Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GesApIoVpU.exe

Overview

General Information

Sample name:GesApIoVpU.exe
renamed because original name is a hash value
Original sample name:ff21ad97101c63845d80c0df6808575d05095fa902821dc4fa52e462ef338140.exe
Analysis ID:1501752
MD5:c8f9956ef78e7878d289a8b9197eefdb
SHA1:c315cd7143c01adb167f81d2e2d5df98e872ed2c
SHA256:ff21ad97101c63845d80c0df6808575d05095fa902821dc4fa52e462ef338140
Tags:120-46-149-112exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • GesApIoVpU.exe (PID: 7356 cmdline: "C:\Users\user\Desktop\GesApIoVpU.exe" MD5: C8F9956EF78E7878D289A8B9197EEFDB)
    • WerFault.exe (PID: 7496 cmdline: C:\Windows\system32\WerFault.exe -u -p 7356 -s 1072 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\GesApIoVpU.exe, Initiated: true, ProcessId: 7356, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49732
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: GesApIoVpU.exeAvira: detected
Source: GesApIoVpU.exeReversingLabs: Detection: 39%
Source: GesApIoVpU.exeVirustotal: Detection: 14%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: GesApIoVpU.exeJoe Sandbox ML: detected
Source: GesApIoVpU.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\RefleXXion\x64\Release\RefleXXion-EXE.pdb source: GesApIoVpU.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 8888
Source: global trafficTCP traffic: 192.168.2.4:49732 -> 120.46.149.112:8888
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\GesApIoVpU.exeCode function: 0_2_00007FF6D25A1740 malloc,InternetOpenW,InternetOpenUrlA,InternetReadFile,HeapCreate,RtlAllocateHeap,memcpy,0_2_00007FF6D25A1740
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/uG
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28EFC000.00000004.00000020.00020000.00000000.sdmp, GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F70000.00000004.00000020.00020000.00000000.sdmp, GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F97000.00000004.00000020.00020000.00000000.sdmp, GesApIoVpU.exe, 00000000.00000002.2066554017.0000002EEB17A000.00000004.00000010.00020000.00000000.sdmp, GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: GesApIoVpU.exe, 00000000.00000002.2066554017.0000002EEB17A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyB
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyc
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeys
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyv
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyvF
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\GesApIoVpU.exeCode function: 0_2_00007FF6D25A13B0 printf,GetModuleHandleA,GetLastError,printf,GetProcAddress,printf,printf,CloseHandle,printf,K32GetModuleInformation,GetLastError,printf,printf,printf,printf,printf,NtProtectVirtualMemory,printf,NtProtectVirtualMemory,printf,printf,GetProcAddress,NtUnmapViewOfSection,printf,FindCloseChangeNotification,printf,0_2_00007FF6D25A13B0
Source: C:\Users\user\Desktop\GesApIoVpU.exeCode function: 0_2_00007FF6D25A17400_2_00007FF6D25A1740
Source: C:\Users\user\Desktop\GesApIoVpU.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7356 -s 1072
Source: classification engineClassification label: mal72.troj.evad.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7356
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\89319366-ad9c-4edf-9ade-daf7919c2c39Jump to behavior
Source: GesApIoVpU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\GesApIoVpU.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: GesApIoVpU.exeReversingLabs: Detection: 39%
Source: GesApIoVpU.exeVirustotal: Detection: 14%
Source: unknownProcess created: C:\Users\user\Desktop\GesApIoVpU.exe "C:\Users\user\Desktop\GesApIoVpU.exe"
Source: C:\Users\user\Desktop\GesApIoVpU.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7356 -s 1072
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: GesApIoVpU.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: GesApIoVpU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: GesApIoVpU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: GesApIoVpU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: GesApIoVpU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: GesApIoVpU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: GesApIoVpU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: GesApIoVpU.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: GesApIoVpU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\RefleXXion\x64\Release\RefleXXion-EXE.pdb source: GesApIoVpU.exe
