Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1499933
MD5:33b62d366ac20de98dedfaf74b4afefc
SHA1:a43dbbcf422f038f2601c21112af93eb8f4514e0
SHA256:b61490f4f0edf574703224d38c5c00b867b6191bbf09b10bf1a81b7cd8a1e9b6
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to query CPU information (cpuid)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Program does not show much activity (idle)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 6136 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 33B62D366AC20DE98DEDFAF74B4AFEFC)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
file.exeINDICATOR_EXE_Packed_EnigmaDetects executables packed with EnigmaditekSHen
  • 0x3b8:$s2: .enigma1
  • 0x3e0:$s3: .enigma2
SourceRuleDescriptionAuthorStrings
00000000.00000000.2045918617.0000000140000000.00000002.00000001.01000000.00000003.sdmpINDICATOR_EXE_Packed_EnigmaDetects executables packed with EnigmaditekSHen
  • 0x3b8:$s2: .enigma1
  • 0x3e0:$s3: .enigma2
00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpINDICATOR_EXE_Packed_EnigmaDetects executables packed with EnigmaditekSHen
  • 0x3b8:$s2: .enigma1
  • 0x3e0:$s3: .enigma2
SourceRuleDescriptionAuthorStrings
0.2.file.exe.140000000.0.raw.unpackINDICATOR_EXE_Packed_EnigmaDetects executables packed with EnigmaditekSHen
  • 0x3b8:$s2: .enigma1
  • 0x3e0:$s3: .enigma2
0.0.file.exe.140000000.0.raw.unpackINDICATOR_EXE_Packed_EnigmaDetects executables packed with EnigmaditekSHen
  • 0x3b8:$s2: .enigma1
  • 0x3e0:$s3: .enigma2
0.0.file.exe.140000000.0.unpackINDICATOR_EXE_Packed_EnigmaDetects executables packed with EnigmaditekSHen
  • 0x3b8:$s2: .enigma1
  • 0x3e0:$s3: .enigma2
0.2.file.exe.140000000.0.unpackINDICATOR_EXE_Packed_EnigmaDetects executables packed with EnigmaditekSHen
  • 0x3b8:$s2: .enigma1
  • 0x3e0:$s3: .enigma2
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: file.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then push rbp0_2_000000014001E0F0
Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then lea rcx, qword ptr [0000000140021051h]0_2_0000000140011F60
Source: file.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: file.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: file.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: file.exeString found in binary or memory: http://ocsp.digicert.com0
Source: file.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: file.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: file.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: file.exeString found in binary or memory: http://ocsp.entrust.net02
Source: file.exeString found in binary or memory: http://ocsp.entrust.net03
Source: file.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: file.exeString found in binary or memory: http://www.entrust.net/rpa03
Source: file.exe, 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://gcc.gnu.org/bugs/):
Source: file.exeString found in binary or memory: https://www.entrust.net/rpa0

System Summary

barindex
Source: file.exe, type: SAMPLEMatched rule: Detects executables packed with Enigma Author: ditekSHen
Source: 0.2.file.exe.140000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Enigma Author: ditekSHen
Source: 0.0.file.exe.140000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Enigma Author: ditekSHen
Source: 0.0.file.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Enigma Author: ditekSHen
Source: 0.2.file.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with Enigma Author: ditekSHen
Source: 00000000.00000000.2045918617.0000000140000000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables packed with Enigma Author: ditekSHen
Source: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables packed with Enigma Author: ditekSHen
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001400129260_2_0000000140012926
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001400060F80_2_00000001400060F8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001400121550_2_0000000140012155
