Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GxEyLSwNqM.exe

Overview

General Information

Sample name:GxEyLSwNqM.exe
renamed because original name is a hash value
Original sample name:7403e694ab8b96b57f3cac3b0e66ddad81c4745e986d4974d9d0601765d44fe8.exe
Analysis ID:1501766
MD5:2d2bcbb224240fbad170f45226365cd2
SHA1:ec842fb4e6d1bc8ea365e94d0c4e38b30df4df1a
SHA256:7403e694ab8b96b57f3cac3b0e66ddad81c4745e986d4974d9d0601765d44fe8
Tags:120-46-149-112exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
IP address seen in connection with other malware
One or more processes crash
Sigma detected: Communication To Uncommon Destination Ports

Classification

  • System is w10x64
  • GxEyLSwNqM.exe (PID: 7992 cmdline: "C:\Users\user\Desktop\GxEyLSwNqM.exe" MD5: 2D2BCBB224240FBAD170F45226365CD2)
    • WerFault.exe (PID: 7184 cmdline: C:\Windows\system32\WerFault.exe -u -p 7992 -s 1096 MD5: 59550DE0393B1CDD584A1467D6D734E7)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 120.46.149.112, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Users\user\Desktop\GxEyLSwNqM.exe, Initiated: true, ProcessId: 7992, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49709
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: GxEyLSwNqM.exeAvira: detected
Source: GxEyLSwNqM.exeReversingLabs: Detection: 42%
Source: GxEyLSwNqM.exeVirustotal: Detection: 14%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: GxEyLSwNqM.exeJoe Sandbox ML: detected
Source: GxEyLSwNqM.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\Project\RefleXXion\x64\Release\RefleXXion-EXE.pdb source: GxEyLSwNqM.exe

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 8888
Source: global trafficTCP traffic: 192.168.2.3:49709 -> 120.46.149.112:8888
Source: Joe Sandbox ViewIP Address: 120.46.149.112 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: unknownTCP traffic detected without corresponding DNS query: 120.46.149.112
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeCode function: 0_2_00007FF7DF591740 malloc,InternetOpenW,InternetOpenUrlA,InternetReadFile,HeapCreate,HeapAlloc,memcpy,0_2_00007FF7DF591740
Source: global trafficHTTP traffic detected: GET /safekey HTTP/1.1User-Agent: myappHost: 120.46.149.112:8888Cache-Control: no-cache
Source: GxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112/
Source: GxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB103C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekey
Source: GxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyN
Source: GxEyLSwNqM.exe, 00000000.00000002.1417965734.000000B0B2AFA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeySj
Source: GxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyb
Source: GxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.46.149.112:8888/safekeyr
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeCode function: 0_2_00007FF7DF5913B0 printf,GetModuleHandleA,GetLastError,printf,GetProcAddress,printf,printf,CloseHandle,printf,K32GetModuleInformation,GetLastError,printf,printf,printf,printf,printf,NtProtectVirtualMemory,printf,NtProtectVirtualMemory,printf,printf,GetProcAddress,NtUnmapViewOfSection,printf,CloseHandle,printf,0_2_00007FF7DF5913B0
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeCode function: 0_2_00007FF7DF5917400_2_00007FF7DF591740
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7992 -s 1096
Source: classification engineClassification label: mal72.troj.evad.winEXE@2/5@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7992
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\64beb133-a28f-41c3-8c1f-86a776e288f1Jump to behavior
Source: GxEyLSwNqM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: GxEyLSwNqM.exeReversingLabs: Detection: 42%
Source: GxEyLSwNqM.exeVirustotal: Detection: 14%
Source: unknownProcess created: C:\Users\user\Desktop\GxEyLSwNqM.exe "C:\Users\user\Desktop\GxEyLSwNqM.exe"
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7992 -s 1096