Source: GesApIoVpU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: GesApIoVpU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: GesApIoVpU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: GesApIoVpU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: GesApIoVpU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28FB3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28FB3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\GesApIoVpU.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeCode function: 0_2_00007FF6D25A20B0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D25A20B0
Source: C:\Users\user\Desktop\GesApIoVpU.exeCode function: 0_2_00007FF6D25A20B0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D25A20B0
Source: C:\Users\user\Desktop\GesApIoVpU.exeCode function: 0_2_00007FF6D25A2258 SetUnhandledExceptionFilter,0_2_00007FF6D25A2258
Source: C:\Users\user\Desktop\GesApIoVpU.exeCode function: 0_2_00007FF6D25A1BC4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6D25A1BC4

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtClose: Direct from: 0x7FF6D25A16EF
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtSetSecurityObject: Direct from: 0x7FFE221C26A1Jump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtReadVirtualMemory: Direct from: 0x7FF6D25A1532Jump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtAllocateVirtualMemory: Direct from: 0x7FF6D25A18E6Jump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtQuerySystemInformation: Direct from: 0x16F2ADF0080Jump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtAllocateVirtualMemory: Direct from: 0x7FFE221E4B5EJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtAllocateVirtualMemory: Direct from: 0x7FF6D25A18D2Jump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtProtectVirtualMemory: Direct from: 0x7FF6D25A1847Jump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtUnmapViewOfSection: Direct from: 0x7FF6D25A16CFJump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeNtQueryInformationToken: Direct from: 0x7FF6D25A1822Jump to behavior
Source: C:\Users\user\Desktop\GesApIoVpU.exeCode function: 0_2_00007FF6D25A1F90 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6D25A1F90
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
System Information Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging1
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
GesApIoVpU.exe39%ReversingLabsWin64.Hacktool.Reflexon
GesApIoVpU.exe15%VirustotalBrowse
GesApIoVpU.exe100%AviraHEUR/AGEN.1363296
GesApIoVpU.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekeys0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112/0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyc0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyB0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyvF0%Avira URL Cloudsafe
http://120.46.149.112/uG0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyv0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeycGesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F97000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeysGesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F8E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyBGesApIoVpU.exe, 00000000.00000002.2066554017.0000002EEB17A000.00000004.00000010.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
unknown
http://120.46.149.112/GesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F8E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112/uGGesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F70000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyvFGesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F70000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyvGesApIoVpU.exe, 00000000.00000002.2066914686.0000016F28F8E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501752
Start date and time:2024-08-30 12:42:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:GesApIoVpU.exe
renamed because original name is a hash value
Original Sample Name:ff21ad97101c63845d80c0df6808575d05095fa902821dc4fa52e462ef338140.exe
Detection:MAL
Classification:mal72.troj.evad.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.168.117.173
  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
06:43:43API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNpDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
sora.ppc.elfGet hashmaliciousUnknownBrowse
  • 36.119.225.164
sora.sh4.elfGet hashmaliciousMiraiBrowse
  • 36.116.144.198
SecuriteInfo.com.Linux.Siggen.9999.16227.30183.elfGet hashmaliciousMiraiBrowse
  • 36.126.70.65
sora.mips.elfGet hashmaliciousUnknownBrowse
  • 211.103.157.253
firmware.m68k.elfGet hashmaliciousUnknownBrowse
  • 101.54.87.28
firmware.sh4.elfGet hashmaliciousUnknownBrowse
  • 110.232.49.249
KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
  • 116.128.44.170
KKveTTgaAAsecNNaaaa.i686.elfGet hashmaliciousUnknownBrowse
  • 117.119.126.204
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8880040942813662
Encrypted:false
