 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 6->21 9 WerFault.exe 21 16 6->9         started        process5

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      250428-dq9xmaztft.bin.exe58%VirustotalBrowse
      250428-dq9xmaztft.bin.exe86%ReversingLabsWin32.Worm.Rebhip
      250428-dq9xmaztft.bin.exe100%AviraTR/Llac.hqa
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netAmcache.hve.3.drfalse
        high
        No contacted IP infos
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1675861
        Start date and time:2025-04-28 05:20:21 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 52s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:15
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:250428-dq9xmaztft.bin.exe
        Detection:MAL
        Classification:mal80.troj.evad.winEXE@2/5@0/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 20
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.189.173.20, 20.190.190.195, 184.29.183.29, 131.253.33.254, 20.12.23.50
        • Excluded domains from analysis (whitelisted): a-ring-fallback.msedge.net, fs.microsoft.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target 250428-dq9xmaztft.bin.exe, PID 7624 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        TimeTypeDescription
        23:21:19API Interceptor1x Sleep call for process: WerFault.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.7828806772333771
        Encrypted:false
        SSDEEP:96:zxFpyyPs+hhk7Mf3QXIDcQvc6QcEVcw3cE/n+HbHg/uAnQO32k8q9w7N/4oRgmOm:NDZPe0BU/gjZgnqzuiF7Z24IO8XiV
        MD5:0E6C22725B84CE00F7CA23EA6A678733
        SHA1:4856048877B8D968BF5ED7656AAA217358E17123
        SHA-256:1EFEAF5FB47A739D23EC3E112D769ACA99524BDD9A0AD64D94F2BF1F8F12F593
        SHA-512:8D220DF34EFD98501F8DBC09A48489A0E5FB71D3AD1E692785AFF5E7A8C6B510B23F6362E1F8C129A5F9B21AD0E059F3BC243A3CB1F46732BD9BB9811E6C64B0
        Malicious:false
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.9.0.2.8.4.0.7.5.9.3.1.7.3.2.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.9.0.2.8.4.0.7.6.2.7.5.4.7.8.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.b.d.f.3.8.c.1.-.6.b.0.6.-.4.7.b.0.-.a.8.4.9.-.3.b.5.3.6.0.e.8.a.8.8.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.a.0.0.1.8.3.-.a.4.4.6.-.4.c.f.d.-.9.5.0.b.-.a.2.2.f.1.5.0.3.e.c.0.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.2.5.0.4.2.8.-.d.q.9.x.m.a.z.t.f.t...b.i.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.c.8.-.0.0.0.1.-.0.0.1.8.-.a.2.d.1.-.a.4.9.9.e.c.b.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.2.b.8.d.b.a.2.4.7.5.3.6.0.e.e.4.3.2.9.b.0.5.c.9.b.e.f.f.e.4.0.0.0.0.0.f.f.f.f.!.0.0.0.0.c.d.3.f.b.7.0.7.0.e.0.7.b.6.4.0.d.f.6.a.2.9.7.f.b.d.b.6.2.7.4.3.4.5.a.3.c.f.6.2.!.2.5.0.4.2.8.-.d.q.9.x.m.a.z.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Mon Apr 28 03:21:16 2025, 0x1205a4 type
        Category:dropped
        Size (bytes):35854
        Entropy (8bit):1.9458937226745838
        Encrypted:false
        SSDEEP:192:ketGA6vtT/6OcrHk1M9E7tiQh6ZoXhi+M:T03DFcro7tiQ46X2
        MD5:71951CA9EE38A029B831B7488CA8FCD8
        SHA1:38E875C56D270CBDC00368A9471DF96A008A5C37
        SHA-256:7B5744EF4596D61F40E61A7AF510AF50AFE355B94323061284B1B5928175002F
        SHA-512:287994237A91CBC8E304E270AD82664DF92C2F1B361D9DAE8C5226D5E5BDE787B1BF5E8A141DA44752392C65D6F962820C1F94B8DB3B37CCE45FAE1503FD57B0
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... .......,..h........................................."..........T.......8...........T........... ....x..........,...........................................................................................eJ..............GenuineIntel............T...........+..h.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8360
