Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6zZSlt35Hr.exe

Overview

General Information

Sample name:6zZSlt35Hr.exe
renamed because original name is a hash value
Original sample name:b9c3973d895aa77be8a1a62e249f94aa8c6db03cdcc8c6798ccd3416d5d985ec.exe
Analysis ID:1501758
MD5:32ee8c01dc56e509b041e6451a4b18d6
SHA1:7176af0c03b15009ba1cf26c278228ef249ad75c
SHA256:b9c3973d895aa77be8a1a62e249f94aa8c6db03cdcc8c6798ccd3416d5d985ec
Tags:120-46-149-112exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Uses known network protocols on non-standard ports
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Program does not show much activity (idle)
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • 6zZSlt35Hr.exe (PID: 3960 cmdline: "C:\Users\user\Desktop\6zZSlt35Hr.exe" MD5: 32EE8C01DC56E509B041E6451A4B18D6)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\6zZSlt35Hr.exe, Initiated: true, ProcessId: 3960, Protocol: tcp, SourceIp: 192.168.2.10, SourceIsIpv6: false, SourcePort: 49700
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 6zZSlt35Hr.exeReversingLabs: Detection: 31%
Source: 6zZSlt35Hr.exeVirustotal: Detection: 40%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: 6zZSlt35Hr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: 6zZSlt35Hr.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 8888
Source: global trafficTCP traffic: 192.168.2.10:49700 -> 120.46.149.112:8888
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeCode function: 0_2_00007FF60A861000 InternetOpenW,InternetOpenUrlA,InternetReadFile,VirtualProtect,0_2_00007FF60A861000
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmp, 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey#
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey2a
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey5
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey6
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey7
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey=
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyb
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyy
Source: classification engineClassification label: mal56.troj.winEXE@1/0@0/1
Source: 6zZSlt35Hr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 6zZSlt35Hr.exeReversingLabs: Detection: 31%
Source: 6zZSlt35Hr.exeVirustotal: Detection: 40%
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: 6zZSlt35Hr.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 6zZSlt35Hr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 6zZSlt35Hr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 6zZSlt35Hr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 6zZSlt35Hr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 6zZSlt35Hr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 6zZSlt35Hr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 6zZSlt35Hr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 6zZSlt35Hr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\remote_cs\x64\Release\remote_cs.pdb source: 6zZSlt35Hr.exe
Source: 6zZSlt35Hr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 6zZSlt35Hr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 6zZSlt35Hr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 6zZSlt35Hr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 6zZSlt35Hr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 8888
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWmv
Source: 6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeCode function: 0_2_00007FF60A8618F8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF60A8618F8
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeCode function: 0_2_00007FF60A8618F8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF60A8618F8
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeCode function: 0_2_00007FF60A861404 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF60A861404
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeCode function: 0_2_00007FF60A861AA0 SetUnhandledExceptionFilter,0_2_00007FF60A861AA0
Source: C:\Users\user\Desktop\6zZSlt35Hr.exeCode function: 0_2_00007FF60A8617D0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF60A8617D0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
6zZSlt35Hr.exe32%ReversingLabsWin64.Backdoor.Cobeacon
6zZSlt35Hr.exe41%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey#0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyb0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey50%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey=0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyy0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey2a0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey#4%VirustotalBrowse
http://120.46.149.112:8888/safekey4%VirustotalBrowse
http://120.46.149.112:8888/safekey70%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey60%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekey56zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB51000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey#6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyb6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey=6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyy6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey2a6zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB1C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey76zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB6C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekey66zZSlt35Hr.exe, 00000000.00000002.1484506899.0000024E1EB51000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501758
Start date and time:2024-08-30 12:42:22 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 1s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:6zZSlt35Hr.exe
renamed because original name is a hash value
Original Sample Name:b9c3973d895aa77be8a1a62e249f94aa8c6db03cdcc8c6798ccd3416d5d985ec.exe
Detection:MAL
Classification:mal56.troj.winEXE@1/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNsora.ppc.elfGet hashmaliciousUnknownBrowse
  • 36.119.225.164
sora.sh4.elfGet hashmaliciousMiraiBrowse
  • 36.116.144.198
SecuriteInfo.com.Linux.Siggen.9999.16227.30183.elfGet hashmaliciousMiraiBrowse
  • 36.126.70.65
sora.mips.elfGet hashmaliciousUnknownBrowse
  • 211.103.157.253
firmware.m68k.elfGet hashmaliciousUnknownBrowse
  • 101.54.87.28
firmware.sh4.elfGet hashmaliciousUnknownBrowse
  • 110.232.49.249
KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
  • 116.128.44.170
KKveTTgaAAsecNNaaaa.i686.elfGet hashmaliciousUnknownBrowse
  • 117.119.126.204
SecuriteInfo.com.Linux.Siggen.9999.2027.4559.elfGet hashmaliciousMiraiBrowse
  • 211.152.238.59
154.216.18.223-mips-2024-08-17T03_44_00.elfGet hashmaliciousMiraiBrowse
  • 116.128.43.53
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.828670465100379
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:6zZSlt35Hr.exe
File size:11'264 bytes
MD5:32ee8c01dc56e509b041e6451a4b18d6
SHA1:7176af0c03b15009ba1cf26c278228ef249ad75c
SHA256:b9c3973d895aa77be8a1a62e249f94aa8c6db03cdcc8c6798ccd3416d5d985ec
