Create Interactive Tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:791757
MD5:30815e7574409c788e6cfb3247250ee7
SHA1:940d9d02537afa8a892df4920ffc1f9a79c1895a
SHA256:89b2997d84ff0789fac1f4b9a2418ce8f74bed901c6eec51560a9f3b5c639e4b
Tags:exe
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Detected unpacking (changes PE section rights)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Adds a directory exclusion to Windows Defender
Sets debug register (to hijack the execution of another thread)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Drops PE files to the application program directory (C:\ProgramData)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found dropped PE file which has not been started or loaded
Entry point lies outside standard sections
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • file.exe (PID: 4648 cmdline: C:\Users\user\Desktop\file.exe MD5: 30815E7574409C788E6CFB3247250EE7)
    • powershell.exe (PID: 2828 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData' MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 5312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0.2.file.exe.b50000.0.unpackINDICATOR_EXE_Packed_DotNetReactorDetects executables packed with unregistered version of .NET ReactorditekSHen
  • 0xdd171:$s2: is protected by an unregistered version of .NET Reactor!" );</script>
No Sigma rule has matched
Timestamp:192.168.2.7179.43.140.22949775802852939 01/25/23-21:07:05.925109
SID:2852939
Source Port:49775
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

Compliance

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.b50000.0.unpack
Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Networking

barindex
Source: TrafficSnort IDS: 2852939 ETPRO TROJAN Filez Downloader Checkin M2 192.168.2.7:49775 -> 179.43.140.229:80
Source: file.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://179.43.140.229/
Source: file.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://179.43.140.229/DLCGHOUL.php
Source: file.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://179.43.140.229/DLEBEBRA2.php
Source: file.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://179.43.140.229/DLIMSORRY.php
Source: file.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://179.43.140.229/NLIFE.php
Source: file.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://179.43.140.229/VERBORROV.php
Source: powershell.exe, 0000000C.00000002.534261313.0000022E32B8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: file.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.467293034.0000022E1AA51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: powershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

System Summary

barindex
Source: 0.2.file.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
Source: 0.2.file.exe.b50000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0093F3920_2_0093F392
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0093F68D0_2_0093F68D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00942EA90_2_00942EA9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0093F7F70_2_0093F7F7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00942E150_2_00942E15
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0094C4120_2_0094C412
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0093E43F0_2_0093E43F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0093FA3C0_2_0093FA3C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0093EF690_2_0093EF69
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFDC88243590_2_00007FFDC8824359
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFDC8823F440_2_00007FFDC8823F44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFDC88224B80_2_00007FFDC88224B8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFDC88A00880_2_00007FFDC88A0088
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009395A30_2_009395A3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0093E62E0_2_0093E62E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0093EA4D0_2_0093EA4D
Source: C:\Users\user\Desktop\file.exeProcess Stats: CPU usage > 98%
Source: file.exe, 00000000.00000000.248054256.0000000000DCA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamecbInterface.exeR vs file.exe
Source: file.exe, 00000000.00000002.545287951.00000000009A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamecbInterface.exeR vs file.exe
Source: file.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9997964919259783
Source: TGTMAH.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.9997964919259783
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yprrpsu4.ack.ps1Jump to behavior
Source: classification engineClassification label: mal92.evad.winEXE@4/5@0/0
Source: C:\Users\user\Desktop\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5312:120:WilError_01
Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\TGTMAH
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: file.exeStatic file information: File size 2866176 > 1048576
Source: file.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x1b2600
Source: file.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x109200
Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.b50000.0.unpack
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.b50000.0.unpack .data:ER;.rsrc:R;.rsrc:EW; vs Unknown_Section0:ER;Unknown_Section1:R;
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B56CAB push rbp; retf 0_2_00B56CAC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B549ED pushfq ; ret 0_2_00B549EF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B590EE push rdx; retf 0_2_00B590FA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B53CE9 push rsp; retf 0_2_00B53D74
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B53D50 push rsp; retf 0_2_00B53D74
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B57FDD push rsp; ret 0_2_00B5800D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FFDC88A4C39 push ds; iretd 0_2_00007FFDC88A4C3F
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFDC87A7D11 push ebx; retf 000Ah12_2_00007FFDC87A7D3A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFDC87A7CAA push ebx; retf 000Ah12_2_00007FFDC87A7CDA
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFDC87A3247 push esp; retf 12_2_00007FFDC87A3248
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFDC87A72D3 push ebx; iretd 12_2_00007FFDC87A731A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFDC87A4C0C push cs; iretd 12_2_00007FFDC87A4C0F
Source: initial sampleStatic PE information: section where entry point is pointing to: .rsrc
Source: file.exeStatic PE information: 0x924169B0 [Fri Oct 4 00:07:12 2047 UTC]
Source: initial sampleStatic PE information: section name: .rsrc entropy: 7.9997654885259255
Source: initial sampleStatic PE information: section name: .rsrc entropy: 7.9997654885259255
Source: C:\Users\user\Desktop\file.exeFile created: C:\ProgramData\tgtAudio\TGTMAH.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\ProgramData\tgtAudio\TGTMAH.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 0000000000948BF7 instructions caused by: Self-modifying code
Source: file.exeBinary or memory string: WINDBG.EXE
Source: file.exe, 00000000.00000002.547971988.0000000000DE6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: IDAQ64.EXEWINDBG.EXEMSVSMON.EXEFDBG.EXEWIN64_REMOTEX64.EXEIDAG64.EXEX64_DBG.EXE
Source: C:\Users\user\Desktop\file.exe TID: 5388Thread sleep count: 82 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 5388Thread sleep time: -82000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5092Thread sleep count: 9804 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1696Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\ProgramData\tgtAudio\TGTMAH.exeJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9804Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: file.exe, 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: <\\.\VBoxGuest
Source: file.exeBinary or memory string: \\.\VBoxGuest