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014001E3AF0_2_000000014001E3AF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001400093C00_2_00000001400093C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001400044D80_2_00000001400044D8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00000001400057970_2_0000000140005797
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000140014EB00_2_0000000140014EB0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000140003ED00_2_0000000140003ED0
Source: file.exe, type: SAMPLEMatched rule: INDICATOR_EXE_Packed_Enigma snort2_sid = 930052-930054, author = ditekSHen, description = Detects executables packed with Enigma, snort3_sid = 930018
Source: 0.2.file.exe.140000000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Enigma snort2_sid = 930052-930054, author = ditekSHen, description = Detects executables packed with Enigma, snort3_sid = 930018
Source: 0.0.file.exe.140000000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Enigma snort2_sid = 930052-930054, author = ditekSHen, description = Detects executables packed with Enigma, snort3_sid = 930018
Source: 0.0.file.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Enigma snort2_sid = 930052-930054, author = ditekSHen, description = Detects executables packed with Enigma, snort3_sid = 930018
Source: 0.2.file.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_Enigma snort2_sid = 930052-930054, author = ditekSHen, description = Detects executables packed with Enigma, snort3_sid = 930018
Source: 00000000.00000000.2045918617.0000000140000000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_EXE_Packed_Enigma snort2_sid = 930052-930054, author = ditekSHen, description = Detects executables packed with Enigma, snort3_sid = 930018
Source: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_EXE_Packed_Enigma snort2_sid = 930052-930054, author = ditekSHen, description = Detects executables packed with Enigma, snort3_sid = 930018
Source: classification engineClassification label: mal64.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\cdf89ae526ad4cbd86c91c09eed01dbb
Source: C:\Users\user\Desktop\file.exeFile created: c:\Users\user\AppData\Local\Temp\setupF0B.tmpJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: file.exeStatic file information: File size 5800616 > 1048576
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014000D0C5 push rdi; ret 0_2_000000014000D0C6

Malware Analysis System Evasion

barindex
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXEZ
Source: file.exe, 00000000.00000002.2048179294.0000000000826000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE[,
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXEZ
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE{
Source: file.exe, 00000000.00000002.2048179294.0000000000826000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XENSERVICE.EXEW,
Source: file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmp, file.exe, 00000000.00000002.2048179294.0000000000826000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XENSERVICE.EXE
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
Source: file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmp, file.exe, 00000000.00000002.2048179294.0000000000826000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\file.exeAPI coverage: 0.5 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: vboxtray.exe
Source: file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: qemu-ga`Y
Source: file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: vboxtray.exe`
Source: file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: vmwareuser.exe
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: qemu-ga
Source: file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: vmwaretray.exe
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareuser.exeZ
Source: file.exe, file.exe, 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: QEMU HARDDISK
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qemu-gaz
Source: file.exe, 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Stop reversing the programReconsider your life choicesAnd go touch some grassbasic_string::append\\.\PhysicalDrive0DADY HARDDISKQEMU HARDDISKbasic_string: construction from null is not valid