        Entropy (8bit):3.6979608503546157
        Encrypted:false
        SSDEEP:192:R6l7wVeJtL6b6Y6qSUeOgmfa9prH89bmxsftim:R6lXJR6b6Y3SUeOgmfaYmqfZ
        MD5:54F7BB1D7890D3612BCBF7D9DC4DA50E
        SHA1:FC51BD8AED12217537CC81F324A26BA72D869A82
        SHA-256:BBEA8BA6FD0F53A37FDCC6E2C8280963BB1B52202E2BEFD35680000C54496F06
        SHA-512:898C491F064142A24BFEB3D0AB603E0D5111BCF8586B5A2C7842BFE630609C9B6A104AC2BA5FD60F14EFB0E171CB9B20279950DEDA46F1C57B2C678917A9E0D4
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.2.4.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4656
        Entropy (8bit):4.479126513855226
        Encrypted:false
        SSDEEP:96:uIjf+I7br7VYJfbmb2b8OgPbabgh2z2ydd:uIiYbr7CfKSQOkm04S4
        MD5:90A6065E3D971EB5DF5CA052BE1357F7
        SHA1:63144AC865C47F5695A1E3854AD90B950E820794
        SHA-256:3A1F576373257FD2D54B81315E4243638A862583E0DC65701EEC9E40906C173F
        SHA-512:1A0158A0F54D29BD829936CF716B2EA010357B308BB0BF355A5F401D2A114A48E4C3A5508BE815B7AA6C6D5DE6A9415FF23897EC0DF89077EA0D98B24A516E9F
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="824783" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.4687398842376025
        Encrypted:false
        SSDEEP:6144:AIXfpi67eLPU9skLmb0b4QWSPKaJG8nAgejZMMhA2gX4WABlVuNHdwBCswSbk:FXD94QWlLZMM6YFUt+k
        MD5:695EC25C00A71FB0D3E64DEFAA776484
        SHA1:5BA580E386EA69DE3037F7235F8C083F6FDB5D50
        SHA-256:8035FCE8B763A0BF05C5144476DFCE1E33647C399EDCDF1A4300DAAC80D826F0
        SHA-512:5F89F0BA5D77EC0BCD7ADD0E909DED97C4B937EEA1A7B185DBFBF91F3C49FADFFB064EA1FE3E3862E8ACDC273E9426CF7EE98FE4D2A74F4B931F978F060BBB0E
        Malicious:false
        Reputation:low
        Preview:regf:...:....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..................................................................................................................................................................................................................................................................................................................................................p.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
        Entropy (8bit):7.74964605238861
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.37%
        • UPX compressed Win32 Executable (30571/9) 0.30%
        • Win32 EXE Yoda's Crypter (26571/9) 0.26%
        • Win16/32 Executable Delphi generic (2074/23) 0.02%
        • Generic Win/DOS Executable (2004/3) 0.02%
        File name:250428-dq9xmaztft.bin.exe
        File size:278'528 bytes
        MD5:dbc7c9b64696b92d0b551b08ba21cc45
        SHA1:cd3fb7070e07b640df6a297fbdb6274345a3cf62
        SHA256:3db2b13eb95ac2759b948f25b423ee1965b9c8e0badddea010a73bbb4bcd4300
        SHA512:c2a8126be4ee92756c2101570043076542f3e3e61f511f07e762a8730c8c97d26295fd3f64d522b4aac670693cf3342d219e65a5cab854ae8b6022e2beaba057
        SSDEEP:6144:Mk4qmr73P0MqUgOtiehS+jjr4vbdG/08yG2UI9:/9gPq7jajHUtUI
        TLSH:844412D7E58DE8EDE4A34D345B29D0F46CEF2166A630BB348D0FC7E565390D2688920B
        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x4535d0
        Entrypoint Section:UPX1
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        DLL Characteristics:
        Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:cba5bd52b3e624400ffe41eb22644b79
        Instruction
        pushad
        mov esi, 00410000h
        lea edi, dword ptr [esi-0000F000h]
        push edi
        or ebp, FFFFFFFFh
        jmp 00007F72ECB3EB12h