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess queried: DebugFlagsJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'Jump to behavior
Source: C:\Users\user\Desktop\file.exeThread register set: 4648 501Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'Jump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception111
Process Injection
1
Masquerading
OS Credential Dumping311
Security Software Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Disable or Modify Tools
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
Virtualization/Sandbox Evasion
Security Account Manager131
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets112
System Information Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common22
Software Packing
Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items1
Timestomp
DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 791757 Sample: file.exe Startdate: 25/01/2023 Architecture: WINDOWS Score: 92 17 Snort IDS alert for network traffic 2->17 19 Malicious sample detected (through community Yara rule) 2->19 21 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->21 7 file.exe 2 2->7         started        process3 file4 15 C:\ProgramData\tgtAudio\TGTMAH.exe, PE32+ 7->15 dropped 23 Detected unpacking (changes PE section rights) 7->23 25 Detected unpacking (overwrites its own PE header) 7->25 27 Tries to detect sandboxes and other dynamic analysis tools (window names) 7->27 29 3 other signatures 7->29 11 powershell.exe 20 7->11         started        signatures5 process6 process7 13 conhost.exe 11->13         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
http://179.43.140.229/0%Avira URL Cloudsafe
http://179.43.140.229/DLIMSORRY.php0%Avira URL Cloudsafe
http://179.43.140.229/DLEBEBRA2.php0%Avira URL Cloudsafe
http://179.43.140.229/DLCGHOUL.php0%Avira URL Cloudsafe
http://179.43.140.229/NLIFE.php0%Avira URL Cloudsafe
http://179.43.140.229/VERBORROV.php0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://179.43.140.229/NLIFE.phpfile.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://nuget.org/NuGet.exepowershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://schemas.xmlsoap.org/wsdl/powershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://contoso.com/powershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://nuget.org/nuget.exepowershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://179.43.140.229/VERBORROV.phpfile.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://contoso.com/Licensepowershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://contoso.com/Iconpowershell.exe, 0000000C.00000002.527936465.0000022E2AAAF000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://179.43.140.229/file.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.467293034.0000022E1AA51000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://github.com/Pester/Pesterpowershell.exe, 0000000C.00000002.467293034.0000022E1AC57000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://179.43.140.229/DLEBEBRA2.phpfile.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://179.43.140.229/DLIMSORRY.phpfile.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://179.43.140.229/DLCGHOUL.phpfile.exe, 00000000.00000002.548465068.00000000043FA000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                No contacted IP infos
                Joe Sandbox Version:36.0.0 Rainbow Opal
                Analysis ID:791757
                Start date and time:2023-01-25 21:03:41 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 9m 37s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:file.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:21
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal92.evad.winEXE@4/5@0/0
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 9.7% (good quality ratio 8.6%)
                • Quality average: 68%
                • Quality standard deviation: 26.1%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 80.67.82.235, 80.67.82.211
                • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, login.live.com, eudb.ris.api.iris.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, a1449.dscg2.akamai.net, arc.msn.com
                • Execution Graph export aborted for target file.exe, PID 4648 because it is empty
                • Execution Graph export aborted for target powershell.exe, PID 2828 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtSetInformationFile calls found.
                • VT rate limit hit for: file.exe
                TimeTypeDescription
                21:05:26API Interceptor34x Sleep call for process: powershell.exe modified
                21:07:04Task SchedulerRun new task: TGTMAH path: C:\ProgramData\tgtAudio\TGTMAH.exe
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\file.exe
                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                Category:dropped
                Size (bytes):536543232
                Entropy (8bit):0.062438005632173416
                Encrypted:false
                SSDEEP:
                MD5:59E7A0AB00BB818A31E67508C92F1A95
                SHA1:7F72A9A7915D33287D6654077C977D352C6B6D34
                SHA-256:A428F5260643308A49172D5B7C7348C3D7F52E29A6452AE4FA7202C3B4F801E2
                SHA-512:8E8541454735EE660C39149A197D893783CD4E0D3C7C16DC4B93B4C2B2EF940AE98AE9CED418633E0DC0C9FD2E53300F99AAF2F5EA7C88222D706019E2056310
                Malicious:false
                Reputation:low
                Preview:MZ......?_kJ..5..U.y.A..nS..-.g`......Epi..._:..D....w.8.............!..L.!This program cannot be run in DOS mode....$.......................................................................................................................................PE..d....iA..........."...0.......+......a).. ....@...... ........................:......+,...@...@......@............... .......................`)...... ...%...........................................................................................................data........ ...................... ..`.rsrc....%... ...&..................@..@.rsrc........`)......*..............`...........................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):18817
                Entropy (8bit):5.001217266823362
                Encrypted:false
                SSDEEP:384:ufib4GGVoGIpN6KQkj2Akjh4iUxGzCdaOdB/NXp5CvOjJEYoV4fib41:uIGV3IpNBQkj25h4iUxGzCdaOdB/NZwY
                MD5:DB93B232EFF0785FDDC28A0D5DAE38D2
                SHA1:AF5AFE47557C49F165F66B2B63962D9EB28E3157
                SHA-256:92939214003421B64153B215D15F89595673C709110FC6E005FF955F6684C390
                SHA-512:5D161CFEE2631553AC2FA8EE407FE4CBA23C9A666BB69049C0FCCBEE99413983C678E4779426532FB4F5E622155C9EFF8DA57CD93AE4453D57301B32C19CBAA9