SHA512:03ed2ab3c7a52bc994503b3b797364cd8b88295d12db3da0f62f36b0ed730bff9245bb362824ac29cf45cf25e13295e6135befc4fd947ec674ee8dadcc9327e9
SSDEEP:192:4KQSns8a84pDYU0SUeJybLmauP9REO3Q5tf/rey:4KQSnsRaX2ybLmaQREO3vy
TLSH:72322A4AFA928DF7D6184239C53B069FE074F603575263CB03B846193F617E266253CD
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........S....................y.~.....y.z.....y.{.....y.|.......~.......~.......w...............}.....Rich....................PE..d..
Icon Hash:90cececece8e8eb0
Entrypoint:0x1400013f0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66CF73C1 [Wed Aug 28 19:00:17 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:b265d6591928332cefef7cd310d8d504
Instruction
dec eax
sub esp, 28h
call 00007F9B10DB65ECh
dec eax
add esp, 28h
jmp 00007F9B10DB6087h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00000C23h]
dec eax
mov ecx, ebx
call dword ptr [00000C12h]
call dword ptr [00000C1Ch]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00000C10h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00000C24h]
test eax, eax
je 00007F9B10DB6219h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00001C82h]
call 00007F9B10DB62BEh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00001D69h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00001CF9h], eax
dec eax
mov eax, dword ptr [00001D52h]
dec eax
mov dword ptr [00001BC3h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00001CC7h], eax
mov dword ptr [00001B9Dh], C0000409h
mov dword ptr [00001B97h], 00000001h
mov dword ptr [00001BA1h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x28d40xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x90000x180.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xb0000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x23f00x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22b00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x1b8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xedc0x10006c76284437acee4b95367028bcc334d0False0.614990234375data5.800791560028842IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000xfca0x1000e859fdaeac1ca2d32ebd2825eca9764cFalse0.392822265625data4.2227445891396425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x30000x56400x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x90000x1800x200fd030f9e826dba2e7c1680c61d6be2f5False0.453125data3.0096722958059634IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xa0000x1e00x200101f04294dcfeea9dfe10d3c920461d9False0.529296875data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xb0000x300x20017f63a296298a141c25c2636da04a4ecFalse0.126953125data0.7223754407169259IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0xa0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllVirtualProtect, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, RtlCaptureContext
WININET.dllInternetReadFile, InternetOpenUrlA, InternetOpenW
VCRUNTIME140.dll__C_specific_handler, __current_exception, __current_exception_context, memset, memcpy
api-ms-win-crt-runtime-l1-1-0.dllterminate, _register_onexit_function, _crt_atexit, _register_thread_local_exe_atexit_callback, _initialize_onexit_table, __p___argc, _c_exit, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, _seh_filter_exe, _cexit, __p___argv
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:43:37.065059900 CEST497008888192.168.2.10120.46.149.112
Aug 30, 2024 12:43:37.126892090 CEST888849700120.46.149.112192.168.2.10
Aug 30, 2024 12:43:37.126970053 CEST497008888192.168.2.10120.46.149.112
Aug 30, 2024 12:43:37.127185106 CEST497008888192.168.2.10120.46.149.112
Aug 30, 2024 12:43:37.177560091 CEST888849700120.46.149.112192.168.2.10
Aug 30, 2024 12:43:39.485492945 CEST888849700120.46.149.112192.168.2.10
Aug 30, 2024 12:43:39.485707998 CEST497008888192.168.2.10120.46.149.112
Aug 30, 2024 12:43:39.485932112 CEST497008888192.168.2.10120.46.149.112
Aug 30, 2024 12:43:39.516799927 CEST888849700120.46.149.112192.168.2.10
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.1049700120.46.149.11288883960C:\Users\user\Desktop\6zZSlt35Hr.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:43:37.127185106 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Target ID:0
Start time:06:43:35
Start date:30/08/2024
Path:C:\Users\user\Desktop\6zZSlt35Hr.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\6zZSlt35Hr.exe"
Imagebase:0x7ff60a860000
File size:11'264 bytes
MD5 hash:32EE8C01DC56E509B041E6451A4B18D6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:24.1%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:24.6%
    Total number of Nodes:65
    Total number of Limit Nodes:2
    execution_graph 374 7ff60a861ea6 _seh_filter_exe 375 7ff60a861258 379 7ff60a861aa0 SetUnhandledExceptionFilter 375->379 380 7ff60a8613a2 381 7ff60a861a4c GetModuleHandleW 380->381 382 7ff60a8613a9 381->382 383 7ff60a8613ad 382->383 384 7ff60a8613e8 _exit 382->384 325 7ff60a861274 326 7ff60a86128d __scrt_initialize_crt 325->326 327 7ff60a8613cb 326->327 328 7ff60a861295 __scrt_acquire_startup_lock 326->328 354 7ff60a8618f8 IsProcessorFeaturePresent 327->354 330 7ff60a8613d5 328->330 335 7ff60a8612b3 __scrt_release_startup_lock 328->335 331 7ff60a8618f8 9 API calls 330->331 332 7ff60a8613e0 331->332 334 7ff60a8613e8 _exit 332->334 333 7ff60a8612d8 335->333 336 7ff60a86135e _get_initial_narrow_environment __p___argv __p___argc 335->336 340 7ff60a861356 _register_thread_local_exe_atexit_callback 335->340 345 7ff60a861000 336->345 340->336 342 7ff60a86138b 343 7ff60a861395 342->343 344 7ff60a861390 _cexit 342->344 343->333 344->343 346 7ff60a861060 InternetOpenW InternetOpenUrlA InternetReadFile 345->346 348 7ff60a861100 346->348 348->348 349 7ff60a861116 VirtualProtect 348->349 360 7ff60a861170 349->360 352 7ff60a861a4c GetModuleHandleW 353 7ff60a861387 352->353 353->332 353->342 355 7ff60a86191e 354->355 356 7ff60a86192c memset RtlCaptureContext RtlLookupFunctionEntry 355->356 357 7ff60a861966 RtlVirtualUnwind 356->357 358 7ff60a8619a2 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 356->358 357->358 359 7ff60a861a26 358->359 359->330 361 7ff60a861179 360->361 362 7ff60a861141 361->362 363 7ff60a861438 IsProcessorFeaturePresent 361->363 362->352 364 7ff60a861450 363->364 369 7ff60a86150c RtlCaptureContext 364->369 370 7ff60a861526 RtlLookupFunctionEntry 369->370 371 7ff60a86153c RtlVirtualUnwind 370->371 372 7ff60a861463 370->372 371->370 371->372 373 7ff60a861404 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 372->373 385 7ff60a861190 386 7ff60a8611a0 385->386 398 7ff60a861608 386->398 388 7ff60a8618f8 9 API calls 389 7ff60a861245 388->389 390 7ff60a8611c4 _RTC_Initialize 395 7ff60a861227 390->395 406 7ff60a861890 InitializeSListHead 390->406 395->388 397 7ff60a861235 395->397 399 7ff60a861619 398->399 404 7ff60a86164b 398->404 400 7ff60a861688 399->400 403 7ff60a86161e __scrt_release_startup_lock 399->403 401 7ff60a8618f8 9 API calls 400->401 402 7ff60a861692 401->402 403->404 405 7ff60a86163b _initialize_onexit_table 403->405 404->390 405->404 407 7ff60a8613f0 410 7ff60a8617d0 407->410 411 7ff60a8613f9 410->411 412 7ff60a8617f3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 410->412 412->411