SSDEEP:192:aMEi67kD50193TajI5VzuiFgZ24lO8P4:tEi67k+193GjEzuiFgY4lO8P
MD5:C50F686CA720B80D51FD8C6F0F0DDCE5
SHA1:A8C28F3DB57F84D6FDFF264C68634DEE91B45074
SHA-256:4CAE016AF3865C774EF251A94E0A3CFFF4B8BFD3F20BDA05BC324D37CB44C266
SHA-512:9D0A81635A3352C453A018635D0BF9EFAC7E820CD2554CC2F82F9F586C7F5EABEC76F5F5CD1217EEDFE4A3E99F0A1EBA841ADD73AFB734C5DF9B1758CD2EA268
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.2.0.5.8.0.0.0.8.6.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.2.0.6.2.3.7.5.7.7.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.4.0.7.1.9.4.4.-.6.c.9.e.-.4.3.6.8.-.8.5.e.3.-.7.8.7.5.9.7.b.c.2.6.4.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.1.e.7.f.9.6.4.-.f.a.2.4.-.4.3.2.4.-.a.d.4.1.-.e.b.9.5.d.4.2.e.c.1.e.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.G.e.s.A.p.I.o.V.p.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.b.c.-.0.0.0.1.-.0.0.1.4.-.a.4.b.3.-.9.c.6.f.c.9.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.b.7.e.9.e.2.0.4.a.1.5.8.7.5.7.d.6.8.6.8.5.6.0.f.b.0.a.f.c.f.2.0.0.0.0.f.f.f.f.!.0.0.0.0.c.3.1.5.c.d.7.1.4.3.c.0.1.a.d.b.1.6.7.f.8.1.d.2.e.2.d.5.d.f.9.8.e.8.7.2.e.d.2.c.!.G.e.s.A.p.I.o.V.p.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.9.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:43:26 2024, 0x1205a4 type
Category:dropped
Size (bytes):139306
Entropy (8bit):1.430812376457852
Encrypted:false
SSDEEP:384:eisig8gHLuJvndgVKti8pg6WuSMXLbIbB:eisig+vWKhL
MD5:49700D0EBA9BCF6C269A579A3D57BE04
SHA1:FA3081B8CD750E72D699F4ED42CA5A8F89EAFBEB
SHA-256:556D3116AD00BF8E8B9BD28F06B517E5143D0A88416494A2A4DB2EE5ECC36CFD
SHA-512:3345DCE6C94FAB325D689433763F30720F403B4542046F22C2C8BC0BBFC6AF3F8BD65A88E5028F774215A47C4798FE13435B3E516FCA04561C33E4600DD84239
Malicious:false
Reputation:low
Preview:MDMP..a..... .......N..f.........................................P..........T.......8...........T............+..........................................................................................................eJ......$.......Lw......................T...........J..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8766
Entropy (8bit):3.7132257225926466
Encrypted:false
SSDEEP:192:R6l7wVeJ7klSn6Y9UnYgmfQJsjprl89b3Gwdhfnl9m:R6lXJom6YOnYgmf093xdhfne
MD5:A14F9ED7205D5ECD712D2020F1F15CF0
SHA1:33B457241BEBFFA3E862BFD52F228FFAFE9E6925
SHA-256:B14C18FAC25BBCA848D3C2BB295D4992F5AF0D8C8E2761F06C882DF7DB3B425B
SHA-512:47B294F5560E53A9069BA48695E08F6F54166C674B1FB18F19779FB7ED6B2769DC687D35A81A06A693A4866DA34F5E4693CD055D5F4300FE16DCA023B7271C09
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.5.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4677
Entropy (8bit):4.496787733933627
Encrypted:false
SSDEEP:48:cvIwWl8zsmJg771I9i4u/WpW8VYYkYm8M4JNfFyhyq850FhNTd:uIjf8I7gZ7VTJEBhNTd
MD5:96C18B12B9368F854C38004B565C688F
SHA1:AEBBE0F5ACB84815DB8994EAEE0B1FBA19C2276A
SHA-256:C996DDBAB381303A061D6A4614345F3F0948320AF3A1357BC5A761AA8E47C346
SHA-512:7343535539B62C130EB1A0D97872DDE959F45136392F91B439C20C09AE80533B68DE2A4B26671ED691AA40932B13D29FEF93A99E60A093A4AD061FFAC75357F2
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="478186" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.465608108265668
Encrypted:false
SSDEEP:6144:1IXfpi67eLPU9skLmb0b4nWSPKaJG8nAgejZMMhA2gX4WABl0uNRdwBCswSbt:2XD94nWlLZMM6YFHb+t
MD5:A3E8D7EA5615E02ED1674B1834373861
SHA1:BFEFBDB1E40E7032FB0B9A642E52E3E6BD8E9D8B
SHA-256:36AC2EF5D177440BF5364D70B2AABEA8B124BC411BA10DCB5E1E2591B42532E3
SHA-512:59E033B468ED2F698D2854AF6AF9BF9628A331F12855FC4CB8F6956B989D5DEA4482180E17BB070C0C9D9CA9DFDE0BF0B6F9C5FAC39B982557E6153CCCCE0318
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm&IHq................................................................................................................................................................................................................................................................................................................................................I)^E........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):5.259454112239684
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:GesApIoVpU.exe
File size:15'360 bytes
MD5:c8f9956ef78e7878d289a8b9197eefdb
SHA1:c315cd7143c01adb167f81d2e2d5df98e872ed2c
SHA256:ff21ad97101c63845d80c0df6808575d05095fa902821dc4fa52e462ef338140
SHA512:76cf5b92aeecf269d5a33904f13492cab47d2abb437f749360d27f823a3b9de26b402aaea0114ebd90be94844624990e173265b2391aec9449fa5ac3dded7a0e
SSDEEP:192:QXuUtk2QNN8H5ieAHwgUEZRHOeErlQes3Q5tfcri:QXrfQNNnDHwg8eiQes3
TLSH:A7624B4AF76239FAC535C23A8AB22525AC757E424336C2DF677449380F776C0342A74E
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........M...#...#...#.......#..."...#...&...#...'...#... ...#.n."...#..."...#.e.*...#.e.....#.e.!...#.Rich..#........................