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:PSMODULECACHE......P.e...S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........7r8...C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):64
                Entropy (8bit):0.9260988789684415
                Encrypted:false
                SSDEEP:3:Nlllulb/lj:NllUb/l
                MD5:13AF6BE1CB30E2FB779EA728EE0A6D67
                SHA1:F33581AC2C60B1F02C978D14DC220DCE57CC9562
                SHA-256:168561FB18F8EBA8043FA9FC4B8A95B628F2CF5584E5A3B96C9EBAF6DD740E3F
                SHA-512:1159E1087BC7F7CBB233540B61F1BDECB161FF6C65AD1EFC9911E87B8E4B2E5F8C2AF56D67B33BC1F6836106D3FEA8C750CC24B9F451ACF85661E0715B829413
                Malicious:false
                Reputation:high, very likely benign file
                Preview:@...e................................................@..........
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                File type:PE32+ executable (GUI) x86-64, for MS Windows
                Entropy (8bit):6.050720695954934
                TrID:
                • Win64 Executable GUI (202006/5) 93.52%
                • Win64 Executable (generic) (12005/4) 5.56%
                • DOS Executable Generic (2002/1) 0.93%
                File name:file.exe
                File size:2866176
                MD5:30815e7574409c788e6cfb3247250ee7
                SHA1:940d9d02537afa8a892df4920ffc1f9a79c1895a
                SHA256:89b2997d84ff0789fac1f4b9a2418ce8f74bed901c6eec51560a9f3b5c639e4b
                SHA512:2075b05bdf05c1e33da4c946919b81227f115089b09e4bd88a77b57b9878194b92faec5812e7dc5a4b1bbaa767cab1c02a412adb878a365a366c6ceab5621f55
                SSDEEP:49152:rQZ/9ZcgVR0HptbPPlmaN/eefrGDzQtz:rE1Zc51PFN/daXE
                TLSH:D8D5DF59FE1BD0A3F66E8434C46A85B94E20EC25A6C2522E397CFE3D527434224BD73D
                File Content Preview:MZ.......?_kJ...5..U.y.A..nS..-.g`......Epi..._:..D....w.8..............!..L.!This program cannot be run in DOS mode....$......................................................................................................................................
                Icon Hash:7186869696def800
                Entrypoint:0x6961c0
                Entrypoint Section:.rsrc
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x924169B0 [Fri Oct 4 00:07:12 2047 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:cdd73a766273625b53bd22f0062b1110
                Instruction
                jmp 00007F6B2CAC62FCh
                je 00007F6B2CAC609Ch
                jmp 00007F6B2CAC6063h
                sub eax, 01DAE990h
                add byte ptr [eax], al
                nop
                jmp 00007F6B2CAC6064h
                sal byte ptr [ebp+75F6334Dh], 1
                enter 334Dh, FFh
                jnbe 00007F6B2CAC604Bh
                jmp 00007F6B2CAC6139h
                jmp 00007F6B2CAC6063h
                mov ebp, ecx
                dec ebp
                add al, 00h
                add bl, ch
                add edi, dword ptr [ebx+ebx*4+2B850F56h]
                add eax, dword ptr [eax]
                add cl, ch
                or dword ptr [edx], eax
                add byte ptr [eax], al
                nop
                jmp 00007F6B2CAC6064h
                mov dword ptr [ecx+41h], esp
                shl edx, 10h
                jmp 00007F6B2CAC6065h
                xor dh, byte ptr [ebx-2FF4BA6Ah]
                jc 00007F6B2CAC601Ah
                inc ecx
                mov eax, edx
                jmp 00007F6B2CAC6064h
                dec eax
                jmp 00007F6B3570E3ADh
                jmp 00007F6B2CAC6065h
                sar word ptr [ecx+esi], 0005h
                or al, 04h
                add byte ptr [eax], al
                jc 00007F6B2CAC6054h
                dec eax
                lea edx, dword ptr [0000040Bh]
                jmp 00007F6B2CAC6064h
                and eax, 058B445Ah
                cld
                add eax, dword ptr [eax]
                add bl, ch
                add dword ptr [eax], edx
                dec esp
                lea ecx, dword ptr [000003E2h]
                jmp 00007F6B2CAC6063h
                mov al, byte ptr [03DD0531h]
                add byte ptr [eax], al
                jo 00007F6B2CAC6047h
                xor dword ptr [000003D9h], eax
                jc 00007F6B2CAC6092h
                xor dword ptr [000003C9h], eax
                jno 00007F6B2CAC6065h
                fisttp word ptr [eax+0D8D481Ah]
                rol dword ptr [ebx], 1
                add byte ptr [eax], al
                jmp 00007F6B2CAC6063h
                rcl byte ptr [edi-15h], cl
                add esp, dword ptr [ecx-14A94F35h]
                add esp, dword ptr [edi+4Dh]
                adc dword ptr [ecx+54h], eax
                jmp 00007F6B2CAC6065h
                mov byte ptr [5541F05Eh], al
                jmp 00007F6B2CAC6064h
                and ah, byte ptr [ecx+eax*2+56h]
                jmp 00007F6B2CAC6063h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x2960000x1c0.rsrc
                IMAGE_DIRECTORY_ENTRY_RESOURCE0xe20000x1b259c.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .data0x20000xdef100x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0xe20000x1b259c0x1b2600False0.20000281025179856data4.251156488048282IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x2960000x1092000x109200False0.9997964919259783data7.9997654885259255IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                NameRVASizeTypeLanguageCountry
                RT_CURSOR0xe20c80x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States
                RT_CURSOR0xe22240x134dataEnglishUnited States
                RT_CURSOR0xe23800x134dataEnglishUnited States
                RT_CURSOR0xe24dc0x134dataEnglishUnited States
                RT_CURSOR0xe26380x134dataEnglishUnited States
                RT_CURSOR0xe27940x134dataEnglishUnited States
                RT_CURSOR0xe28f00x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States
                RT_BITMAP0xe2ba00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                RT_BITMAP0xe2da80x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States