Source: file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: vboxservice.exe@
Source: file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: vboxservice.exe
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exe{
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwaretray.exe{
Source: file.exe, 00000000.00000002.2048108838.00000000001A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxtray.exe{
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000000140033E66 RtlAddVectoredExceptionHandler,0_2_0000000140033E66

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x14009F39DJump to behavior
Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1400E8171Jump to behavior
Source: C:\Users\user\Desktop\file.exeNtOpenSection: Indirect: 0x1401CB085Jump to behavior
Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x140057AC0Jump to behavior
Source: C:\Users\user\Desktop\file.exeNtQueryAttributesFile: Indirect: 0x1401CB96FJump to behavior
Source: C:\Users\user\Desktop\file.exeNtTerminateProcess: Indirect: 0x1401CACCCJump to behavior
Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x14005CC8AJump to behavior
Source: C:\Users\user\Desktop\file.exeNtClose: Indirect: 0x1401CB606
Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x140069067Jump to behavior
Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1400E385BJump to behavior
Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1400DCB84Jump to behavior
Source: C:\Users\user\Desktop\file.exeNtOpenKey: Indirect: 0x1401CA475Jump to behavior
Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1400E7F74Jump to behavior
Source: C:\Users\user\Desktop\file.exeNtUnmapViewOfSection: Indirect: 0x1401CB3DFJump to behavior
Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Indirect: 0x1401CCBD7Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000000014001B3C0 cpuid 0_2_000000014001B3C0
Source: file.exe, 00000000.00000002.2048165022.00000000007F8000.00000004.00000010.00020000.00000000.sdmp, file.exe, 00000000.00000002.2048179294.0000000000826000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wireshark.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
1
Abuse Elevation Control Mechanism
OS Credential Dumping111
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe11%ReversingLabs
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://aia.entrust.net/ts1-chain256.cer010%URL Reputationsafe
http://crl.entrust.net/ts1ca.crl00%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://ocsp.entrust.net020%URL Reputationsafe
http://www.entrust.net/rpa030%URL Reputationsafe
http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
https://www.entrust.net/rpa00%URL Reputationsafe
https://gcc.gnu.org/bugs/):0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://aia.entrust.net/ts1-chain256.cer01file.exefalse
  • URL Reputation: safe
unknown
https://gcc.gnu.org/bugs/):file.exe, 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.entrust.net/ts1ca.crl0file.exefalse
  • URL Reputation: safe
unknown
http://ocsp.entrust.net03file.exefalse
  • URL Reputation: safe
unknown
http://ocsp.entrust.net02file.exefalse
  • URL Reputation: safe
unknown
http://www.entrust.net/rpa03file.exefalse
  • URL Reputation: safe
unknown
http://crl.entrust.net/2048ca.crl0file.exefalse
  • URL Reputation: safe
unknown
https://www.entrust.net/rpa0file.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1499933
Start date and time:2024-08-27 18:18:02 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal64.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • VT rate limit hit for: file.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):7.382943668424814
TrID:
  • Win32 EXE PECompact compressed (generic) (41571/9) 72.19%
  • Win64 Executable (generic) (12005/4) 20.85%
  • Generic Win/DOS Executable (2004/3) 3.48%
  • DOS Executable Generic (2002/1) 3.48%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:file.exe
File size:5'800'616 bytes
MD5:33b62d366ac20de98dedfaf74b4afefc
SHA1:a43dbbcf422f038f2601c21112af93eb8f4514e0