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF60A861A4C 1 Function_00007FF60A86150C 2 Function_00007FF60A861B0C 3 Function_00007FF60A861B48 4 Function_00007FF60A861608 17 Function_00007FF60A8618F8 4->17 33 Function_00007FF60A861D30 4->33 5 Function_00007FF60A861888 6 Function_00007FF60A8618D4 7 Function_00007FF60A861694 8 Function_00007FF60A861750 43 Function_00007FF60A8618A0 8->43 9 Function_00007FF60A8617D0 10 Function_00007FF60A861890 11 Function_00007FF60A861190 11->2 11->4 11->5 11->6 11->10 14 Function_00007FF60A86187C 11->14 15 Function_00007FF60A8618B8 11->15 16 Function_00007FF60A8617B8 11->16 11->17 23 Function_00007FF60A861880 11->23 40 Function_00007FF60A8618A4 11->40 11->43 12 Function_00007FF60A8615BC 20 Function_00007FF60A861B84 12->20 12->43 13 Function_00007FF60A86177C 28 Function_00007FF60A8618A8 15->28 34 Function_00007FF60A8618B0 15->34 16->13 32 Function_00007FF60A8618F0 17->32 18 Function_00007FF60A861EC4 19 Function_00007FF60A861404 21 Function_00007FF60A861E04 22 Function_00007FF60A861000 30 Function_00007FF60A861170 22->30 24 Function_00007FF60A861580 24->33 25 Function_00007FF60A86172C 25->33 26 Function_00007FF60A861EA6 27 Function_00007FF60A8618E8 29 Function_00007FF60A861274 29->0 29->7 29->8 29->12 29->17 29->22 29->24 29->25 29->27 41 Function_00007FF60A8618E0 29->41 30->1 30->19 31 Function_00007FF60A8613F0 31->9 35 Function_00007FF60A861AB0 36 Function_00007FF60A861258 36->14 42 Function_00007FF60A861AA0 36->42 37 Function_00007FF60A8613A2 37->0 38 Function_00007FF60A861725 39 Function_00007FF60A861DE4 39->21