                RT_BITMAP0xe2fc80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                RT_BITMAP0xe31d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                RT_BITMAP0xe33dc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                RT_BITMAP0xe35e80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                RT_BITMAP0xe37ec0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                RT_BITMAP0xe39f00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                RT_BITMAP0xe3bfc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                RT_BITMAP0xe3e040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                RT_BITMAP0xe400c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                RT_BITMAP0xe41100xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                RT_BITMAP0xe42380xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                RT_BITMAP0xe43580xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                RT_BITMAP0xe44700xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                RT_BITMAP0xe45640xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                RT_BITMAP0xe46640xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                RT_BITMAP0xe47800xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                RT_BITMAP0xe48800xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                RT_BITMAP0xe49940xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States
                RT_BITMAP0xe4a8c0xc8Device independent bitmap graphic, 13 x 12 x 4, image size 96EnglishUnited States
                RT_BITMAP0xe4b940xc8Device independent bitmap graphic, 13 x 12 x 4, image size 96EnglishUnited States
                RT_BITMAP0xe4c980x4e8Device independent bitmap graphic, 13 x 12 x 8, image size 192EnglishUnited States
                RT_BITMAP0xe51b80xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States
                RT_BITMAP0xe52c80xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States
                RT_BITMAP0xe53d40xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States
                RT_BITMAP0xe54e00xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States
                RT_BITMAP0xe55f00xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States
                RT_BITMAP0xe57000xd0Device independent bitmap graphic, 12 x 13 x 4, image size 104EnglishUnited States
                RT_BITMAP0xe58040x4e8Device independent bitmap graphic, 13 x 12 x 8, image size 192EnglishUnited States
                RT_BITMAP0xe5d280x4e8Device independent bitmap graphic, 13 x 12 x 8, image size 192EnglishUnited States
                RT_BITMAP0xe62480x4e8Device independent bitmap graphic, 13 x 12 x 8, image size 192EnglishUnited States
                RT_BITMAP0xe676c0x188Device independent bitmap graphic, 24 x 24 x 4, image size 288SwedishSweden
                RT_BITMAP0xe69340x17cDevice independent bitmap graphic, 23 x 23 x 4, image size 276, 16 important colorsSwedishSweden
                RT_BITMAP0xe6af40x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsSwedishSweden
                RT_BITMAP0xe6cbc0x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsSwedishSweden
                RT_BITMAP0xe6e840x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsSwedishSweden
                RT_BITMAP0xe70500xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States
                RT_ICON0xe71b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
                RT_ICON0xe76480x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
                RT_ICON0xe7ff80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                RT_ICON0xe90c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
                RT_ICON0xeb6980x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
                RT_ICON0xef8e80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
                RT_ICON0xf4d980x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
                RT_ICON0xfe2680x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
                RT_ICON0x10eab80x53afPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                RT_ICON0x113e900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSwedishSweden
                RT_STRING0x1148600x2c0data
                RT_STRING0x114b480x2f8data
                RT_STRING0x114e680x3c8data
                RT_STRING0x1152580x510data
                RT_STRING0x1157900x370data
                RT_STRING0x115b280x390data
                RT_STRING0x115ee00x404data
                RT_STRING0x11630c0x428data
                RT_STRING0x11675c0x34cdata
                RT_STRING0x116ad00x390data
                RT_STRING0x116e880x288data
                RT_STRING0x1171380x49cdata
                RT_STRING0x1175fc0x3c4data
                RT_STRING0x1179e80x43cdata
                RT_STRING0x117e4c0xd8data
                RT_STRING0x117f4c0xd0data
                RT_STRING0x1180440x120data
                RT_STRING0x11818c0x378data
                RT_STRING0x11852c0x3fcdata
                RT_STRING0x1189500x3bcdata
                RT_STRING0x118d340x46cdata
                RT_STRING0x1191c80x37cdata
                RT_STRING0x11956c0x3a8data
                RT_STRING0x11993c0x398data
                RT_STRING0x119cfc0xccdata
                RT_STRING0x119df00xb0data
                RT_STRING0x119ec80x298data
                RT_STRING0x11a1880x46cdata
                RT_STRING0x11a61c0x35cdata
                RT_STRING0x11a9a00x2c0data
                RT_RCDATA0x11ad080x82e8dataEnglishUnited States
                RT_RCDATA0x1230280x10data
                RT_RCDATA0x1230780xc8bdaDelphi compiled form 'TformAbout'
                RT_RCDATA0x1ebc980x824aDelphi compiled form 'TformHinter'
                RT_RCDATA0x1f3f300x2409Delphi compiled form 'TformHistoryItem'
                RT_RCDATA0x1f637c0x44f26Delphi compiled form 'TformMain'
                RT_RCDATA0x23b2e80x3d046Delphi compiled form 'TformOptions'
                RT_RCDATA0x2783780x73cDelphi compiled form 'TformProgress'
                RT_RCDATA0x278af40x15a0Delphi compiled form 'TformQueue'
                RT_RCDATA0x27a0d40x19580Delphi compiled form 'TformTask'
                RT_RCDATA0x29367c0x132Dyalog APL component file 32-bit non-journaled checksummed version -71.37
                RT_GROUP_CURSOR0x2938200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x29385c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x2938980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x2938d40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x2939100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x29394c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_CURSOR0x2939880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                RT_GROUP_ICON0x293a080x84dataEnglishUnited States
                RT_GROUP_ICON0x293ac80x14dataSwedishSweden
                RT_VERSION0x293b1c0x3d8dataEnglishUnited States
                RT_MANIFEST0x293f340x666XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                DLLImport
                shell32.dllPathMakeUniqueName
                mscoree.dll_CorExeMain
                advapi32.dllRegOpenKeyExW
                user32.dllTranslateMessage
                kernel32.dllGetModuleHandleA
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                SwedishSweden
                No network behavior found
                050100150s020406080100

