Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
pDxGUuWkQt.exe

Overview

General Information

Sample name:pDxGUuWkQt.exe
renamed because original name is a hash value
Original sample name:a339f7b56a357c8e93d875311bd1dcded299b4612c651a00e87156a0a24ec219.exe
Analysis ID:1501756
MD5:ca40affc3d86ceefd70f1e95425be406
SHA1:860e6e66a22b4845ad468c85e3d8a1df5ce3baa7
SHA256:a339f7b56a357c8e93d875311bd1dcded299b4612c651a00e87156a0a24ec219
Tags:120-46-149-112exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Uses known network protocols on non-standard ports
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • pDxGUuWkQt.exe (PID: 5356 cmdline: "C:\Users\user\Desktop\pDxGUuWkQt.exe" MD5: CA40AFFC3D86CEEFD70F1E95425BE406)
    • conhost.exe (PID: 4032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\pDxGUuWkQt.exe, Initiated: true, ProcessId: 5356, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49707
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: pDxGUuWkQt.exeReversingLabs: Detection: 31%
Source: pDxGUuWkQt.exeVirustotal: Detection: 27%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
Source: pDxGUuWkQt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: pDxGUuWkQt.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 8888
Source: global trafficTCP traffic: 192.168.2.8:49707 -> 120.46.149.112:8888
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeCode function: 0_2_00007FF7D9201000 InternetOpenW,InternetOpenUrlA,InternetReadFile,0_2_00007FF7D9201000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: pDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B976C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/&=c
Source: pDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B976C000.00000004.00000020.00020000.00000000.sdmp, pDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B97C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: pDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B97C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey9n%
Source: pDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B97C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyfn
Source: classification engineClassification label: mal56.troj.winEXE@2/0@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:4032:120:WilError_03
Source: pDxGUuWkQt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: pDxGUuWkQt.exeReversingLabs: Detection: 31%
Source: pDxGUuWkQt.exeVirustotal: Detection: 27%
Source: unknownProcess created: C:\Users\user\Desktop\pDxGUuWkQt.exe "C:\Users\user\Desktop\pDxGUuWkQt.exe"
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: pDxGUuWkQt.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: pDxGUuWkQt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: pDxGUuWkQt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: pDxGUuWkQt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: pDxGUuWkQt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: pDxGUuWkQt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: pDxGUuWkQt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: pDxGUuWkQt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: pDxGUuWkQt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: pDxGUuWkQt.exe
Source: pDxGUuWkQt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: pDxGUuWkQt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: pDxGUuWkQt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: pDxGUuWkQt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: pDxGUuWkQt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 8888
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: pDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B976C000.00000004.00000020.00020000.00000000.sdmp, pDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B97E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeCode function: 0_2_00007FF7D92018D8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7D92018D8
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeCode function: 0_2_00007FF7D9201A80 SetUnhandledExceptionFilter,0_2_00007FF7D9201A80
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeCode function: 0_2_00007FF7D92013E4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7D92013E4
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeCode function: 0_2_00007FF7D92018D8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7D92018D8
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeCode function: 0_2_00007FF7D92017B0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7D92017B0
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
Source: C:\Users\user\Desktop\pDxGUuWkQt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
pDxGUuWkQt.exe32%ReversingLabsWin64.Backdoor.Cobeacon
pDxGUuWkQt.exe27%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://120.46.149.112/&=c0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyfn0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey9n%0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey4%VirustotalBrowse
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://120.46.149.112/&=cpDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B976C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyfnpDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B97C3000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey9n%pDxGUuWkQt.exe, 00000000.00000002.1662091879.00000174B97C3000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501756
Start date and time:2024-08-30 12:42:18 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 16s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:pDxGUuWkQt.exe
renamed because original name is a hash value
Original Sample Name:a339f7b56a357c8e93d875311bd1dcded299b4612c651a00e87156a0a24ec219.exe
Detection:MAL
Classification:mal56.troj.winEXE@2/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNsora.ppc.elfGet hashmaliciousUnknownBrowse
  • 36.119.225.164
sora.sh4.elfGet hashmaliciousMiraiBrowse
  • 36.116.144.198
SecuriteInfo.com.Linux.Siggen.9999.16227.30183.elfGet hashmaliciousMiraiBrowse
  • 36.126.70.65
sora.mips.elfGet hashmaliciousUnknownBrowse
  • 211.103.157.253
firmware.m68k.elfGet hashmaliciousUnknownBrowse
  • 101.54.87.28
firmware.sh4.elfGet hashmaliciousUnknownBrowse
  • 110.232.49.249
KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
  • 116.128.44.170
KKveTTgaAAsecNNaaaa.i686.elfGet hashmaliciousUnknownBrowse
  • 117.119.126.204
SecuriteInfo.com.Linux.Siggen.9999.2027.4559.elfGet hashmaliciousMiraiBrowse
  • 211.152.238.59
154.216.18.223-mips-2024-08-17T03_44_00.elfGet hashmaliciousMiraiBrowse
  • 116.128.43.53
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.809995458112288
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:pDxGUuWkQt.exe
File size:11'264 bytes
MD5:ca40affc3d86ceefd70f1e95425be406
SHA1:860e6e66a22b4845ad468c85e3d8a1df5ce3baa7
SHA256:a339f7b56a357c8e93d875311bd1dcded299b4612c651a00e87156a0a24ec219
SHA512:79b473ef538a552ca2012e8f658bb3c2dbdc88c85a8c8c93730a37bde487e652a85640e349bbe10c1eeced1a13266ab55b4e0d95dccea6285e0b126080353004
SSDEEP:192:jQrDTV/bTTeF2UfECRXSG5Em3Q5tf/rwH7J:jQrDTVz3jUfECp5Em3FH