SHA256:b61490f4f0edf574703224d38c5c00b867b6191bbf09b10bf1a81b7cd8a1e9b6
SHA512:69ac8a9b51875f9e7b30fbca176a7c6a19fd829c441dfd7db60b32c86c694f72bfcc5ff5e6334af00da3e5fc6bca65caa77baa3043d1bb18f90453abb3cc8589
SSDEEP:98304:xFPYl0IMRuOeKBSOLLylOKg9YUfPRJhKHT4kuK7M50YfTVF47M22D3y8reeJ:zPYFM9QO3ylauyRLKHo5FF47/siQLJ
TLSH:9446126BB223C1E8E0C5C6748853E6F16A703E609CB10387E2D67F2F7E72A407D5955A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................*.............^.........@.............................p$......{....`...@...... ........ ...... .....
Icon Hash:7d5f56d456574db5
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:12:18:53
Start date:27/08/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x140000000
File size:5'800'616 bytes
MD5 hash:33B62D366AC20DE98DEDFAF74B4AFEFC
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Yara matches:
  • Rule: INDICATOR_EXE_Packed_Enigma, Description: Detects executables packed with Enigma, Source: 00000000.00000000.2045918617.0000000140000000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
  • Rule: INDICATOR_EXE_Packed_Enigma, Description: Detects executables packed with Enigma, Source: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:0.5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:42
    Total number of Limit Nodes:3
    execution_graph 18993 140013f43 18995 140013f18 18993->18995 18994 14001434f 18995->18994 18996 14001e8b1 CloseHandle 18995->18996 18997 140011bc0 18995->18997 18997->18996 18998 140014946 18999 140014046 18998->18999 19000 140014150 18999->19000 19003 140014114 _strcmpi 18999->19003 19004 1400140c8 CloseHandle 18999->19004 19006 140014137 _strcmpi 18999->19006 19007 14000b430 18999->19007 19014 14000b428 18999->19014 19021 14000b420 18999->19021 19003->18999 19004->18999 19006->18999 19008 14000b436 19007->19008 19009 14000b485 19008->19009 19010 14000b479 RtlLeaveCriticalSection 19008->19010 19011 14000b48c RtlLeaveCriticalSection 19009->19011 19013 14000b4ac RtlLeaveCriticalSection 19009->19013 19012 14000b4bb 19010->19012 19011->19012 19012->18999 19013->19012 19015 14000b42d 19014->19015 19016 14000b485 19015->19016 19017 14000b479 RtlLeaveCriticalSection 19015->19017 19018 14000b48c RtlLeaveCriticalSection 19016->19018 19020 14000b4ac RtlLeaveCriticalSection 19016->19020 19019 14000b4bb 19017->19019 19018->19019 19019->18999 19020->19019 19022 14000b426 19021->19022 19023 14000b485 19022->19023 19024 14000b479 RtlLeaveCriticalSection 19022->19024 19025 14000b48c RtlLeaveCriticalSection 19023->19025 19027 14000b4ac RtlLeaveCriticalSection 19023->19027 19026 14000b4bb 19024->19026 19025->19026 19026->18999 19027->19026 19028 14000d90a 19029 14000d92c 19028->19029 19030 14000d928 19028->19030 19030->19029 19032 14000caad 19030->19032 19033 14000cac0 19032->19033 19035 14000cafe 19032->19035 19033->19035 19036 14000c69a 19033->19036 19035->19029 19037 14000c6b0 19036->19037 19039 14000c6bf 19036->19039 19038 14000c6b9 CloseHandle 19037->19038 19037->19039 19038->19039 19039->19035
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID: basic_string: construction from null is not valid$basic_string::append
    • API String ID: 0-51681568
    • Opcode ID: e4397c3b6930b9924a5520cd45c54d3b21da921f88cc91742dd085a02837edf2
    • Instruction ID: 254df3b70ba898f083872f8466a09d87fb694a5722068a86d3c32430f7a801bc
    • Opcode Fuzzy Hash: e4397c3b6930b9924a5520cd45c54d3b21da921f88cc91742dd085a02837edf2
    • Instruction Fuzzy Hash: 6AC2D1722097C08AEB62CF26E4547DDB7E0E349BC4F888015E78D4B7A6EB7AC951C741

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID: _strcmpi
    • String ID:
    • API String ID: 1439213657-0
    • Opcode ID: 6478c6d4964f65beee1e93171977d872161366a92a42a62ad78371c14a2ea2a6
    • Instruction ID: 4ca867d2de024fb3fb3777c957baba19e9a58bec0276be627981bb033fc27fea
    • Opcode Fuzzy Hash: 6478c6d4964f65beee1e93171977d872161366a92a42a62ad78371c14a2ea2a6
    • Instruction Fuzzy Hash: 96417172204A4181EB16DF27E4403EAA3A5E78DBD4F588122FB594B7F9DB7AC945C340