        nop
        nop
        nop
        nop
        nop
        nop
        mov al, byte ptr [esi]
        inc esi
        mov byte ptr [edi], al
        inc edi
        add ebx, ebx
        jne 00007F72ECB3EB09h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jc 00007F72ECB3EAEFh
        mov eax, 00000001h
        add ebx, ebx
        jne 00007F72ECB3EB09h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        adc eax, eax
        add ebx, ebx
        jnc 00007F72ECB3EB0Dh
        jne 00007F72ECB3EB2Ah
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jc 00007F72ECB3EB21h
        dec eax
        add ebx, ebx
        jne 00007F72ECB3EB09h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        adc eax, eax
        jmp 00007F72ECB3EAD6h
        add ebx, ebx
        jne 00007F72ECB3EB09h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        adc ecx, ecx
        jmp 00007F72ECB3EB54h
        xor ecx, ecx
        sub eax, 03h
        jc 00007F72ECB3EB13h
        shl eax, 08h
        mov al, byte ptr [esi]
        inc esi
        xor eax, FFFFFFFFh
        je 00007F72ECB3EB77h
        sar eax, 1
        mov ebp, eax
        jmp 00007F72ECB3EB0Dh
        add ebx, ebx
        jne 00007F72ECB3EB09h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jc 00007F72ECB3EACEh
        inc ecx
        add ebx, ebx
        jne 00007F72ECB3EB09h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jc 00007F72ECB3EAC0h
        add ebx, ebx
        jne 00007F72ECB3EB09h
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        adc ecx, ecx
        add ebx, ebx
        jnc 00007F72ECB3EAF1h
        jne 00007F72ECB3EB0Bh
        mov ebx, dword ptr [esi]
        sub esi, FFFFFFFCh
        adc ebx, ebx
        jnc 00007F72ECB3EAE6h
        add ecx, 02h
        cmp ebp, FFFFFB00h
        adc ecx, 02h
        lea edx, dword ptr [eax+eax]
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x540f80x274.rsrc
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x540000xf8.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x537800x18UPX1
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        UPX00x10000xf0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        UPX10x100000x440000x43800335d859e02c8bd405046f81f3ffa6471False0.9712239583333333data7.7524604698030055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x540000x10000x4003020cd185afa956fe5de9b5693c4ea9dFalse0.435546875data3.538710451959907IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_RCDATA0x140f80x10Non-ISO extended-ASCII text, with no line terminators1.5625
        RT_RCDATA0x141080x184data1.0283505154639174
        RT_RCDATA0x1428c0x39714data0.9697174478502576
        DLLImport
        KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
        advapi32.dllLsaClose
        crypt32.dllCryptUnprotectData
        ole32.dllCoTaskMemFree
        oleaut32.dllSysFreeString
        pstorec.dllPStoreCreateInstance
        rasapi32.dllRasEnumEntriesA
        shell32.dllSHGetSpecialFolderPathA
        user32.dllToAscii
        No network behavior found

        Click to jump to process

        Click to jump to process

        • File
        • Registry

        Click to dive into process behavior distribution

        Target ID:0
        Start time:23:21:15
        Start date:27/04/2025
        Path:C:\Users\user\Desktop\250428-dq9xmaztft.bin.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\250428-dq9xmaztft.bin.exe"
        Imagebase:0x400000
        File size:278'528 bytes
        MD5 hash:DBC7C9B64696B92D0B551B08BA21CC45