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: GxEyLSwNqM.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: GxEyLSwNqM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: GxEyLSwNqM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: GxEyLSwNqM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: GxEyLSwNqM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: GxEyLSwNqM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: GxEyLSwNqM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: GxEyLSwNqM.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: GxEyLSwNqM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\Project\RefleXXion\x64\Release\RefleXXion-EXE.pdb source: GxEyLSwNqM.exe
Source: GxEyLSwNqM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: GxEyLSwNqM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: GxEyLSwNqM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: GxEyLSwNqM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: GxEyLSwNqM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 8888
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: GxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 9c 31 6b 7d 78 89-be 90 b3 22 a5 ab 1b 52
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: GxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeCode function: 0_2_00007FF7DF5920B0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7DF5920B0
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeCode function: 0_2_00007FF7DF592258 SetUnhandledExceptionFilter,0_2_00007FF7DF592258
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeCode function: 0_2_00007FF7DF591BC4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7DF591BC4
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeCode function: 0_2_00007FF7DF5920B0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7DF5920B0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeNtReadVirtualMemory: Direct from: 0x7FF7DF591532Jump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeNtUnmapViewOfSection: Direct from: 0x7FF7DF5916CFJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeNtQueryInformationToken: Direct from: 0x7FF7DF591822Jump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeNtClose: Direct from: 0x7FF7DF5916EF
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeNtAllocateVirtualMemory: Direct from: 0x7FF7DF5918D2Jump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeNtSetSecurityObject: Direct from: 0x7FFB91EC26B1Jump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeNtAllocateVirtualMemory: Direct from: 0x7FFB91EE4BEEJump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeNtProtectVirtualMemory: Direct from: 0x7FF7DF591847Jump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeNtQuerySystemInformation: Direct from: 0x20FB2EE0080Jump to behavior
Source: C:\Users\user\Desktop\GxEyLSwNqM.exeCode function: 0_2_00007FF7DF591F90 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7DF591F90
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
System Information Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging1
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
GxEyLSwNqM.exe42%ReversingLabsWin64.Hacktool.Reflexon
GxEyLSwNqM.exe15%VirustotalBrowse
GxEyLSwNqM.exe100%AviraHEUR/AGEN.1363296
GxEyLSwNqM.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://120.46.149.112:8888/safekey0%Avira URL Cloudsafe
http://120.46.149.112/0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyb0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyr0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeySj0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekeyN0%Avira URL Cloudsafe
http://120.46.149.112:8888/safekey4%VirustotalBrowse
http://120.46.149.112/1%VirustotalBrowse
http://120.46.149.112:8888/safekeyr1%VirustotalBrowse
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeyfalse
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://120.46.149.112:8888/safekeybGxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10CE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyrGxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10F0000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.5.drfalse