                Click to jump to process

                050100150s0.0020406080MB

                Click to jump to process

                • File
                • Registry

                Click to dive into process behavior distribution

                Target ID:0
                Start time:21:04:40
                Start date:25/01/2023
                Path:C:\Users\user\Desktop\file.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\user\Desktop\file.exe
                Imagebase:0xb50000
                File size:2866176 bytes
                MD5 hash:30815E7574409C788E6CFB3247250EE7
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Reputation:low

                Target ID:12
                Start time:21:05:22
                Start date:25/01/2023
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
                Imagebase:0x7ff6f4710000
                File size:447488 bytes
                MD5 hash:95000560239032BC68B4C2FDFCDEF913
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Reputation:high
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                Target ID:13
                Start time:21:05:22
                Start date:25/01/2023
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6edaf0000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Executed Functions

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.553918347.00007FFDC88A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC88A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc88a0000_file.jbxd
                Similarity
                • API ID:
                • String ID: >'
                • API String ID: 0-469774255
                • Opcode ID: 6d379387e6699670c29ec0be5e957e448543688a241e275ff01492f49e73d203
                • Instruction ID: 1a7782c3fc80b49334f170b2a67f0eed232d8fda2e15b941015b6a780b26e86e
                • Opcode Fuzzy Hash: 6d379387e6699670c29ec0be5e957e448543688a241e275ff01492f49e73d203
                • Instruction Fuzzy Hash: 7302A631E0C147C6EB25DF68AC529F97790AF14219F34123DD849C6DC2FA2CA16F86E9
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.553863513.00007FFDC8820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8820000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc8820000_file.jbxd
                Similarity
                • API ID:
                • String ID: x\!
                • API String ID: 0-4132185133
                • Opcode ID: dfb1911cab002324935a9d294c519deec42aedab10b506baa510645149895b3b
                • Instruction ID: 34f2b10872b4d6b7ea4e66c9f5b68ba29f8629569c32feb6cfc74fc3ff890b67
                • Opcode Fuzzy Hash: dfb1911cab002324935a9d294c519deec42aedab10b506baa510645149895b3b
                • Instruction Fuzzy Hash: 20916070A184098FD759EF18D8A59BD73E2FF98324B205139D44EC77A5EA34B822CB94
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.553863513.00007FFDC8820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8820000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc8820000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0cd4bc458e24516b1be7d67c2366de5da7bc2cdc7c0998be270512f3561b396f
                • Instruction ID: 0832fc4054c6b4d871f3f43030972e5fd16bf20ad40d5e7424ea7c217f58bb8e
                • Opcode Fuzzy Hash: 0cd4bc458e24516b1be7d67c2366de5da7bc2cdc7c0998be270512f3561b396f
                • Instruction Fuzzy Hash: 4C512531A08411CBD75ADF98ECE196533E2FBA83307544129D906D77BCDAB8F862CB94
                Uniqueness