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_CyberGate, Description: Yara detected CyberGate RAT, Source: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_CyberGate_517aac7d, Description: unknown, Source: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
        • Rule: Windows_Trojan_CyberGate_9996d800, Description: unknown, Source: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
        Reputation:low
        Has exited:true

        Target ID:3
        Start time:23:21:15
        Start date:27/04/2025
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 476
        Imagebase:0xdb0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

        Non-executed Functions

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: VBoxService.exe
        • API String ID: 0-2802435167
        • Opcode ID: ae5a43af987541d904bba9b23c99602398b9251528d56931a374be0b8e88db9a
        • Instruction ID: ce6113ea2979276788e507494077e0e0ff2a53a3b4df08506616381c0f5a3b67
        • Opcode Fuzzy Hash: ae5a43af987541d904bba9b23c99602398b9251528d56931a374be0b8e88db9a
        • Instruction Fuzzy Hash: EC216070A016184FDB60DB64CC506DE72B4EF49320F4046F5E418A62C0EB349F818F59
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: DAEMON
        • API String ID: 0-1922372065
        • Opcode ID: b0de7b8fb35449f7b434d1e2663b4a338ee112504bb8dedebe566ac1d7f8ccf1
        • Instruction ID: 9cfd0179beeaed7316d0f8836b3b2e77592066f2d5a2c6f03f7b9fc71bddb227
        • Opcode Fuzzy Hash: b0de7b8fb35449f7b434d1e2663b4a338ee112504bb8dedebe566ac1d7f8ccf1
        • Instruction Fuzzy Hash: FAE04F31240A48ABEB128B548C12B57BBEDD345B44F1144B1E901E3AC1D6B9EE10A869
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7d51dd3333f7bcaa3a199956a7b34c87b3a8b4bcc97f0b16e23f9785204377eb
        • Instruction ID: d271792d785d210391614b07c8f8c76f7448976e954ed0a31331ca5470dfdd96
        • Opcode Fuzzy Hash: 7d51dd3333f7bcaa3a199956a7b34c87b3a8b4bcc97f0b16e23f9785204377eb
        • Instruction Fuzzy Hash: DA11696154E3C29FC3238BB05C655913FF0A903314B1D85EBC1C5CA4A3E36D998AC7A6
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 011f3edd17df6e3a0d3e9760639db1b7d270aba6d112c1f8f5362d8ca4fcb0d0
        • Instruction ID: 7f94392c905d70edd5cae979f2db0d97197127d2bd1df01fa9d4973e5e5bf9ed
        • Opcode Fuzzy Hash: 011f3edd17df6e3a0d3e9760639db1b7d270aba6d112c1f8f5362d8ca4fcb0d0
        • Instruction Fuzzy Hash: ADE02630809A048EEF24CB4595052ABB7F8D742324F5484B6D00C673C0D67B9A94CE08
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: ba6bc1ae00c6916c74ed3910e531681c6c6ecc516f8f8c804ff5c88a679010f2
        • Instruction ID: 4236f64593cb35683e782d4f7c4e11c0f3d3bdd44736c68a4ca992c86675be2c
        • Opcode Fuzzy Hash: ba6bc1ae00c6916c74ed3910e531681c6c6ecc516f8f8c804ff5c88a679010f2
        • Instruction Fuzzy Hash: 13B00279261650CFD791CB08C598F40B7F5FB48B74F8685D5E8498B663C378E914CA04
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: CreateToolhelp32Snapshot$D@$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
        • API String ID: 0-706198529
        • Opcode ID: e44043a5c6ec1fb0395bec5e3145d3f3e15c47d7f6a18102ea2b19361cce7cfa
        • Instruction ID: d1f0183e68ccb48df209f295c30c53a11a1d559a28beed7202e37b70c901c667
        • Opcode Fuzzy Hash: e44043a5c6ec1fb0395bec5e3145d3f3e15c47d7f6a18102ea2b19361cce7cfa
        • Instruction Fuzzy Hash: BA3115F0A41711AFEB60EFB5D984F6A37A8FB86700710497AB110EF2D4DB7888158B1D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: FIREFOX.abc$IEAUTO.abc$IELOGIN.abc$IEPASS.abc$IEWEB.abc$MSN.abc$NOIP.abc$Restart$XX--XX--XX.txt$_x_X_BLOCKMOUSE_X_x_$_x_X_PASSWORDLIST_X_x_$_x_X_UPDATE_X_x_