  • URL Reputation: safe
unknown
http://120.46.149.112/GxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10CE000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeySjGxEyLSwNqM.exe, 00000000.00000002.1417965734.000000B0B2AFA000.00000004.00000010.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://120.46.149.112:8888/safekeyNGxEyLSwNqM.exe, 00000000.00000002.1418301919.0000020FB10F0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
120.46.149.112
unknownChina
4847CNIX-APChinaNetworksInter-ExchangeCNfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501766
Start date and time:2024-08-30 12:48:00 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 9s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:GxEyLSwNqM.exe
renamed because original name is a hash value
Original Sample Name:7403e694ab8b96b57f3cac3b0e66ddad81c4745e986d4974d9d0601765d44fe8.exe
Detection:MAL
Classification:mal72.troj.evad.winEXE@2/5@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.168.117.173
  • Excluded domains from analysis (whitelisted): www.bing.com, onedsblobprdeus16.eastus.cloudapp.azure.com, watson.events.data.microsoft.com, login.live.com, slscr.update.microsoft.com, blobcollectorcommon.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
06:48:59API Interceptor1x Sleep call for process: WerFault.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
120.46.149.112al7hCrfLj7.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CKC6pZyjtH.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
6zZSlt35Hr.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112:8888/safekey
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNIX-APChinaNetworksInter-ExchangeCNEI1Hc80wNB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
al7hCrfLj7.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CKC6pZyjtH.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
lApMYpXACB.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
CuBYV0mfw8.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
fEsB3ftQ3t.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
ptEox2MzMA.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
zXR333P8h1.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
GesApIoVpU.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
pDxGUuWkQt.exeGet hashmaliciousUnknownBrowse
  • 120.46.149.112
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8891564578705982
Encrypted:false
SSDEEP:192:AnqiiNhX4v0NCbsMOpjIxVSuiFiH4lO8f:qqii7X4cNCbsMOpjcSuiFiH4lO8f
MD5:15F2989EF15C6AC04B2FAE07DE71671A
SHA1:7159A65F3F502791E67FCA1380C8F367E8054B1F
SHA-256:DC42B6A696AA3C7A8E1DB3C871B037184B5CC625FC5A1D3BCF7DEA5772EC92BE
SHA-512:A644FA6BC7930BA3406694DEE1D90B846D0DBCC9689485FEAA558E469001DC3457D6698D7EE0603BE0854A2C4740CB800BC9F1F98EF84624EA41CDFB2B6E676F
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.4.8.8.5.3.2.9.6.4.9.1.3.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.4.8.8.5.3.3.4.4.9.2.8.4.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.1.0.b.d.3.f.7.-.2.4.5.a.-.4.d.3.9.-.8.0.9.e.-.3.8.7.c.4.0.4.1.a.f.0.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.f.d.3.b.8.6.a.-.1.8.1.f.-.4.6.d.0.-.a.4.9.4.-.e.3.6.1.3.6.e.0.6.5.4.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.G.x.E.y.L.S.w.N.q.M...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.3.8.-.0.0.0.1.-.0.0.1.5.-.0.7.1.d.-.9.7.3.2.c.a.f.a.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.8.5.a.5.8.5.2.7.a.8.d.d.3.1.5.4.c.c.0.9.e.0.b.6.6.3.3.3.7.7.a.0.0.0.0.f.f.f.f.!.0.0.0.0.e.c.8.4.2.f.b.4.e.6.d.1.b.c.8.e.a.3.6.5.e.9.4.d.0.c.4.e.3.8.b.3.0.d.f.4.d.f.1.a.!.G.x.E.y.L.S.w.N.q.M...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.8././.2.9.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Fri Aug 30 10:48:53 2024, 0x1205a4 type
Category:dropped
Size (bytes):141526
Entropy (8bit):1.414038418325309
Encrypted:false
SSDEEP:384:Xsae4ik0PBr120KL6O6imgPs8PTJ8BThb/H:Xs+ik0PBBBKOO6iFPJ8B9L
MD5:E6A441E823A1A4387CEEF2A8593F34A4