                Uniqueness Score: -1.00%

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.553863513.00007FFDC8820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8820000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc8820000_file.jbxd
                Similarity
                • API ID:
                • String ID: 8W!$x\!
                • API String ID: 0-559321493
                • Opcode ID: 4e953cbe7a4d48ec511b2218553aecf1e503740474b97ecc6b5ac1e18e43b828
                • Instruction ID: 1d1fa3c448a336c2978671bb20da3b209e97194a6d0fa8f0fdcd1b763917f3cb
                • Opcode Fuzzy Hash: 4e953cbe7a4d48ec511b2218553aecf1e503740474b97ecc6b5ac1e18e43b828
                • Instruction Fuzzy Hash: 81510230F545098FEB99FB68D8A5ABD73D2EF98310F600079D40EC32A2EE2968518B55
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.553863513.00007FFDC8820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8820000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc8820000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b78925b6caf076ffcf260d8b236ee94ecda16218e48152f3548ab0d9300d16fd
                • Instruction ID: e12311a4413d3b58ad88190d000df5db3dc1fcfcc97038b748c836e9b0afa6d6
                • Opcode Fuzzy Hash: b78925b6caf076ffcf260d8b236ee94ecda16218e48152f3548ab0d9300d16fd
                • Instruction Fuzzy Hash: BB516330E186158BE765EF28D8A1AB9B3E1FF99310B5005B9D40DC76A7EE38FC118785
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.553863513.00007FFDC8820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8820000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc8820000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1d9cc6a81eb55b2ad46c99fbd75b036ca28dad6dce6aa19bd7c72b78ac11ab85
                • Instruction ID: ed309e28c1d2c1f46528449c94edc5f17ef3a4ee77b5abb29474b2fa1451e4b3
                • Opcode Fuzzy Hash: 1d9cc6a81eb55b2ad46c99fbd75b036ca28dad6dce6aa19bd7c72b78ac11ab85
                • Instruction Fuzzy Hash: AC419430E186098FDB55EF68D8A1AA9B7E1FF59310B5045BDD00DC7293EE38B801CB85
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.553863513.00007FFDC8820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8820000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc8820000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 857c7fa15803003d07f649e312fdfbe110dc908a7a862b9ea7ab88ca7969f97e
                • Instruction ID: 6a2411a4ccadf557eba1bf6d2657bdf1377b9dc70f55fc6edabdb19515b42335
                • Opcode Fuzzy Hash: 857c7fa15803003d07f649e312fdfbe110dc908a7a862b9ea7ab88ca7969f97e
                • Instruction Fuzzy Hash: 4C012830A0D5188EEA65FF28DC65EBAB3A1EF95310F0000B8E409C36D2DF243D118689
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.553863513.00007FFDC8820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8820000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc8820000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d18e293308484db675b32932af036e336e14b48b02227cd3c12dc20ede9f7769
                • Instruction ID: de12826b64693be0a66586c631833f11312fc03e018dc1ab822663507ec37702
                • Opcode Fuzzy Hash: d18e293308484db675b32932af036e336e14b48b02227cd3c12dc20ede9f7769
                • Instruction Fuzzy Hash: F8F0E771B484158FD399DB2CDC91A6C73F2EB9837075602AAD409D33A4EE24BC218788
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.553863513.00007FFDC8820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8820000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc8820000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ff8902281752e3a4aefe0e1b0e9d7506a141bb164bd072045561977ef41d9931
                • Instruction ID: 464846565c5108804e9b3be49e2184879b0ad00e13a71c98a912ac395ca29111
                • Opcode Fuzzy Hash: ff8902281752e3a4aefe0e1b0e9d7506a141bb164bd072045561977ef41d9931
                • Instruction Fuzzy Hash: ECF0DA20F168194BE795FF2888A9A7C72E2FB9C321B950438D40DD32B6ED28AD618741
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_930000_file.jbxd
                Similarity
                • API ID:
                • String ID: x\;U
                • API String ID: 0-3453668088
                • Opcode ID: 758c05e435222d30ce8c0b27ca2747bbe501d057b2fb12c61b12bd7e332874b6
                • Instruction ID: 24cb3343488f717497a6ca3bdf40962ca10a4207c87198105ba242cb601da261
                • Opcode Fuzzy Hash: 758c05e435222d30ce8c0b27ca2747bbe501d057b2fb12c61b12bd7e332874b6
                • Instruction Fuzzy Hash: 94612A75618B448BE3B8EF3498547DAB7D7FBD8301F11D928D18BC2261EE39C4068B41