    Control-flow Graph

    APIs
    Strings
    • myapp, xrefs: 00007FF60A8610B0
    • wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww, xrefs: 00007FF60A8610E2
    Memory Dump Source
    • Source File: 00000000.00000002.1484738344.00007FF60A861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF60A860000, based on PE: true
    • Associated: 00000000.00000002.1484722473.00007FF60A860000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484752594.00007FF60A862000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484768143.00007FF60A863000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484781891.00007FF60A869000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff60a860000_6zZSlt35Hr.jbxd
    Similarity
    • API ID: Internet$Open$FileProtectReadVirtual
    • String ID: myapp$wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
    • API String ID: 651108210-1813571026
    • Opcode ID: 2d3a5e584580d35300cf6a84468125b399852390a177ae98585e4159634dd887
    • Instruction ID: f7a99d759a81a121d2af75c73ca722b53b5bb1734aba5ecf5465e459a4c771b8
    • Opcode Fuzzy Hash: 2d3a5e584580d35300cf6a84468125b399852390a177ae98585e4159634dd887
    • Instruction Fuzzy Hash: 0631BD23E2C78181FB108F24E454BAA6761FB497E4F9053B1CAAD87795EF2DE144CB01

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1484738344.00007FF60A861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF60A860000, based on PE: true
    • Associated: 00000000.00000002.1484722473.00007FF60A860000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484752594.00007FF60A862000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484768143.00007FF60A863000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484781891.00007FF60A869000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff60a860000_6zZSlt35Hr.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: b5b7887253a78ea7fef9ef7045fde3c1c58b544b11b06e3d584e27c6e435e2d1
    • Instruction ID: 65d294aa943bd5c3b5e852d444f602bd0349d3d632748b114e456c96165118d5
    • Opcode Fuzzy Hash: b5b7887253a78ea7fef9ef7045fde3c1c58b544b11b06e3d584e27c6e435e2d1
    • Instruction Fuzzy Hash: 54316923E2C24382FA50AB61E15DBB96391AF457C4F6442B5EA0ECB7D7DF2DE8048300

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1484738344.00007FF60A861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF60A860000, based on PE: true
    • Associated: 00000000.00000002.1484722473.00007FF60A860000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484752594.00007FF60A862000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484768143.00007FF60A863000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484781891.00007FF60A869000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff60a860000_6zZSlt35Hr.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 4f02b3a61128cfcc87b53e84bd5cd9e5a1c3152059ad6d208f54333adfb5e02e
    • Instruction ID: 11904e651c89399ba9b5f7104c75acfe5ce5180a3119794f102f1dfd2f0e23e8
    • Opcode Fuzzy Hash: 4f02b3a61128cfcc87b53e84bd5cd9e5a1c3152059ad6d208f54333adfb5e02e
    • Instruction Fuzzy Hash: F4316D73A29B818AFB608F60E8447ED7360FB84784F54417ADA4E87B95EF38D548C700
    Memory Dump Source
    • Source File: 00000000.00000002.1484738344.00007FF60A861000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF60A860000, based on PE: true
    • Associated: 00000000.00000002.1484722473.00007FF60A860000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484752594.00007FF60A862000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484768143.00007FF60A863000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1484781891.00007FF60A869000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff60a860000_6zZSlt35Hr.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2c24e642af170a3c2cdab2f9373acaffc8ffb8147b0406a0d7b5edceab0064e4
    • Instruction ID: 52a2be2fe5f0d1a9f1bc40a56b941f41d6f773cdda211434cb66e345af5fe1a9
    • Opcode Fuzzy Hash: 2c24e642af170a3c2cdab2f9373acaffc8ffb8147b0406a0d7b5edceab0064e4
    • Instruction Fuzzy Hash: EBA00223E2CC83D0F6448B01EA558702331FB503C5B6002F1D00EC26A1FF3CA454C301