TLSH:7432298BFB55CCFAD6590239C97F064EE0757A02672357CF03B888252F627D175252CA
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S......................~.......z.......{.......|.....m.~.......~.....f.w.....f.......f.}.....Rich............PE..d....s.f...
Icon Hash:00928e8e8686b000
Entrypoint:0x1400013d0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CF73F4 [Wed Aug 28 19:01:08 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:0d695ed63ae56c380e5ab176884ed0f8
Instruction
dec eax
sub esp, 28h
call 00007F1AA8ED453Ch
dec eax
add esp, 28h
jmp 00007F1AA8ED3FD7h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000C2Bh]
dec eax
mov ecx, ebx
call dword ptr [00000C1Ah]
call dword ptr [00000C24h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000C18h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000C0Ch]
test eax, eax
je 00007F1AA8ED4169h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00001CA2h]
call 00007F1AA8ED420Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00001D89h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00001D19h], eax
dec eax
mov eax, dword ptr [00001D72h]
dec eax
mov dword ptr [00001BE3h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00001CE7h], eax
mov dword ptr [00001BBDh], C0000409h
mov dword ptr [00001BB7h], 00000001h
mov dword ptr [00001BC1h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x28d40xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x90000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xb0000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x23e00x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22a00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1b0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xebc0x100000292898cbcdbf08d434abd635182a57False0.6103515625zlib compressed data5.761066596543048IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000xfb00x100072aa9de354713c6aa3fa93e027b99f0cFalse0.390380859375data4.198343703435953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x30000x56400x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x90000x1800x200053e0e446eeb194b475e969e54bf5196False0.451171875data2.9842124434311765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xa0000x1e00x200101f04294dcfeea9dfe10d3c920461d9False0.529296875data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xb0000x300x2005e6aca4360d153cdcf62b4cba983dab5False0.126953125data0.7241716995812697IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0xa0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
WININET.dllInternetOpenW, InternetReadFile, InternetOpenUrlA
VCRUNTIME140.dll__current_exception_context, __current_exception, memcpy, memset, __C_specific_handler
api-ms-win-crt-runtime-l1-1-0.dllterminate, _seh_filter_exe, _set_app_type, _register_onexit_function, _initialize_onexit_table, _register_thread_local_exe_atexit_callback, _c_exit, _cexit, __p___argv, __p___argc, _crt_atexit, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
KERNEL32.dllInitializeSListHead, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetModuleHandleW, IsDebuggerPresent, RtlCaptureContext, GetSystemTimeAsFileTime, GetCurrentThreadId
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:43:40.396763086 CEST497078888192.168.2.8120.46.149.112
Aug 30, 2024 12:43:40.414011955 CEST888849707120.46.149.112192.168.2.8
Aug 30, 2024 12:43:40.414127111 CEST497078888192.168.2.8120.46.149.112
Aug 30, 2024 12:43:40.414299011 CEST497078888192.168.2.8120.46.149.112
Aug 30, 2024 12:43:40.429009914 CEST888849707120.46.149.112192.168.2.8
Aug 30, 2024 12:43:42.654993057 CEST888849707120.46.149.112192.168.2.8
Aug 30, 2024 12:43:42.655065060 CEST497078888192.168.2.8120.46.149.112
Aug 30, 2024 12:43:42.657279015 CEST497078888192.168.2.8120.46.149.112
Aug 30, 2024 12:43:42.697077990 CEST888849707120.46.149.112192.168.2.8
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.849707120.46.149.11288885356C:\Users\user\Desktop\pDxGUuWkQt.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:43:40.414299011 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:06:43:38
Start date:30/08/2024
Path:C:\Users\user\Desktop\pDxGUuWkQt.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\pDxGUuWkQt.exe"
Imagebase:0x7ff7d9200000
File size:11'264 bytes
MD5 hash:CA40AFFC3D86CEEFD70F1E95425BE406
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:5
Start time:06:44:03
Start date:30/08/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6ee680000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:22.2%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:23.4%
    Total number of Nodes:64
    Total number of Limit Nodes:1
    execution_graph 373 7ff7d9201e86 _seh_filter_exe 325 7ff7d9201254 326 7ff7d920126d __scrt_initialize_crt 325->326 327 7ff7d9201275 __scrt_acquire_startup_lock 326->327 328 7ff7d92013ab 326->328 330 7ff7d92013b5 327->330 331 7ff7d9201293 __scrt_release_startup_lock 327->331 353 7ff7d92018d8 IsProcessorFeaturePresent 328->353 332 7ff7d92018d8 9 API calls 330->332 335 7ff7d92012b8 331->335 336 7ff7d920133e _get_initial_narrow_environment __p___argv __p___argc 331->336 339 7ff7d9201336 _register_thread_local_exe_atexit_callback 331->339 333 7ff7d92013c0 332->333 334 7ff7d92013c8 _exit 333->334 345 7ff7d9201000 336->345 339->336 342 7ff7d920136b 343 7ff7d9201375 342->343 344 7ff7d9201370 _cexit 342->344 343->335 344->343 347 7ff7d9201060 InternetOpenW InternetOpenUrlA InternetReadFile 345->347 348 7ff7d9201100 347->348 348->348 359 7ff7d9201150 348->359 351 7ff7d9201a2c GetModuleHandleW 352 7ff7d9201367 351->352 352->333 352->342 354 7ff7d92018fe 353->354 355 7ff7d920190c memset RtlCaptureContext RtlLookupFunctionEntry 354->355 356 7ff7d9201946 RtlVirtualUnwind 355->356 357 7ff7d9201982 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 355->357 356->357 358 7ff7d9201a06 357->358 358->330 360 7ff7d9201159 359->360 361 7ff7d9201125 360->361 362 7ff7d9201418 IsProcessorFeaturePresent 360->362 361->351 363 7ff7d9201430 362->363 368 7ff7d92014ec RtlCaptureContext 363->368 369 7ff7d9201506 RtlLookupFunctionEntry 368->369 370 7ff7d9201443 369->370 371 7ff7d920151c RtlVirtualUnwind 369->371 372 7ff7d92013e4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 370->372 371->369 371->370 374 7ff7d9201382 375 7ff7d9201a2c GetModuleHandleW 374->375 376 7ff7d9201389 375->376 377 7ff7d920138d 376->377 378 7ff7d92013c8 _exit 376->378 379 7ff7d92013d0 382 7ff7d92017b0 379->382 383 7ff7d92017d3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 382->383 384 7ff7d92013d9 382->384 383->384 385 7ff7d9201170 386 7ff7d9201180 385->386 398 7ff7d92015e8 386->398 388 7ff7d92018d8 9 API calls 389 7ff7d9201225 388->389 390 7ff7d92011a4 _RTC_Initialize 396 7ff7d9201207 390->396 406 7ff7d9201870 InitializeSListHead 390->406 396->388 397 7ff7d9201215 396->397 399 7ff7d92015f9 398->399 404 7ff7d920162b 398->404 400 7ff7d9201668 399->400 403 7ff7d92015fe __scrt_release_startup_lock 399->403 401 7ff7d92018d8 9 API calls 400->401 402 7ff7d9201672 401->402 403->404 405 7ff7d920161b _initialize_onexit_table 403->405 404->390 405->404 407 7ff7d9201238 411 7ff7d9201a80 SetUnhandledExceptionFilter 407->411