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_930000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fd0920a62d9bb6ddd34fa7b7ea630b9cafc29cbe7bde2b4c778f4cf8a36d1b3b
                • Instruction ID: 46dbeea7672ba7998209c8f6cd2c763d6d78206a0ca3aad9e72dcd694bd1ce50
                • Opcode Fuzzy Hash: fd0920a62d9bb6ddd34fa7b7ea630b9cafc29cbe7bde2b4c778f4cf8a36d1b3b
                • Instruction Fuzzy Hash: 85D1DCA3BB868407D70C8C18EC937B2728BE7DA319B2D947DE887C6347E919D917940D
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_930000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 141a1477feff5e56239242162e3aa49995afc8312f91e81ce4b3a5dbcd55f74b
                • Instruction ID: ae3ff07906236670393be1220acbd756506cfafeb00c1ac3abc6354fcb6994b1
                • Opcode Fuzzy Hash: 141a1477feff5e56239242162e3aa49995afc8312f91e81ce4b3a5dbcd55f74b
                • Instruction Fuzzy Hash: 38C119A3BBD68007934C9C29EC936B272CBD7DA71A72D943CE487C6307E919D927944C
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_930000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 25c3e6d9bbb8017e933c64901adcaa2f2acb41f6c79e2277747f8ed9fb9ca861
                • Instruction ID: f6b9e3089ec24152b7a96cfa300007bd93bfc38a3ab53055b801f83f5940b1b6
                • Opcode Fuzzy Hash: 25c3e6d9bbb8017e933c64901adcaa2f2acb41f6c79e2277747f8ed9fb9ca861
                • Instruction Fuzzy Hash: CDB1DAA3BB868407C70C8C18EC936B2718BE7DA21972DD43DE887C734AE96DD917940D
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_930000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c6e1a2cfa8e2c953ded5f742bf941bbb58018144bb2ec0e49ff70612f19dc48c
                • Instruction ID: 12639a6ca271059d1442728df11a8d7bd38ffdc3b389a53230fefd7c68ee4dd9
                • Opcode Fuzzy Hash: c6e1a2cfa8e2c953ded5f742bf941bbb58018144bb2ec0e49ff70612f19dc48c
                • Instruction Fuzzy Hash: E791FBE3BB868007930C9C19DC936B1B1CBE7DA71972D943DE887C6347E929D917940D
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_930000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 15ac2441ff1f0d1eab717772f741f879fd9368bb8c92fe17a389e2cf38590429
                • Instruction ID: e6899041c0f2cf2eea1b9c3d4f7d7c16967b98f242c864d57417b16f0aeeff26
                • Opcode Fuzzy Hash: 15ac2441ff1f0d1eab717772f741f879fd9368bb8c92fe17a389e2cf38590429
                • Instruction Fuzzy Hash: DA51CCA3FB899107D30C8828EC437A231CBD79AA1AF1D947DE8C7C6347E519D913958D
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_930000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c29e963cf7c721cbed2121527bde751939c76b587dd567f854209dfd3fe22f39
                • Instruction ID: 9158e77083b5181f783958a53a29651d204a6b0f8f28d2430d14738f63bfa912
                • Opcode Fuzzy Hash: c29e963cf7c721cbed2121527bde751939c76b587dd567f854209dfd3fe22f39
                • Instruction Fuzzy Hash: 0051F8A3BA864447D30C8D18EC837B17287E7DA32AF1D907DE88BC6347E929D917954C
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.553863513.00007FFDC8820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8820000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffdc8820000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 44bb68be402265ad7a63ee8fb4bc7c1d0c5aaa1917c59c6d96af392476a47923
                • Instruction ID: 86ba173f9d2985ee6fe9c1b7dc05cce0724d2336de89479cc3a71de5dd132b99
                • Opcode Fuzzy Hash: 44bb68be402265ad7a63ee8fb4bc7c1d0c5aaa1917c59c6d96af392476a47923
                • Instruction Fuzzy Hash: 6A71E631614503CFD75ADF18CDE6D2573E2EB5832035881A8CE4AD3674EB36B862CB86
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_930000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 075082595cf6f866156f567d8a670d6f41b5d513beeddd1445c6ec7d064d6d5e
                • Instruction ID: c5bf5dc4d07771f66ee01931fccafb76798942e06d89909c4b163df6a3223638
                • Opcode Fuzzy Hash: 075082595cf6f866156f567d8a670d6f41b5d513beeddd1445c6ec7d064d6d5e
                • Instruction Fuzzy Hash: 85119E327BC4920F930CDE38580543676DBF78930A361D6BEE9A7C7663EA20C4138989
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.544971765.0000000000930000.00000040.00001000.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_930000_file.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c9e442dd7d320df24f0753e2d156b9ccd7b9f7af252cc5fddb9c66419b8669ef
                • Instruction ID: 4e660c51bf4b2b213b5617b5316c232e0031725ddd4951b217319254ee21daf1
                • Opcode Fuzzy Hash: c9e442dd7d320df24f0753e2d156b9ccd7b9f7af252cc5fddb9c66419b8669ef
                • Instruction Fuzzy Hash: 1811A1327785520F930CDE38980643676DBF78530A361D67DD5A7C7A63DA24C5138E89
                Uniqueness