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 574 14001b3c0-14001b3ed call 14001d980 577 14001b3f3-14001b404 call 14001d980 574->577 578 14001b52a 574->578 582 14001b495-14001b49b 577->582 583 14001b40a-14001b41b call 14001d980 577->583 580 14001b531-14001b53b 578->580 584 14001b4a3-14001b4a9 582->584 589 14001b421-14001b432 call 14001d980 583->589 590 14001b4ed-14001b4f3 583->590 587 14001b4e7-14001b4eb 584->587 588 14001b4ab-14001b4b1 584->588 587->590 593 14001b519-14001b520 587->593 591 14001b4b3-14001b4b9 588->591 592 14001b4bb-14001b4c8 588->592 589->590 603 14001b438-14001b449 call 14001d980 589->603 590->593 594 14001b4f5-14001b4fb 590->594 591->587 591->592 592->587 597 14001b4ca-14001b4dc 592->597 595 14001b525 call 14001f080 593->595 598 14001b505-14001b517 594->598 599 14001b4fd-14001b503 594->599 595->578 597->580 602 14001b4de-14001b4e5 597->602 598->580 598->593 599->593 599->598 602->580 606 14001b44b-14001b462 call 14001d980 603->606 607 14001b49d 603->607 606->584 610 14001b464-14001b47e call 14001d980 606->610 607->584 610->580 613 14001b484-14001b490 610->613 613->595
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID: Auth$Auth$Genu$Genu$default$hardware$rand_s$random_device::random_device(const std::string&): device not available$random_device::random_device(const std::string&): unsupported token$rdrand$rdrnd$rdseed
    • API String ID: 0-628424350
    • Opcode ID: 378cee84ca307b585455462128cdee60f6ef4b4836a56a113ea2b17bd2257447
    • Instruction ID: 20cffc7a84d52f92458b65fbe9fe785914383ff4bccac81b965c2f6d4dcca8f3
    • Opcode Fuzzy Hash: 378cee84ca307b585455462128cdee60f6ef4b4836a56a113ea2b17bd2257447
    • Instruction Fuzzy Hash: 54313270341B0191FF669B17B8503E42361A70E7D4F989126FB4A4F2B2EB7FC90A8301

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 629 14001e3af-14001e3f3 call 140011df0 call 140011940 call 14000788f * 2 638 14001e3f5-14001e41a call 14001e140 629->638 639 14001e41f-14001e423 629->639 638->639 641 14001e425-14001e431 639->641 642 14001e459-14001e488 call 14000788f * 2 639->642 643 14001e438-14001e453 641->643 649 14001e48a-14001e4a9 call 14001e140 642->649 650 14001e4ae-14001e4b2 642->650 643->643 645 14001e455 643->645 645->642 649->650 652 14001e4b4-14001e4be 650->652 653 14001e4de-14001e535 call 14003b714 call 14000788f * 2 650->653 654 14001e4c0-14001e4d8 652->654 663 14001e537-14001e558 call 14001e140 653->663 664 14001e55d-14001e561 653->664 654->654 656 14001e4da 654->656 656->653 663->664 666 14001e592-14001e5c2 call 14000788f * 2 664->666 667 14001e563-14001e56f 664->667 674 14001e5c4-14001e5e4 call 14001e140 666->674 675 14001e5e9-14001e5ed 666->675 669 14001e570-14001e58c 667->669 669->669 670 14001e58e 669->670 670->666 674->675 677 14001e61e-14001e67a Sleep call 14000788f * 2 675->677 678 14001e5ef-14001e5fb 675->678 686 14001e6a2-14001e6a6 677->686 687 14001e67c-14001e69d call 14001e140 677->687 679 14001e600-14001e618 678->679 679->679 680 14001e61a 679->680 680->677 689 14001e6a8-14001e6b4 686->689 690 14001e6da-14001e70a call 14000788f * 2 686->690 687->686 691 14001e6b8-14001e6d4 689->691 697 14001e731-14001e735 690->697 698 14001e70c-14001e72c call 14001e140 690->698 691->691 693 14001e6d6 691->693 693->690 699 14001e766-14001e7a5 call 14000788f * 2 697->699 700 14001e737-14001e743 697->700 698->697 709 14001e7a7-14001e7c9 call 14001e140 699->709 710 14001e7ce-14001e7d2 699->710 702 14001e748-14001e760 700->702 702->702 703 14001e762 702->703 703->699 709->710 712 14001e7d4-14001e7de 710->712 713 14001e7ff-14001e82f call 14000788f * 2 710->713 715 14001e7e0-14001e7f9 712->715 720 14001e831-14001e851 call 14001e140 713->720 721 14001e856-14001e85a 713->721 715->715 716 14001e7fb 715->716 716->713 720->721 723 14001e85c-14001e868 721->723 724 14001e88e-14001e8c6 call 140011f60 CloseHandle 721->724 725 14001e870-14001e888 723->725 725->725 726 14001e88a 725->726 726->724
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID: CloseHandleSleep
    • String ID: o$y
    • API String ID: 252777609-1694203185
    • Opcode ID: 3320c1d535d724476daa3b3bcf43f64028623f8b8fc58884ed297bc8bf7b71ab
    • Instruction ID: d310d2be97648e253c560a797166a4409d0e810537ff2c8b596c9c53910e904a