SHA1:CB74B205F31474C4457AD7609AD1C6ACA1A27B0C
SHA-256:6BE9EE325E7C77F336AF6C0EC5A7115E545A320F98C72CB1DFD6A18B80E87DB7
SHA-512:8A33982494ABA2C0E00C1222937FBF812CA80437741E7F4C769FDDAA4D331264A4131F9A5BE932A5F0D2CD1461910F8B0E0BCCA9DC2A3C6D644DD1025AEDE122
Malicious:false
Reputation:low
Preview:MDMP..a..... ..........f.........................................P..........T.......8...........T............+..........................................................................................................eJ......$.......Lw......................T.......8......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8764
Entropy (8bit):3.7101891102061533
Encrypted:false
SSDEEP:192:R6l79RJN4Q6YwbKclz/gmfGvlprO89bmIkf2qfim:R6lXJCQ6Y8KcpgmfGvPmjf2qb
MD5:86034773D15070FDC5C4B89832565F24
SHA1:E97E0D83560CADADA8D659A97FB87A139CFDE1D3
SHA-256:A1C66E9F3669D0C162A3FDD8712DA1D636508608ED8B38CBF235F9E12A5B5CD3
SHA-512:C1E7CDEEE837CA76A58FA3413095F7A98EB6439D352A3CAD618F37F8CC25E837A89DABAEE08DDDC57619475643573C951BE8C033CD519700436DCF6BC176B1C1
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...3.4.4.8...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.3.4.4.8.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.9.9.2.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4680
Entropy (8bit):4.517466705009649
Encrypted:false
SSDEEP:48:cvIwr7SGl8zsYDJgkZ71I9DIWpW8VYY6oYm8M4JiTcFdyq85rTh3JfShdd:uIafYdh7Yh7VMJD0JfShdd
MD5:17EAF524B780364131A75DC6CC9B5452
SHA1:D7FA017C05E130DACA36AC619FFCEF96088FDED7
SHA-256:76927B1DBCB55DEDC43E50FB1062B026EE2F643F24C1CDADE515CC9274F69A96
SHA-512:D67E3670F0EC7DF2E864BAD169A323FDA089F41A36CCCA4E80CD82BFEA7644607398A1BCC7D2BE8059F6F0AF48D1889D3AEB14DD1F47479D30664A1EB650571E
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="3448" />.. <arg nm="verqfe" val="3448" />.. <arg nm="csdbld" val="3448" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222821981" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.327321990144959
Encrypted:false
SSDEEP:6144:VRJufhX4RxLT+ydH4A0WBIIQfTa765q/E5ySvL+ML61FhcRo5d5OWiBeG:XJ93BIdBvL+SqcIdYFP
MD5:A8AD2F88DBA305EDF0D51EF43D408E99
SHA1:2DCAB998CE0B94393CF96B065395673251488287
SHA-256:D8F828B58B51FD1F47E8B5970CE8E933BBBD87E8EA7137768037BEFA8EC198AD
SHA-512:F9080255CE3051B89511D3F4E02F005433F6DFA0C5DA7AC8245FE1D87A4E94669EB9D53132FCD2AC03AACE216CC4C858349DC44DE4CCE25F84DD5D2F192227D4
Malicious:false
Reputation:low
Preview:regfO...O....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.?T4..................................................................................................................................................................................................................................................................................................................................................A.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):5.256975847080186
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:GxEyLSwNqM.exe
File size:15'360 bytes
MD5:2d2bcbb224240fbad170f45226365cd2
SHA1:ec842fb4e6d1bc8ea365e94d0c4e38b30df4df1a
SHA256:7403e694ab8b96b57f3cac3b0e66ddad81c4745e986d4974d9d0601765d44fe8
SHA512:d243eadf8aa99c080e45183a7f35a2f0540d3135c73b30a71511e688ec35e9f250e1e0f7b4de3712039e1dc08a659da4af9047f3be9758f56f5cd84cb79727ef
SSDEEP:192:QtuUtk2QNN8H5ieAHwgUEZRHOeSrlQes3Q5tfcri:QtrfQNNnDHwg8eEQes3
TLSH:90625D4AF76239FAC536C23A8AB22525AC757E424336C2DF577449380F776C0342A74D
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........M...#...#...#.......#..."...#...&...#...'...#... ...#.n."...#..."...#.e.*...#.e.....#.e.!...#.Rich..#........................
Icon Hash:90cececece8e8eb0
Entrypoint:0x140001bb0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x66D1004D [Thu Aug 29 23:12:13 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:6c3fb4f7aa279b02cca9ac579678671d
Instruction
dec eax
sub esp, 28h
call 00007F008D364BFCh
dec eax
add esp, 28h
jmp 00007F008D364697h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [0000148Bh]
dec eax
mov ecx, ebx