Icon Hash:90cececece8e8eb0
Entrypoint:0x140001bb0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66D10AC1 [Thu Aug 29 23:56:49 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:6c3fb4f7aa279b02cca9ac579678671d
Instruction
dec eax
sub esp, 28h
call 00007FF3DC505CACh
dec eax
add esp, 28h
jmp 00007FF3DC505747h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [0000148Bh]
dec eax
mov ecx, ebx
call dword ptr [0000148Ah]
call dword ptr [00001474h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00001458h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [0000143Ch]
test eax, eax
je 00007FF3DC5058D9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [000034C2h]
call 00007FF3DC50597Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [000035A9h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00003539h], eax
dec eax
mov eax, dword ptr [00003592h]
dec eax
mov dword ptr [00003403h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00003507h], eax
mov dword ptr [000033DDh], C0000409h
mov dword ptr [000033D7h], 00000001h
mov dword ptr [000033E1h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3f2c0xc8.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x1f8.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x39500x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x38100x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x228.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x169c0x1800085d3ae3ae3dd8b6e3d4b52c12fe9a9fFalse0.6202799479166666data5.925929956842581IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x17a00x1800dfcda954d52b463011c070bb5b8cc7c6False0.38623046875data4.597731773626725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x50000x6480x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x60000x1f80x200a27180f9289d0a648fd4a1816d361a24False0.556640625PEX Binary Archive3.8112609871855097IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x70000x1e00x2000b35de07beeb30d1d6013cbca2846303False0.525390625data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x80000x300x200a2e8a3700b1d7d1f7408b448f0d9f621False0.12109375data0.6947629390682608IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x70600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllHeapCreate, VirtualProtect, VirtualAlloc, GetModuleHandleA, GetLastError, CloseHandle, K32GetModuleInformation, HeapAlloc, GetProcAddress, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, GetModuleHandleW, IsDebuggerPresent, QueryPerformanceCounter
WININET.dllInternetOpenUrlA, InternetOpenW, InternetReadFile
VCRUNTIME140.dllmemset, __current_exception_context, __C_specific_handler, __current_exception, memcpy
api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __stdio_common_vfprintf, __p__commode, _set_fmode
api-ms-win-crt-string-l1-1-0.dllstrcmp, _wcsnicmp
api-ms-win-crt-heap-l1-1-0.dllmalloc, _set_new_mode
api-ms-win-crt-runtime-l1-1-0.dll__p___argc, _register_onexit_function, _crt_atexit, _register_thread_local_exe_atexit_callback, terminate, _exit, _seh_filter_exe, _c_exit, _initterm_e, _cexit, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, __p___argv, _initialize_onexit_table, _set_app_type, exit
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:43:23.411659002 CEST497328888192.168.2.4120.46.149.112
Aug 30, 2024 12:43:23.447254896 CEST888849732120.46.149.112192.168.2.4
Aug 30, 2024 12:43:23.447376966 CEST497328888192.168.2.4120.46.149.112
Aug 30, 2024 12:43:23.454171896 CEST497328888192.168.2.4120.46.149.112
Aug 30, 2024 12:43:23.476402044 CEST888849732120.46.149.112192.168.2.4
Aug 30, 2024 12:43:25.647142887 CEST888849732120.46.149.112192.168.2.4
Aug 30, 2024 12:43:25.647294044 CEST497328888192.168.2.4120.46.149.112
Aug 30, 2024 12:43:25.666166067 CEST497328888192.168.2.4120.46.149.112
Aug 30, 2024 12:43:25.697664976 CEST888849732120.46.149.112192.168.2.4
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.449732120.46.149.11288887356C:\Users\user\Desktop\GesApIoVpU.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:43:23.454171896 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:43:22