    • Opcode Fuzzy Hash: 3320c1d535d724476daa3b3bcf43f64028623f8b8fc58884ed297bc8bf7b71ab
    • Instruction Fuzzy Hash: 91E182726183C09AFB52DB26E4497DE7A90E36A7C4F888015FB894B7E6DF79C044C712
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID: Infinity$NaN
    • API String ID: 0-4285296124
    • Opcode ID: 03e5a306dddbeeeb1b7bcd6f1d7722179100b0d12a4c9f3057c591ce0f2f7c41
    • Instruction ID: e513643950d2d026adf010862d37e6e891c38bdac2f3d449936eba6982a00318
    • Opcode Fuzzy Hash: 03e5a306dddbeeeb1b7bcd6f1d7722179100b0d12a4c9f3057c591ce0f2f7c41
    • Instruction Fuzzy Hash: DB92C5B26186808AE767CB2BB40139AB7E1F78A7D4F144125FB4A57BA5DB3DC841CB00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID: std$string literal
    • API String ID: 0-2980153874
    • Opcode ID: 31c2c33bcbc9904f5e1b76260ef1922e30ade7e0b3302ada7f4c53eb79f8a994
    • Instruction ID: 08d0ecd75d8b0914846c9277b0880bf37aac30427774259e1c6162ff30fce452
    • Opcode Fuzzy Hash: 31c2c33bcbc9904f5e1b76260ef1922e30ade7e0b3302ada7f4c53eb79f8a994
    • Instruction Fuzzy Hash: 7F81AFF2605B4045FB67DE27B8403E926D1978EBC4F588124FB49477F7EA39C9428389
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID: basic_string: construction from null is not valid$basic_string::append
    • API String ID: 0-51681568
    • Opcode ID: 49ac6315421166d47662eb3a7f04084b530b6b7f3da16f1d1fd4607c7fb4abc2
    • Instruction ID: 4f9f3d44f4deaeaf4c17c83abacd67b6479df0dd49da93552e9acd6a68009cf1
    • Opcode Fuzzy Hash: 49ac6315421166d47662eb3a7f04084b530b6b7f3da16f1d1fd4607c7fb4abc2
    • Instruction Fuzzy Hash: 5A51AF72608AC095EB56DB26E4547DAA7A1F789BC0F548215FF9E0B7EADF39C401CB00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID: _GLOBAL_
    • API String ID: 0-770460502
    • Opcode ID: 956936422d1c7ad05473a44bb1e3bd3ce99177f4b2204914644c9e1fb0a27753
    • Instruction ID: bb8f763f05350120496706be19415098aab6dc47a3ed471cac6e69943cdbb561
    • Opcode Fuzzy Hash: 956936422d1c7ad05473a44bb1e3bd3ce99177f4b2204914644c9e1fb0a27753
    • Instruction Fuzzy Hash: 84C1D3B2A04BC09EFB26CF76A9403DD37A6F3497C8F444125EF4917BAADB3486568740
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 53f4d3e3b6ea6ce0071589385bd2e5569065b7d288e5103ce0ef4d98c09b1191
    • Instruction ID: f25d7bb0f82ece662791ba465fc948e5123c80d4cb0382487ea2e497f8d70737
    • Opcode Fuzzy Hash: 53f4d3e3b6ea6ce0071589385bd2e5569065b7d288e5103ce0ef4d98c09b1191
    • Instruction Fuzzy Hash: 8FF1A3F160574485FB67FA63B4513EB2786979FBD2F948022BF49177E2DA38CA418340
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a8559d96e6e51d5c5e6f0218a75207b2d72db76442868babdd1ae3134e8af195
    • Instruction ID: 1d4386e255450bb2d681d213033d2d38db775dc34ef659bafe9b2e3d91d34419
    • Opcode Fuzzy Hash: a8559d96e6e51d5c5e6f0218a75207b2d72db76442868babdd1ae3134e8af195
    • Instruction Fuzzy Hash: 8AD1A3F270568541FBBBCE57B4813E92692979DBC1F988025BF4A077E7DA38C9818348
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 238b30aeb8dff5df4948e7232ea771a0018db09d69e6177ea1e0048423bdd0fa
    • Instruction ID: 9fff2e492fb6c8d5dc76a4d4fea15418ea31cc5ab0de00591d8a9dafc44b8327
    • Opcode Fuzzy Hash: 238b30aeb8dff5df4948e7232ea771a0018db09d69e6177ea1e0048423bdd0fa
    • Instruction Fuzzy Hash: 83C1E4733096C086EB62CB2AD04479DB7A1F788BC4F98C111E7994BBE5DB7AD4A5C700
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7457f964c1bf35bb69f5a67ed7b190f2082122272bf7d94a387fe0eeab0b8647
    • Instruction ID: 54c048d2a0c80fbad6ca4988327f6b1c736812512ec099045581b86f7f3f2335
    • Opcode Fuzzy Hash: 7457f964c1bf35bb69f5a67ed7b190f2082122272bf7d94a387fe0eeab0b8647
    • Instruction Fuzzy Hash: 61B17A72609B8081EA63AA56A0403DFA7A0F78E7C5F544016FF8D4F7BADE3AC544CB41
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 400998c6cad9ba0cf9736015e9ec36b1a64c81ea0d99b33b7df95269d22d9b36
    • Instruction ID: 8d1810299d0ac68bfd96aef7d18b53adc8dfcfb2745184dff88143f9f623d615
    • Opcode Fuzzy Hash: 400998c6cad9ba0cf9736015e9ec36b1a64c81ea0d99b33b7df95269d22d9b36
    • Instruction Fuzzy Hash: B5118EB161164591FA0AAF23E8517ED3362AB4DBD4F489522FF0A0B3F6DE39C942C310
    Memory Dump Source