call dword ptr [0000148Ah]
call dword ptr [00001474h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00001458h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [0000143Ch]
test eax, eax
je 00007F008D364829h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [000034C2h]
call 00007F008D3648CEh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [000035A9h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00003539h], eax
dec eax
mov eax, dword ptr [00003592h]
dec eax
mov dword ptr [00003403h], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [00003507h], eax
mov dword ptr [000033DDh], C0000409h
mov dword ptr [000033D7h], 00000001h
mov dword ptr [000033E1h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3f2c0xc8.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x1f8.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x39500x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x38100x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x228.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x169c0x1800085d3ae3ae3dd8b6e3d4b52c12fe9a9fFalse0.6202799479166666data5.925929956842581IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x17a00x1800ad31a6d5cd5e667a474e4b465bd8b81dFalse0.3860677083333333data4.590897860352058IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x50000x6480x2001c3b8ea3c34144e7a14bd945b131a256False0.091796875data0.44440530617738494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x60000x1f80x200a27180f9289d0a648fd4a1816d361a24False0.556640625PEX Binary Archive3.8112609871855097IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x70000x1e00x2000b35de07beeb30d1d6013cbca2846303False0.525390625data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x80000x300x200a2e8a3700b1d7d1f7408b448f0d9f621False0.12109375data0.6947629390682608IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x70600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllHeapCreate, VirtualProtect, VirtualAlloc, GetModuleHandleA, GetLastError, CloseHandle, K32GetModuleInformation, HeapAlloc, GetProcAddress, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, GetModuleHandleW, IsDebuggerPresent, QueryPerformanceCounter
WININET.dllInternetOpenUrlA, InternetOpenW, InternetReadFile
VCRUNTIME140.dllmemset, __current_exception_context, __C_specific_handler, __current_exception, memcpy
api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __stdio_common_vfprintf, __p__commode, _set_fmode
api-ms-win-crt-string-l1-1-0.dllstrcmp, _wcsnicmp
api-ms-win-crt-heap-l1-1-0.dllmalloc, _set_new_mode
api-ms-win-crt-runtime-l1-1-0.dll__p___argc, _register_onexit_function, _crt_atexit, _register_thread_local_exe_atexit_callback, terminate, _exit, _seh_filter_exe, _c_exit, _initterm_e, _cexit, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, __p___argv, _initialize_onexit_table, _set_app_type, exit
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 30, 2024 12:48:51.546116114 CEST497098888192.168.2.3120.46.149.112
Aug 30, 2024 12:48:51.551107883 CEST888849709120.46.149.112192.168.2.3
Aug 30, 2024 12:48:51.551232100 CEST497098888192.168.2.3120.46.149.112
Aug 30, 2024 12:48:51.551337957 CEST497098888192.168.2.3120.46.149.112
Aug 30, 2024 12:48:51.556771040 CEST888849709120.46.149.112192.168.2.3
Aug 30, 2024 12:48:53.627948999 CEST888849709120.46.149.112192.168.2.3
Aug 30, 2024 12:48:53.628031969 CEST497098888192.168.2.3120.46.149.112
Aug 30, 2024 12:48:53.628148079 CEST497098888192.168.2.3120.46.149.112
Aug 30, 2024 12:48:53.635564089 CEST888849709120.46.149.112192.168.2.3
  • 120.46.149.112:8888
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.349709120.46.149.11288887992C:\Users\user\Desktop\GxEyLSwNqM.exe
TimestampBytes transferredDirectionData
Aug 30, 2024 12:48:51.551337957 CEST96OUTGET /safekey HTTP/1.1
User-Agent: myapp
Host: 120.46.149.112:8888
Cache-Control: no-cache


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:48:49
Start date:30/08/2024
Path:C:\Users\user\Desktop\GxEyLSwNqM.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\GxEyLSwNqM.exe"