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF7D9201E86 1 Function_00007FF7D9201705 2 Function_00007FF7D9201DC4 23 Function_00007FF7D9201DE4 2->23 3 Function_00007FF7D9201884 4 Function_00007FF7D9201382 38 Function_00007FF7D9201A2C 4->38 5 Function_00007FF7D92018C0 6 Function_00007FF7D9201000 11 Function_00007FF7D9201150 6->11 7 Function_00007FF7D9201A80 8 Function_00007FF7D9201880 9 Function_00007FF7D9201238 9->7 28 Function_00007FF7D920185C 9->28 10 Function_00007FF7D9201254 10->5 10->6 17 Function_00007FF7D920170C 10->17 18 Function_00007FF7D92018C8 10->18 25 Function_00007FF7D9201560 10->25 26 Function_00007FF7D920159C 10->26 31 Function_00007FF7D92018D8 10->31 33 Function_00007FF7D9201674 10->33 35 Function_00007FF7D9201730 10->35 10->38 21 Function_00007FF7D92013E4 11->21 39 Function_00007FF7D92014EC 11->39 12 Function_00007FF7D92013D0 34 Function_00007FF7D92017B0 12->34 13 Function_00007FF7D92018D0 14 Function_00007FF7D9201D10 15 Function_00007FF7D9201890 16 Function_00007FF7D9201A90 17->14 19 Function_00007FF7D9201888 20 Function_00007FF7D9201EA4 22 Function_00007FF7D9201B64 24 Function_00007FF7D9201860 25->14 26->8 26->22 27 Function_00007FF7D920175C 29 Function_00007FF7D9201898 29->15 29->19 30 Function_00007FF7D9201798 30->27 31->13 32 Function_00007FF7D92018B4 35->8 36 Function_00007FF7D9201870 37 Function_00007FF7D9201170 37->3 37->8 37->24 37->28 37->29 37->30 37->31 37->32 37->36 40 Function_00007FF7D9201AEC 37->40 42 Function_00007FF7D92015E8 37->42 43 Function_00007FF7D9201868 37->43 41 Function_00007FF7D9201B28 42->14 42->31