        • API String ID: 0-1131808598
        • Opcode ID: 22cb5db557bca42109ec2ce448ef416fdc04c0b9c17b343d7cef6674cbeb9617
        • Instruction ID: b8965be9de718af24089a035bdc02112c50a0912f36e272cb16d9bc2a670772d
        • Opcode Fuzzy Hash: 22cb5db557bca42109ec2ce448ef416fdc04c0b9c17b343d7cef6674cbeb9617
        • Instruction Fuzzy Hash: 81C15534600205DBEB20EBE5DD80B9E7368DB45720F104B36E521BB6E5CF78ED45CA99
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: @$@$@$@$@$@$@$@$@$@$@$@
        • API String ID: 0-1661000548
        • Opcode ID: 87e0650224fc6365c21d9740a74204c074fb4eda01dc7f8725578023f0202290
        • Instruction ID: 262792def3e08e49ced55881eaf45155c684a4fae8c6c0107ad086c0fef8953c
        • Opcode Fuzzy Hash: 87e0650224fc6365c21d9740a74204c074fb4eda01dc7f8725578023f0202290
        • Instruction Fuzzy Hash: 3561D63094438155EA616BAD8E11B6E3352CF92370F540772E9B47F3E4CBBA8CC5866E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: @$$@$(@$,@$0@$4@$4@$8@
        • API String ID: 0-1680638143
        • Opcode ID: d8a51b3e9d6a309a6a60b638edc90f32e4db7e362c53eeb481cc44e83d31fc36
        • Instruction ID: aafe9305adef0a4577807905898c9475ca1e6ef934aab2b99e2c07de86755ea1
        • Opcode Fuzzy Hash: d8a51b3e9d6a309a6a60b638edc90f32e4db7e362c53eeb481cc44e83d31fc36
        • Instruction Fuzzy Hash: 2A31855220024697D69477AF588021E7714DB817383E1FF32F634AB2F0CA3C9AA1566A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: $@$explorer.exe$explorer.exe$open$shell_traywnd$@
        • API String ID: 0-832551239
        • Opcode ID: 09d67a5879f9fa1145ec8883851479d195ff286c62b66a034d7299737acc3c37
        • Instruction ID: e38edcd168b01171bdd195fc9d3f9726421cd2c2b0648860a6a2751a5fb965b7
        • Opcode Fuzzy Hash: 09d67a5879f9fa1145ec8883851479d195ff286c62b66a034d7299737acc3c37
        • Instruction Fuzzy Hash: 33C13F74B803099BEB10DFE8CC81F9E77A5AB48730F104736A630AB3D5D774A94586AD
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: CredEnumerateA$CredFree$Messenger|$WindowsLive:name=*$advapi32.dll$xxxyyyzzz.dat
        • API String ID: 0-2325380974
        • Opcode ID: 6e565f44d6d126964a44c788631028e1c60132116073c0f107525c74c4c854dc
        • Instruction ID: bd18354d8ca51012b85a46cf14d5c835d479d70f56be5b829788c3142383a695
        • Opcode Fuzzy Hash: 6e565f44d6d126964a44c788631028e1c60132116073c0f107525c74c4c854dc
        • Instruction Fuzzy Hash: 62314F75A00209AFDF10DBA5CC80EDEB7B9FB48710B604676E520B76D1D778AD05CB94
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: Address: $J$Password: $User: $abe2869f-9b47-4cd9-a358-c22904dba7f7
        • API String ID: 0-1664342708
        • Opcode ID: 1c222bc7e948476da8036d628616afe27a2ebd179714066b977a7ec46abc7746
        • Instruction ID: ce5fb88048802301af1d9b476d305fa24a99d632b666a669f31097ddf2dd0c1a
        • Opcode Fuzzy Hash: 1c222bc7e948476da8036d628616afe27a2ebd179714066b977a7ec46abc7746
        • Instruction Fuzzy Hash: A1915134A001199BDB10DB64CC80FDEB3B9EF98310F5086A6E518A73D5DB34AE85CF65
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: Address: $J$Password: $User: $abe2869f-9b47-4cd9-a358-c22904dba7f7
        • API String ID: 0-1664342708
        • Opcode ID: 44d50c30eadc3a79b363d5eec8e35d6f738c12b5ba2e589d41db9c539d1fbfd5
        • Instruction ID: 28554b1815b99cc3e8451cc527d0e877c0999009695d219379de97c8e3f55c8a
        • Opcode Fuzzy Hash: 44d50c30eadc3a79b363d5eec8e35d6f738c12b5ba2e589d41db9c539d1fbfd5
        • Instruction Fuzzy Hash: 1D915034A002199BDB20DB54CC80FDEB3B9EF98310F5086A6E518A73D5DB34AE85CF65
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: ##$$$(unnamed password)$(unnamed value)$.