                Uniqueness Score: -1.00%

                Executed Functions

                Strings
                Memory Dump Source
                • Source File: 0000000C.00000002.538303904.00007FFDC87A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc87a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID: H
                • API String ID: 0-2852464175
                • Opcode ID: 1fdd27af9463d45e27da82a01eff5fbc116784f14b8ca6d28cffbfa643505e7d
                • Instruction ID: d6ce2d30c5d7913caae50534b241c04f10180b39393fe55f74fbe47e7389522a
                • Opcode Fuzzy Hash: 1fdd27af9463d45e27da82a01eff5fbc116784f14b8ca6d28cffbfa643505e7d
                • Instruction Fuzzy Hash: 86314F30A089598FDF94EF58C455EE9BBA1FF69300F6411A9D009D7296DB34EC82CBC1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538303904.00007FFDC87A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc87a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 08cca56c49222c316582c4905fda8c6a4d00d977d5bf51b81ad8b0e095bd7678
                • Instruction ID: 45efa770230f307ae6760d8a7989525f5e3f935f1b7df79eebda71332f853e34
                • Opcode Fuzzy Hash: 08cca56c49222c316582c4905fda8c6a4d00d977d5bf51b81ad8b0e095bd7678
                • Instruction Fuzzy Hash: FA31F47191CB488FDB58DF5C9C5A6E97BE0FB69320F00426FE449C3292DA74A855CBC2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538303904.00007FFDC87A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc87a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c28f3aeb5b1f1b33fa7e87a894b2d66b6a53f5253535e3155e8fac825e0959cd
                • Instruction ID: 454871686ec07e9e333e710622ae4c69d7a01a264c70890fb7027d101b6474d3
                • Opcode Fuzzy Hash: c28f3aeb5b1f1b33fa7e87a894b2d66b6a53f5253535e3155e8fac825e0959cd
                • Instruction Fuzzy Hash: 4321F13190CA4C8FDB58DFAC984A7EA7FE0EBA6321F04416FD049C3152D670A41ACB91
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538764114.00007FFDC8870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8870000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc8870000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1bb93d3679e57a449da7f86af7c53f115da2aeb85af88f2b2f4db8feafe65073
                • Instruction ID: 1c9082f8d87b1e07320b8d800802e0ba994b29b81adc68a36c64c99de134c5b7
                • Opcode Fuzzy Hash: 1bb93d3679e57a449da7f86af7c53f115da2aeb85af88f2b2f4db8feafe65073
                • Instruction Fuzzy Hash: 7901C432E1DD454FD369EB0CA421AA967E1FFA5320F1901BAE15EC36A3DD29EC4087D4
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538303904.00007FFDC87A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc87a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a5aa07912a3fbb90e3bd721407658719fd2f0c4915c4efd5993a41b9e5521a04
                • Instruction ID: 921d368fe3ae3622ba9edbc64d763cacfea64c2608014b5da9eab60f06266d89
                • Opcode Fuzzy Hash: a5aa07912a3fbb90e3bd721407658719fd2f0c4915c4efd5993a41b9e5521a04
                • Instruction Fuzzy Hash: 0201217171CA084FD78CEA1CD862AB573E1EB95324B50016ED48AC76A6DE27E8428745
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538303904.00007FFDC87A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc87a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d0cff6f0e817eaf95abd3163f78c11bf9e4f6992de78abb45a49043693fe6870
                • Instruction ID: 1493b54d8ca3e75e0ce1d81e6161aa124cbefa77e2259149329faa16db5d76e0
                • Opcode Fuzzy Hash: d0cff6f0e817eaf95abd3163f78c11bf9e4f6992de78abb45a49043693fe6870
                • Instruction Fuzzy Hash: 1701A77110CB0C4FD744EF0CE451AA6B3E0FB95320F10052DE58AC36A1DA36E881CB46
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538764114.00007FFDC8870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8870000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc8870000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7013a67bd7bab9f43da9b4bb7a46b57c1afa086b9ee22e55ce4f323edeea5a74
                • Instruction ID: d1eaf7dadd933e983108fc7ba9146f66a4e26b03d3ebcc37b0c60608af5aaea4
                • Opcode Fuzzy Hash: 7013a67bd7bab9f43da9b4bb7a46b57c1afa086b9ee22e55ce4f323edeea5a74
                • Instruction Fuzzy Hash: 9C01D432F0C9454FE754EB1CA4559A577E1EF69320B1900BAE05EC35A3DE28AC408794
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538764114.00007FFDC8870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8870000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc8870000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e439e5cfc39afe62d56df4de44c0806e2fb57a06f97ab5ad9b202efb4885054e
                • Instruction ID: 999eb06ba759482cfa4f49eb91df1aea6f50d72fc56ee9c55a6b26924da1d452
                • Opcode Fuzzy Hash: e439e5cfc39afe62d56df4de44c0806e2fb57a06f97ab5ad9b202efb4885054e
                • Instruction Fuzzy Hash: 2D01DF32E0DD890FD769DB1CA460AA877E0EF44720B1900FFE05ED75A3DA15AC008BC4
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538764114.00007FFDC8870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8870000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc8870000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4ad7568c06eab33a44eba834434fcead44aa31b9c71f31f774604c159ed67466
                • Instruction ID: 0d8b07a8e5e0a937c5f9309cc78c0fcf80e22f7798ba1b0a2197eebe89e1cd96
                • Opcode Fuzzy Hash: 4ad7568c06eab33a44eba834434fcead44aa31b9c71f31f774604c159ed67466
                • Instruction Fuzzy Hash: D101F232E0D9854FE765DB1894649B8BBE0EF45720B1900FFE09EC75A3DA25AC409BC4
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538303904.00007FFDC87A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc87a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 81b3a24f8be670409e8b7c34453b9ea7be75dc1207d92423556b9942271d61bc
                • Instruction ID: 4c2d2a4803ff2cc8aaba8ae6164bf844b2ca2d70b4952ad1825016c2e0db74be
                • Opcode Fuzzy Hash: 81b3a24f8be670409e8b7c34453b9ea7be75dc1207d92423556b9942271d61bc
                • Instruction Fuzzy Hash: A6F0B43175CA088FDB4CAA0CE8529B473E1EB99321B10013EE48BC2296ED36F843C785
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538764114.00007FFDC8870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8870000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc8870000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 58757d1441dd2d54dd0e1ac710b542486daf05edb73f57821039afc06141589b
                • Instruction ID: 90a03fc70fd052296d3ed8598a6920057d7bd0cc96f0b018f7bb9f6a265ceb6a
                • Opcode Fuzzy Hash: 58757d1441dd2d54dd0e1ac710b542486daf05edb73f57821039afc06141589b
                • Instruction Fuzzy Hash: 92017D31B0DA884FE755DB5C64505F87BE1EF9C320B1401FFE04DD7193D928A8018785
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538303904.00007FFDC87A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc87a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 634ebe3e04edca4877147338ccf19171570b49c5100e126b3b2e3a14f2fe293d
                • Instruction ID: d52f4bcb12f7426b8a8e2080876f866d6f7c0e8f04cb8fa9cf50f95aede92502
                • Opcode Fuzzy Hash: 634ebe3e04edca4877147338ccf19171570b49c5100e126b3b2e3a14f2fe293d
                • Instruction Fuzzy Hash: 41F024308486894FDB46DF2888658D57FA0EF26210F1402ABE45CC71A2DB64E859CBC2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538303904.00007FFDC87A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC87A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc87a0000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 58d8f0e56d680479b5598b8b189ccba9057a36105b83238f3cf44abdd9dfb922
                • Instruction ID: 9974c4d9f7fdd7d9d88c724660f8ba5c6c9825e6d09e4f53b0711589c1d519b7
                • Opcode Fuzzy Hash: 58d8f0e56d680479b5598b8b189ccba9057a36105b83238f3cf44abdd9dfb922
                • Instruction Fuzzy Hash: CAF0373275C6054FDB5CAA1CF8839B4B3D1D795320750056EE487C2556DD27F8878685
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000C.00000002.538764114.00007FFDC8870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFDC8870000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_7ffdc8870000_powershell.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 00b5daed5a73b6af024c8a4f14d681511365f90ef89d426822fc7337aa4c5713
                • Instruction ID: 2f0fe870183584a3b947485687dc94441a6b060a5af123c92c348e80b71554a5
                • Opcode Fuzzy Hash: 00b5daed5a73b6af024c8a4f14d681511365f90ef89d426822fc7337aa4c5713
                • Instruction Fuzzy Hash: 28F0F032E0DA488FEB55EB6C68555F8BBA0EF59321F0400BFE04DD3293ED2968418756
                Uniqueness

                Uniqueness Score: -1.00%