Imagebase:0x7ff7df590000
File size:15'360 bytes
MD5 hash:2D2BCBB224240FBAD170F45226365CD2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:5
Start time:06:48:52
Start date:30/08/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7992 -s 1096
Imagebase:0x7ff74c730000
File size:576'896 bytes
MD5 hash:59550DE0393B1CDD584A1467D6D734E7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:42.9%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:46%
    Total number of Nodes:139
    Total number of Limit Nodes:5
    execution_graph 586 7ff7df591950 587 7ff7df591960 586->587 599 7ff7df591dc8 587->599 589 7ff7df5920b0 9 API calls 590 7ff7df591a05 589->590 591 7ff7df591984 _RTC_Initialize 597 7ff7df5919e7 591->597 607 7ff7df592050 InitializeSListHead 591->607 597->589 598 7ff7df5919f5 597->598 600 7ff7df591dd9 599->600 604 7ff7df591e0b 599->604 601 7ff7df591e48 600->601 605 7ff7df591dde __scrt_release_startup_lock 600->605 602 7ff7df5920b0 9 API calls 601->602 603 7ff7df591e52 602->603 604->591 605->604 606 7ff7df591dfb _initialize_onexit_table 605->606 606->604 608 7ff7df591bb0 611 7ff7df591f90 608->611 612 7ff7df591fb3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 611->612 613 7ff7df591bb9 611->613 612->613 614 7ff7df591b62 615 7ff7df592204 GetModuleHandleW 614->615 616 7ff7df591b69 615->616 617 7ff7df591ba8 _exit 616->617 618 7ff7df591b6d 616->618 460 7ff7df591a34 461 7ff7df591a4d __scrt_initialize_crt 460->461 462 7ff7df591a55 __scrt_acquire_startup_lock 461->462 463 7ff7df591b8b 461->463 465 7ff7df591b95 462->465 470 7ff7df591a73 __scrt_release_startup_lock 462->470 494 7ff7df5920b0 IsProcessorFeaturePresent 463->494 466 7ff7df5920b0 9 API calls 465->466 467 7ff7df591ba0 466->467 469 7ff7df591ba8 _exit 467->469 468 7ff7df591a98 470->468 471 7ff7df591b1e _get_initial_narrow_environment __p___argv __p___argc 470->471 475 7ff7df591b16 _register_thread_local_exe_atexit_callback 470->475 480 7ff7df591740 471->480 475->471 477 7ff7df591b4b 478 7ff7df591b50 _cexit 477->478 479 7ff7df591b55 477->479 478->479 479->468 500 7ff7df591070 480->500 482 7ff7df591761 483 7ff7df59176b malloc 482->483 524 7ff7df5913b0 482->524 485 7ff7df5917c0 483->485 485->485 486 7ff7df591803 InternetOpenW InternetOpenUrlA InternetReadFile 485->486 487 7ff7df591886 486->487 487->487 488 7ff7df5918bf HeapCreate HeapAlloc memcpy 487->488 489 7ff7df5918fc 488->489 568 7ff7df591930 489->568 492 7ff7df592204 GetModuleHandleW 493 7ff7df591b47 492->493 493->467 493->477 495 7ff7df5920d6 494->495 496 7ff7df5920e4 memset RtlCaptureContext RtlLookupFunctionEntry 495->496 497 7ff7df59215a memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 496->497 498 7ff7df59211e RtlVirtualUnwind 496->498 499 7ff7df5921de 497->499 498->497 499->465 577 7ff7df591010 __acrt_iob_func 500->577 502 7ff7df591091 503 7ff7df5910d5 502->503 504 7ff7df5910b0 _wcsnicmp 502->504 505 7ff7df591010 printf 2 API calls 503->505 504->502 512 7ff7df5910f6 504->512 506 7ff7df5910e1 505->506 507 7ff7df591930 8 API calls 506->507 509 7ff7df5910f0 507->509 508 7ff7df5911c8 510 7ff7df591930 8 API calls 508->510 509->482 511 7ff7df59126e 510->511 511->482 512->508 513 7ff7df591010 printf 2 API calls 512->513 514 7ff7df5911fb 513->514 515 7ff7df591010 printf 2 API calls 514->515 516 7ff7df591209 515->516 517 7ff7df591010 printf 2 API calls 516->517 518 7ff7df591217 517->518 519 7ff7df591010 printf 2 API calls 518->519 520 7ff7df591225 VirtualAlloc 519->520 521 7ff7df591274 VirtualProtect 520->521 522 7ff7df591244 520->522 521->508 523 7ff7df591010 printf 2 API calls 522->523 523->508 525 7ff7df591010 printf 2 API calls 524->525 526 7ff7df5913da GetModuleHandleA 525->526 527 7ff7df5913ef GetLastError 526->527 528 7ff7df59140a GetProcAddress 526->528 529 7ff7df591010 printf 2 API calls 527->529 530 7ff7df591403 528->530 534 7ff7df59143a 528->534 529->530 531 7ff7df591930 8 API calls 530->531 532 7ff7df59172c 531->532 532->483 533 7ff7df591482 536 7ff7df591010 printf 2 API calls 533->536 534->533 535 7ff7df591010 printf 2 