    • Source File: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bd2dc2b0528ab3557eaf43f494facf060ef3949a0ee955ff0fd83f2cf80ef001
    • Instruction ID: b74631f765c6c4a1fd351000ada47d106d7ecdd5e0833f1b077419b8a9176487
    • Opcode Fuzzy Hash: bd2dc2b0528ab3557eaf43f494facf060ef3949a0ee955ff0fd83f2cf80ef001
    • Instruction Fuzzy Hash: DFB01233458C80E8CE4177429501FDD9710E3C5355F0D10117F8101666DE28D080CF00

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID: CloseHandle$CriticalLeaveSection
    • String ID:
    • API String ID: 303558334-0
    • Opcode ID: eea3d59772bed76da71c05364581cc4fac1333735410b9f329a274ce7f705582
    • Instruction ID: db9bc3ea2b401fe40534188740626adc7fc6ea51467dbe620a38848154d48bcc
    • Opcode Fuzzy Hash: eea3d59772bed76da71c05364581cc4fac1333735410b9f329a274ce7f705582
    • Instruction Fuzzy Hash: 3311C67230124546FA57EB37FD107E962545B59BE5F444532BF2A473F1DE38D9818300

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 730 14000e985-14000e993 731 14000e9a3-14000e9a6 730->731 732 14000e995-14000e9a1 _errno 730->732 734 14000e9f5-14000e9f7 731->734 735 14000e9a8-14000e9b3 call 14003498a 731->735 733 14000e9ea-14000e9ed 732->733 737 14000ea07-14000ea0f 733->737 734->737 738 14000e9f9-14000ea05 _errno 734->738 735->734 740 14000e9b5-14000e9cb call 14003f181 735->740 738->733 743 14000e9cd-14000e9db call 140038e41 740->743 744 14000e9ef CloseHandle 740->744 747 14000e9e2-14000e9e8 _errno 743->747 748 14000e9dd 743->748 744->734 747->733 748->747
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID: _errno$CloseHandle
    • String ID:
    • API String ID: 3673919685-0
    • Opcode ID: 48675a428d42c76c5d2ad6c88e1a52fb363fd78da7381e50e0cf55f31e60c89e
    • Instruction ID: 729afc2214a926c83ba5e71aeb976cb94d543333c3efe42ea47694f92644d168
    • Opcode Fuzzy Hash: 48675a428d42c76c5d2ad6c88e1a52fb363fd78da7381e50e0cf55f31e60c89e
    • Instruction Fuzzy Hash: EF0162B170538146FBA7AB93B8953E92250AB5EBD0F154125FF05273F1DD7D1C854311

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 749 14001b2e0-14001b582 751 14001b592-14001b59e 749->751 752 14001b584-14001b58e 749->752 753 14001b5a3-14001b5b3 call 14000b418 751->753 752->751 756 14001b5b5-14001b5bd 753->756 757 14001b5cc-14001b5ce 753->757 756->753 758 14001b5bf-14001b5cb 756->758 759 14001b5e0-14001b5e5 _errno 757->759 760 14001b5d0-14001b5db _errno call 14001f080 757->760 759->753 762 14001b5e7 759->762 760->759 762->760
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2048346570.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.2048334115.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048365992.0000000140020000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048379014.0000000140021000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048394087.000000014002D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048407718.0000000140031000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048429583.0000000140054000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048478721.00000001400FE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048525659.0000000140194000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048563792.0000000140205000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048578943.000000014020C000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048597675.0000000140230000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048611566.0000000140234000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.0000000140235000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2048624572.000000014023A000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_file.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID: random_device could not be read
    • API String ID: 0-883157155
    • Opcode ID: 88df9a31d7d7e8bfc55b3df461b1b2ebd8e5fa8ac799ae49b87bd055495dff3b
    • Instruction ID: 6202fbb7eab86ef41cfe1eb285f4146c467e34ba76d7e951f446d23e05e54ad0
    • Opcode Fuzzy Hash: 88df9a31d7d7e8bfc55b3df461b1b2ebd8e5fa8ac799ae49b87bd055495dff3b
    • Instruction Fuzzy Hash: 5B018F7670590489EA139B2BE5013E86392974CBD8F4C4121EF0C4B3B1EA36C886C710