    Control-flow Graph

    APIs
    Strings
    • wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww, xrefs: 00007FF7D92010E2
    • myapp, xrefs: 00007FF7D92010B0
    Memory Dump Source
    • Source File: 00000000.00000002.1662459974.00007FF7D9201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9200000, based on PE: true
    • Associated: 00000000.00000002.1662445188.00007FF7D9200000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662471829.00007FF7D9202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662482305.00007FF7D9203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662493472.00007FF7D9209000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7d9200000_pDxGUuWkQt.jbxd
    Similarity
    • API ID: Internet$Open$FileRead
    • String ID: myapp$wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
    • API String ID: 72386350-1813571026
    • Opcode ID: 26baaf28883c0bf74d76dba615a40c5622d7e850f9e86f38bccdbc7f424d019a
    • Instruction ID: daed4aeb607b1539d34c124bcb5d58ab9d03e3042e254385347a36df4cfc6555
    • Opcode Fuzzy Hash: 26baaf28883c0bf74d76dba615a40c5622d7e850f9e86f38bccdbc7f424d019a
    • Instruction Fuzzy Hash: 6F31A122A0D7C581F7909F24E45036EBB71FB597A4FC45332EAAE12AA9DE2CE144C710

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1662459974.00007FF7D9201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9200000, based on PE: true
    • Associated: 00000000.00000002.1662445188.00007FF7D9200000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662471829.00007FF7D9202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662482305.00007FF7D9203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662493472.00007FF7D9209000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7d9200000_pDxGUuWkQt.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: 4666ebc6d2aeb855d0e68b2e30640a4aad1ad97cc421738106169650206a1296
    • Instruction ID: 81e55e099febe1901feaa8f96cf1c2ae3ff6aa266ff3ee2208eac6b42d5b2ef1
    • Opcode Fuzzy Hash: 4666ebc6d2aeb855d0e68b2e30640a4aad1ad97cc421738106169650206a1296
    • Instruction Fuzzy Hash: B2310521E0C24281FA94BF6194573BDA2B1AF45784FC44037EA4E676EFDE2CB9458360

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1662459974.00007FF7D9201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9200000, based on PE: true
    • Associated: 00000000.00000002.1662445188.00007FF7D9200000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662471829.00007FF7D9202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662482305.00007FF7D9203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662493472.00007FF7D9209000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7d9200000_pDxGUuWkQt.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 3aaf3e52fa0bebb99031b5b9aea3001fd415a84bffb5618b4b1daf09c61e6c63
    • Instruction ID: 2ef4acaa41ccf78180f9d8dd7c4aa75e3a42afd4373fb710a3f34d0547825798
    • Opcode Fuzzy Hash: 3aaf3e52fa0bebb99031b5b9aea3001fd415a84bffb5618b4b1daf09c61e6c63
    • Instruction Fuzzy Hash: D4316072609B8185FBA0AF60E8403EDB371FB94744F84443BDA4E57A89DF38E648C720
    Memory Dump Source
    • Source File: 00000000.00000002.1662459974.00007FF7D9201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9200000, based on PE: true
    • Associated: 00000000.00000002.1662445188.00007FF7D9200000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662471829.00007FF7D9202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662482305.00007FF7D9203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1662493472.00007FF7D9209000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7d9200000_pDxGUuWkQt.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 410115494e036752a80ee1782a78819b379611533b73c52c3e91f617443d23f0
    • Instruction ID: 380450b0bbb4c20f05b9282f9d717834f76c081ac85be94219b4f57def34f74e
    • Opcode Fuzzy Hash: 410115494e036752a80ee1782a78819b379611533b73c52c3e91f617443d23f0
    • Instruction Fuzzy Hash: 2DA0012190DA02D0F685AF00A951138A236BB64381BC00033E00E614A99E2CB454C220