Start date:30/08/2024
Path:C:\Users\user\Desktop\GesApIoVpU.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\GesApIoVpU.exe"
Imagebase:0x7ff6d25a0000
File size:15'360 bytes
MD5 hash:C8F9956EF78E7878D289A8B9197EEFDB
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:06:43:25
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7356 -s 1072
Imagebase:0x7ff6c9c90000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:43%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:45.7%
    Total number of Nodes:138
    Total number of Limit Nodes:5
    execution_graph 586 7ff6d25a1bb0 589 7ff6d25a1f90 586->589 590 7ff6d25a1fb3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 589->590 591 7ff6d25a1bb9 589->591 590->591 592 7ff6d25a1950 593 7ff6d25a1960 592->593 605 7ff6d25a1dc8 593->605 595 7ff6d25a19e7 596 7ff6d25a20b0 9 API calls 595->596 604 7ff6d25a19f5 595->604 597 7ff6d25a1a05 596->597 598 7ff6d25a1984 _RTC_Initialize 598->595 613 7ff6d25a2050 InitializeSListHead 598->613 606 7ff6d25a1dd9 605->606 611 7ff6d25a1e0b 605->611 607 7ff6d25a1e48 606->607 610 7ff6d25a1dde __scrt_release_startup_lock 606->610 608 7ff6d25a20b0 9 API calls 607->608 609 7ff6d25a1e52 608->609 610->611 612 7ff6d25a1dfb _initialize_onexit_table 610->612 611->598 612->611 614 7ff6d25a1b62 615 7ff6d25a2204 GetModuleHandleW 614->615 616 7ff6d25a1b69 615->616 617 7ff6d25a1ba8 _exit 616->617 618 7ff6d25a1b6d 616->618 460 7ff6d25a1a34 461 7ff6d25a1a4d __scrt_initialize_crt 460->461 462 7ff6d25a1a55 __scrt_acquire_startup_lock 461->462 463 7ff6d25a1b8b 461->463 465 7ff6d25a1b95 462->465 466 7ff6d25a1a73 __scrt_release_startup_lock 462->466 494 7ff6d25a20b0 IsProcessorFeaturePresent 463->494 467 7ff6d25a20b0 9 API calls 465->467 469 7ff6d25a1a98 466->469 471 7ff6d25a1b1e _get_initial_narrow_environment __p___argv __p___argc 466->471 474 7ff6d25a1b16 _register_thread_local_exe_atexit_callback 466->474 468 7ff6d25a1ba0 467->468 470 7ff6d25a1ba8 _exit 468->470 480 7ff6d25a1740 471->480 474->471 477 7ff6d25a1b4b 478 7ff6d25a1b50 _cexit 477->478 479 7ff6d25a1b55 477->479 478->479 479->469 500 7ff6d25a1070 480->500 482 7ff6d25a1761 483 7ff6d25a176b malloc 482->483 524 7ff6d25a13b0 482->524 486 7ff6d25a17c0 InternetOpenW InternetOpenUrlA InternetReadFile 483->486 487 7ff6d25a1886 486->487 487->487 488 7ff6d25a18bf HeapCreate RtlAllocateHeap memcpy 487->488 489 7ff6d25a18fc 488->489 568 7ff6d25a1930 489->568 492 7ff6d25a2204 GetModuleHandleW 493 7ff6d25a1b47 492->493 493->468 493->477 495 7ff6d25a20d6 494->495 496 7ff6d25a20e4 memset RtlCaptureContext RtlLookupFunctionEntry 495->496 497 7ff6d25a211e RtlVirtualUnwind 496->497 498 7ff6d25a215a memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 496->498 497->498 499 7ff6d25a21de 498->499 499->465 577 7ff6d25a1010 __acrt_iob_func 500->577 502 7ff6d25a1091 503 7ff6d25a10d5 502->503 505 7ff6d25a10b0 _wcsnicmp 502->505 504 7ff6d25a1010 printf 2 API calls 503->504 506 7ff6d25a10e1 504->506 505->502 508 7ff6d25a10f6 505->508 507 7ff6d25a1930 8 API calls 506->507 509 7ff6d25a10f0 507->509 512 7ff6d25a11c8 508->512 513 7ff6d25a1010 printf 2 API calls 508->513 509->482 510 7ff6d25a1930 8 API calls 511 7ff6d25a126e 510->511 511->482 512->510 514 7ff6d25a11fb 513->514 515 7ff6d25a1010 printf 2 API calls 514->515 516 7ff6d25a1209 515->516 517 7ff6d25a1010 printf 2 API calls 516->517 518 7ff6d25a1217 517->518 519 7ff6d25a1010 printf 2 API calls 518->519 520 7ff6d25a1225 VirtualAlloc 519->520 521 7ff6d25a1274 VirtualProtect 520->521 522 7ff6d25a1244 520->522 521->512 523 7ff6d25a1010 printf 2 API calls 522->523 523->512 525 7ff6d25a1010 printf 2 API calls 524->525 526 7ff6d25a13da GetModuleHandleA 525->526 527 7ff6d25a13ef GetLastError 526->527 528 7ff6d25a140a GetProcAddress 526->528 529 7ff6d25a1010 printf 2 API calls 527->529 530 7ff6d25a1403 528->530 534 7ff6d25a143a 528->534 529->530 531 