        • API String ID: 0-4255789323
        • Opcode ID: 2f5b6397444eb9ce3196cb7bb7684ac70f016e3400d3f4fa7cfc09ea69599bc0
        • Instruction ID: 977ce953057e9ce2c0579daeb3de39d5c67aa089fa8a76afe91455a457a3ab12
        • Opcode Fuzzy Hash: 2f5b6397444eb9ce3196cb7bb7684ac70f016e3400d3f4fa7cfc09ea69599bc0
        • Instruction Fuzzy Hash: 83816270B002099BDB00DBE8DD80ADEB7B6EF84320F508676E525E73D4DB34AD968B51
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: @$$@$,@$4@
        • API String ID: 0-500835098
        • Opcode ID: 8184ff3dd20489661d218cdba8cc02e1afa3e64ae1b8c14b65829ef7e57c1497
        • Instruction ID: e250cfd7d6668979c26208d8d8b8435be4d91d09af90cb7c6d93ffdd20dbb076
        • Opcode Fuzzy Hash: 8184ff3dd20489661d218cdba8cc02e1afa3e64ae1b8c14b65829ef7e57c1497
        • Instruction Fuzzy Hash: D68143366451408FC700EF6AD9C5A893BA1EB91310F18CAB5AD586F36BCE34AC15CB7D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: $@$Shell_TrayWnd$_PERSIST$explorer.exe
        • API String ID: 0-3256395681
        • Opcode ID: f9f272cb37f0030fb869147284dc72ac571ca602ce817f507236c5a0a679673a
        • Instruction ID: bf55180769c6d8b29ed11f9594124761d575b143199285d8f310d71af5560344
        • Opcode Fuzzy Hash: f9f272cb37f0030fb869147284dc72ac571ca602ce817f507236c5a0a679673a
        • Instruction Fuzzy Hash: CB218571B40308AAE710DBE5CC81F5E73ACDB44B30F604B36E635BB2D0D674990486AC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: .exe$EXE$\Internet Explorer\iexplore.exe$http\shell\open\command
        • API String ID: 0-1777228431
        • Opcode ID: 166fae413848bc254a776f65d5f94154673ca6cbd90cd7e05e4f3e59ad2e43d7
        • Instruction ID: 8d8c989ba23966b33cffee0856549faf6de9800a0faee454d172807dba4d7908
        • Opcode Fuzzy Hash: 166fae413848bc254a776f65d5f94154673ca6cbd90cd7e05e4f3e59ad2e43d7
        • Instruction Fuzzy Hash: 6221C4746002059BDB04DB99C8D0BAEB3E9EB44330F518775E822A73D4D774AD16C6A6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: $@$@&@$@&@$D0@
        • API String ID: 0-2611904457
        • Opcode ID: c48ee355b43977829a1a9bc83c31bd38a9c03cb793fb1a06c9a4a07eb7ba3644
        • Instruction ID: f8d340f78eef522a2cfa6662c20dfcea6c3bd2915a6677f713f59394713f8ee0
        • Opcode Fuzzy Hash: c48ee355b43977829a1a9bc83c31bd38a9c03cb793fb1a06c9a4a07eb7ba3644
        • Instruction Fuzzy Hash: 7E21A170A022019FEB209FA9C9887577BE5AF45324F184676D819AA2E5C778CCC4CF59
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: ExitThread$GetModuleHandleA$GetProcAddress$kernel32
        • API String ID: 0-3123223305
        • Opcode ID: df8ebffb4aa2406e269455ca8dbf9718bbc133ee3823cae5ff7be4c9f24c4fc8
        • Instruction ID: 05e4694dd0edd3d9dcb88721bb7a64641446aab324666c0259d831ba9cdd4e45
        • Opcode Fuzzy Hash: df8ebffb4aa2406e269455ca8dbf9718bbc133ee3823cae5ff7be4c9f24c4fc8
        • Instruction Fuzzy Hash: A9117C617543043BC200AEBE8C8195FBA9C9B80A35F504F3A7475E73E1E9799D448799
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1194682545.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_401000_250428-dq9xmaztft.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: No-ip DUC|$Password$SOFTWARE\Vitalwerks\DUC$UserName
        • API String ID: 0-1198545640
        • Opcode ID: 78ee59cdf832a5c41c04bc379cead7d7b93f6f7788b3c965da904e2d7d386656
        • Instruction ID: a2ac2f078b20766607025130adfe485ecb726209605b5ee1bc297517a436661c
        • Opcode Fuzzy Hash: 78ee59cdf832a5c41c04bc379cead7d7b93f6f7788b3c965da904e2d7d386656
        • Instruction Fuzzy Hash: 11110430750204BBDB00DA959C51F9EB7BDF788730FA04776A630B72D1D678AE00C258