7ff6d25a1930 8 API calls 530->531 532 7ff6d25a172c 531->532 532->483 533 7ff6d25a1482 537 7ff6d25a1010 printf 2 API calls 533->537 534->533 535 7ff6d25a1010 printf 2 API calls 534->535 536 7ff6d25a149b 535->536 536->533 539 7ff6d25a1500 536->539 538 7ff6d25a14ef CloseHandle 537->538 538->530 540 7ff6d25a1010 printf 2 API calls 539->540 541 7ff6d25a1510 K32GetModuleInformation 540->541 542 7ff6d25a1551 541->542 543 7ff6d25a1536 GetLastError 541->543 545 7ff6d25a1010 printf 2 API calls 542->545 544 7ff6d25a1010 printf 2 API calls 543->544 544->530 551 7ff6d25a157c 545->551 546 7ff6d25a16b2 GetProcAddress NtUnmapViewOfSection 547 7ff6d25a16d3 546->547 548 7ff6d25a16e5 FindCloseChangeNotification 546->548 549 7ff6d25a1010 printf 2 API calls 547->549 550 7ff6d25a1010 printf 2 API calls 548->550 549->530 550->530 551->546 552 7ff6d25a1663 551->552 553 7ff6d25a1010 printf 2 API calls 551->553 552->546 554 7ff6d25a15ea 553->554 555 7ff6d25a1010 printf 2 API calls 554->555 556 7ff6d25a15f9 555->556 557 7ff6d25a1010 printf 2 API calls 556->557 558 7ff6d25a1607 557->558 559 7ff6d25a1618 NtProtectVirtualMemory 558->559 560 7ff6d25a1640 559->560 561 7ff6d25a1665 559->561 562 7ff6d25a1010 printf 2 API calls 560->562 563 7ff6d25a1673 NtProtectVirtualMemory 561->563 562->530 564 7ff6d25a16a6 563->564 565 7ff6d25a1696 563->565 566 7ff6d25a1010 printf 2 API calls 564->566 567 7ff6d25a1010 printf 2 API calls 565->567 566->546 567->530 569 7ff6d25a1939 568->569 570 7ff6d25a190b 569->570 571 7ff6d25a1bf8 IsProcessorFeaturePresent 569->571 570->492 572 7ff6d25a1c10 571->572 581 7ff6d25a1ccc RtlCaptureContext 572->581 580 7ff6d25a1000 577->580 579 7ff6d25a1046 __stdio_common_vfprintf 579->502 580->579 582 7ff6d25a1ce6 RtlLookupFunctionEntry 581->582 583 7ff6d25a1c23 582->583 584 7ff6d25a1cfc RtlVirtualUnwind 582->584 585 7ff6d25a1bc4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 583->585 584->582 584->583 619 7ff6d25a2666 _seh_filter_exe 620 7ff6d25a1a18 624 7ff6d25a2258 SetUnhandledExceptionFilter 620->624

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF6D25A20A0 1 Function_00007FF6D25A25A4 39 Function_00007FF6D25A25C4 1->39 2 Function_00007FF6D25A2098 3 Function_00007FF6D25A1A18 26 Function_00007FF6D25A2258 3->26 42 Function_00007FF6D25A203C 3->42 4 Function_00007FF6D25A13B0 7 Function_00007FF6D25A1930 4->7 11 Function_00007FF6D25A1300 4->11 20 Function_00007FF6D25A1010 4->20 5 Function_00007FF6D25A20B0 9 Function_00007FF6D25A20A8 5->9 6 Function_00007FF6D25A1BB0 19 Function_00007FF6D25A1F90 6->19 37 Function_00007FF6D25A1BC4 7->37 48 Function_00007FF6D25A1CCC 7->48 8 Function_00007FF6D25A1A34 8->0 8->2 8->5 15 Function_00007FF6D25A2204 8->15 17 Function_00007FF6D25A1D7C 8->17 18 Function_00007FF6D25A1F10 8->18 33 Function_00007FF6D25A1EEC 8->33 34 Function_00007FF6D25A1740 8->34 36 Function_00007FF6D25A1D40 8->36 45 Function_00007FF6D25A1E54 8->45 10 Function_00007FF6D25A1000 12 Function_00007FF6D25A2300 13 Function_0000016F2ADF0008 14 Function_00007FF6D25A2684 16 Function_00007FF6D25A1F78 41 Function_00007FF6D25A1F3C 16->41 22 Function_00007FF6D25A2060 17->22 40 Function_00007FF6D25A233C 17->40 18->22 20->10 21 Function_00007FF6D25A208C 23 Function_00007FF6D25A1B62 23->15 24 Function_00007FF6D25A1EE5 25 Function_00007FF6D25A2064 27 Function_00007FF6D25A1070 27->7 27->20 28 Function_00007FF6D25A2070 28->10 31 Function_00007FF6D25A2068 28->31 29 Function_00007FF6D25A2666 30 Function_00007FF6D25A24E8 32 Function_00007FF6D25A2268 33->30 34->4 34->7 34->27 35 Function_00007FF6D25A2040 36->30 38 Function_00007FF6D25A22C4 43 Function_00007FF6D25A2050 44 Function_00007FF6D25A1950 44->5 44->16 44->21 44->22 44->25 44->28 44->35 44->38 44->42 44->43 46 Function_00007FF6D25A2048 44->46 47 Function_00007FF6D25A1DC8 44->47 47->5 47->30

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff6d25a13b0-7ff6d25a13ed call 7ff6d25a1010 GetModuleHandleA 3 7ff6d25a13ef-7ff6d25a1405 GetLastError call 7ff6d25a1010 0->3 4 7ff6d25a140a-7ff6d25a1434 GetProcAddress 0->4 10 7ff6d25a1720-7ff6d25a1736 call 7ff6d25a1930 3->10 5 7ff6d25a154a-7ff6d25a154c 4->5 6 7ff6d25a143a-7ff6d25a1480 4->6 8 7ff6d25a1718 5->8 15 7ff6d25a1482-7ff6d25a1489 6->15 16 7ff6d25a148b-7ff6d25a14e1 call 7ff6d25a1010 6->16 8->10 17 7ff6d25a14ea-7ff6d25a14fb call 7ff6d25a1010 CloseHandle 15->17 23 7ff6d25a1500-7ff6d25a1534 call 7ff6d25a1010 K32GetModuleInformation 16->23 24 7ff6d25a14e3 16->24 17->8 27 7ff6d25a1551-7ff6d25a158e call 7ff6d25a1010 23->27 28 7ff6d25a1536-7ff6d25a1545 GetLastError call 7ff6d25a1010 23->28 24->17 32 7ff6d25a16b2-7ff6d25a16d1 GetProcAddress NtUnmapViewOfSection 27->32 33 7ff6d25a1594-7ff6d25a15a6 27->33 28->5 34 7ff6d25a16d3-7ff6d25a16e3 call 7ff6d25a1010 32->34 35 7ff6d25a16e5-7ff6d25a16f6 FindCloseChangeNotification call 7ff6d25a1010 32->35 36 7ff6d25a15b0 33->36 44 7ff6d25a1700-7ff6d25a1710 34->44 41 7ff6d25a16fb 35->41 39 7ff6d25a15b3-7ff6d25a15bf 36->39 42 7ff6d25a1653-7ff6d25a165d 39->42 43 7ff6d25a15c5-7ff6d25a15c9 39->43 41->44 42->36 45 7ff6d25a1663 42->45 43->39 46 7ff6d25a15cb-7ff6d25a163e call 7ff6d25a1010 * 3 call 7ff6d25a1300 NtProtectVirtualMemory 43->46 44->8 45->32 55 7ff6d25a1640-7ff6d25a164e call 7ff6d25a1010 46->55 56 7ff6d25a1665-7ff6d25a1694 call 7ff6d25a261f NtProtectVirtualMemory 46->56 55->44 61 7ff6d25a16a6-7ff6d25a16ad call 7ff6d25a1010 56->61 62 7ff6d25a1696-7ff6d25a16a4 call 7ff6d25a1010 56->62 61->32 62->44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2068035102.00007FF6D25A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D25A0000, based on PE: true
    • Associated: 00000000.00000002.2067789388.00007FF6D25A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068508714.00007FF6D25A3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068582893.00007FF6D25A6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d25a0000_GesApIoVpU.jbxd
    Similarity
    • API ID: printf$Handle$AddressCloseErrorLastModuleProc__acrt_iob_func__stdio_common_vfprintf
    • String ID: [+] NTDLL is cleaned. Closing handles...$.text$NtUnmapViewOfSection$RtlInitUnicodeString$[*] Clean NTDLL .TEXT Section VA...........: 0x%p$[*] Clean NTDLL Base Address...............: 0x%p$[*] Clean Section Handle Address...........: 0x%p$[*] Hooked NTDLL .TEXT Section VA..........: 0x%p$[*] Hooked NTDLL Base Address..............: 0x%p$[*] Size of .TEXT Section..................: %zd$[*] Using Technique-2, Reads NTDLL From KnownDlls and Clean.$[+] All done.$[-] GetModuleHandleA error: %d$[-] GetModuleInformation error: %d$[-] NtMapViewOfSection error.$[-] NtOpenSection error.$[-] NtProtectVirtualMemory - 1: Error.$[-] NtProtectVirtualMemory - 2: Error.$[-] NtUnmapViewOfSection error: %X$\KnownDlls\ntdll.dll$ntdll.dll
    • API String ID: 3667996920-1111665865
    • Opcode ID: 17433d8e5b18d352697a7b495b8225d878b9aa8bba58b30be5a7a49aa5fbee4b
    • Instruction ID: ceada8d54d67756ac46fb2733dc696c3e71c9f860ba804e591695b9ade5fa963
    • Opcode Fuzzy Hash: 17433d8e5b18d352697a7b495b8225d878b9aa8bba58b30be5a7a49aa5fbee4b
    • Instruction Fuzzy Hash: F7A16025B18A4695E710DF60E442EBD73A0FB8478CF404637D94ED3698EEBCF5658360

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2068035102.00007FF6D25A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D25A0000, based on PE: true
    • Associated: 00000000.00000002.2067789388.00007FF6D25A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068508714.00007FF6D25A3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068582893.00007FF6D25A6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d25a0000_GesApIoVpU.jbxd
    Similarity
    • API ID: printf$Internet$HeapOpen$AllocateCreateErrorFileHandleLastModuleRead_wcsnicmpmallocmemcpy
    • String ID: myapp$qvan
    • API String ID: 235151083-30057361
    • Opcode ID: ea5788ac8741f9db8325683b7f9a115cd81f8e4bb8d0dc42e7ae88fd5e91e5ff
    • Instruction ID: 7cf5b991c675c3db72d8fdb117d903b71f1509484ecb052b530abd822b966f35
    • Opcode Fuzzy Hash: ea5788ac8741f9db8325683b7f9a115cd81f8e4bb8d0dc42e7ae88fd5e91e5ff
    • Instruction Fuzzy Hash: E8414D21A0C68555E7508F24E402F3EBBA0FB8ABD8F409236DA8D83B55DF6CF154C710

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2068035102.00007FF6D25A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D25A0000, based on PE: true
    • Associated: 00000000.00000002.2067789388.00007FF6D25A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068508714.00007FF6D25A3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068582893.00007FF6D25A6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d25a0000_GesApIoVpU.jbxd
    Similarity
    • API ID: printf$Virtual$AllocProtect__acrt_iob_func__stdio_common_vfprintf_wcsnicmp
    • String ID: .data$[!] Cannot allocate memory for syscals stubs.$[!] Cannot find NTDLL.$[*] NtCreateSection syscall number.........: %02x$[*] NtMapViewOfSection syscall number......: %02x$[*] NtOpenFile syscall number..............: %02x$[*] NtOpenSection syscall number...........: %02x$[*] Parsing LdrpThunkSignature For Clean Syscalls.$ntdll.dll
    • API String ID: 3446100313-3203066525
    • Opcode ID: c4fb6a64e285f025b2dd7b4954e966771b637f8367b8ac5cfb684afa2db38014
    • Instruction ID: 11c8580016ba0482f6621e7dac206b5e3b9a85218f3f977a098707d4a50c8b12
    • Opcode Fuzzy Hash: c4fb6a64e285f025b2dd7b4954e966771b637f8367b8ac5cfb684afa2db38014
    • Instruction Fuzzy Hash: AA718D26A1864982EB109F15E442E7D7BA0FFC4B98F548137CA4D877A5DEBCF861C720

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2068035102.00007FF6D25A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D25A0000, based on PE: true
    • Associated: 00000000.00000002.2067789388.00007FF6D25A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068508714.00007FF6D25A3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068582893.00007FF6D25A6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d25a0000_GesApIoVpU.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: 05778728840da570b37273fd8b88859eec4bde9f80d254427fb08511bcc2c7df
    • Instruction ID: 78072c7de011619d2c6bb8b303e062ce3b968128bdd6baad4aa499c6561470e0
    • Opcode Fuzzy Hash: 05778728840da570b37273fd8b88859eec4bde9f80d254427fb08511bcc2c7df
    • Instruction Fuzzy Hash: 6B311D21A4D14E41EB14AF259567FBD2291AF8578CF448037D60ECB2E7EEADF8258270

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2068035102.00007FF6D25A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D25A0000, based on PE: true
    • Associated: 00000000.00000002.2067789388.00007FF6D25A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068508714.00007FF6D25A3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068582893.00007FF6D25A6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d25a0000_GesApIoVpU.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 318deca273402c680eef2276bbcd3dc1456a643cb717147b589ec6ee87fdda17
    • Instruction ID: 48248e75444b965dd44575a3bcc5d5450100be49177cc1c5027ddc3a2e0adea5
    • Opcode Fuzzy Hash: 318deca273402c680eef2276bbcd3dc1456a643cb717147b589ec6ee87fdda17
    • Instruction Fuzzy Hash: D4316272609A8595EB609F60E852BFD7360FB84748F44403ADA4E87788DF7CE558C710
    Memory Dump Source
    • Source File: 00000000.00000002.2068035102.00007FF6D25A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D25A0000, based on PE: true
    • Associated: 00000000.00000002.2067789388.00007FF6D25A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068508714.00007FF6D25A3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2068582893.00007FF6D25A6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6d25a0000_GesApIoVpU.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: eb274de3c1f8bb1215ec636cc87a6d02b522714a5a38c6da363feac6ae4a8357
    • Instruction ID: 86d5c92b9ff5d75d739a7454f1952164cafcc677930b0eb7dee58613071da5b9
    • Opcode Fuzzy Hash: eb274de3c1f8bb1215ec636cc87a6d02b522714a5a38c6da363feac6ae4a8357
    • Instruction Fuzzy Hash: 5AA0012298C80AA0E7048F05A853D386220FB50308B404132C00DC1464DFBCB464C221