API calls 534->535 537 7ff7df59149b 535->537 538 7ff7df5914ef CloseHandle 536->538 537->533 539 7ff7df591500 537->539 538->530 540 7ff7df591010 printf 2 API calls 539->540 541 7ff7df591510 K32GetModuleInformation 540->541 542 7ff7df591551 541->542 543 7ff7df591536 GetLastError 541->543 545 7ff7df591010 printf 2 API calls 542->545 544 7ff7df591010 printf 2 API calls 543->544 544->530 549 7ff7df59157c 545->549 546 7ff7df5916b2 GetProcAddress NtUnmapViewOfSection 547 7ff7df5916d3 546->547 548 7ff7df5916e5 CloseHandle 546->548 550 7ff7df591010 printf 2 API calls 547->550 551 7ff7df591010 printf 2 API calls 548->551 549->546 552 7ff7df591663 549->552 553 7ff7df591010 printf 2 API calls 549->553 550->530 551->530 552->546 554 7ff7df5915ea 553->554 555 7ff7df591010 printf 2 API calls 554->555 556 7ff7df5915f9 555->556 557 7ff7df591010 printf 2 API calls 556->557 558 7ff7df591607 557->558 559 7ff7df591618 NtProtectVirtualMemory 558->559 560 7ff7df591640 559->560 561 7ff7df591665 559->561 562 7ff7df591010 printf 2 API calls 560->562 563 7ff7df591673 NtProtectVirtualMemory 561->563 562->530 564 7ff7df5916a6 563->564 565 7ff7df591696 563->565 567 7ff7df591010 printf 2 API calls 564->567 566 7ff7df591010 printf 2 API calls 565->566 566->530 567->546 570 7ff7df591939 568->570 569 7ff7df59190b 569->492 570->569 571 7ff7df591bf8 IsProcessorFeaturePresent 570->571 572 7ff7df591c10 571->572 581 7ff7df591ccc RtlCaptureContext 572->581 580 7ff7df591000 577->580 579 7ff7df591046 __stdio_common_vfprintf 579->502 580->579 582 7ff7df591ce6 RtlLookupFunctionEntry 581->582 583 7ff7df591c23 582->583 584 7ff7df591cfc RtlVirtualUnwind 582->584 585 7ff7df591bc4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 583->585 584->582 584->583 619 7ff7df592666 _seh_filter_exe 620 7ff7df591a18 624 7ff7df592258 SetUnhandledExceptionFilter 620->624

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF7DF592300 1 Function_00007FF7DF591300 2 Function_00007FF7DF591000 3 Function_00007FF7DF592204 4 Function_00007FF7DF592684 5 Function_00007FF7DF591F78 31 Function_00007FF7DF591F3C 5->31 6 Function_00007FF7DF591D7C 11 Function_00007FF7DF592060 6->11 30 Function_00007FF7DF59233C 6->30 7 Function_00007FF7DF591010 7->2 8 Function_00007FF7DF591F90 9 Function_00007FF7DF591F10 9->11 10 Function_00007FF7DF59208C 12 Function_00007FF7DF591B62 12->3 13 Function_00007FF7DF592064 14 Function_00007FF7DF591EE5 15 Function_00007FF7DF592666 16 Function_00007FF7DF592258 17 Function_00007FF7DF592070 17->2 21 Function_00007FF7DF592068 17->21 18 Function_00007FF7DF591070 18->7 46 Function_00007FF7DF591930 18->46 19 Function_0000020FB2EE0008 20 Function_00007FF7DF592268 22 Function_00007FF7DF5924E8 23 Function_00007FF7DF591EEC 23->22 24 Function_00007FF7DF591740 24->18 43 Function_00007FF7DF5913B0 24->43 24->46 25 Function_00007FF7DF592040 26 Function_00007FF7DF591D40 26->22 27 Function_00007FF7DF591BC4 28 Function_00007FF7DF5922C4 29 Function_00007FF7DF5925C4 32 Function_00007FF7DF59203C 33 Function_00007FF7DF592050 34 Function_00007FF7DF591950 34->5 34->10 34->11 34->13 34->17 34->25 34->28 34->32 34->33 36 Function_00007FF7DF592048 34->36 37 Function_00007FF7DF591DC8 34->37 44 Function_00007FF7DF5920B0 34->44 35 Function_00007FF7DF591E54 37->22 37->44 38 Function_00007FF7DF591CCC 39 Function_00007FF7DF5920A0 40 Function_00007FF7DF5925A4 40->29 41 Function_00007FF7DF591A18 41->16 41->32 42 Function_00007FF7DF592098 43->1 43->7 43->46 48 Function_00007FF7DF5920A8 44->48 45 Function_00007FF7DF591BB0 45->8 46->27 46->38 47 Function_00007FF7DF591A34 47->3 47->6 47->9 47->23 47->24 47->26 47->35 47->39 47->42 47->44

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff7df5913b0-7ff7df5913ed call 7ff7df591010 GetModuleHandleA 3 7ff7df5913ef-7ff7df591405 GetLastError call 7ff7df591010 0->3 4 7ff7df59140a-7ff7df591434 GetProcAddress 0->4 10 7ff7df591720-7ff7df591736 call 7ff7df591930 3->10 6 7ff7df59154a-7ff7df59154c 4->6 7 7ff7df59143a-7ff7df591480 4->7 9 7ff7df591718 6->9 15 7ff7df591482-7ff7df591489 7->15 16 7ff7df59148b-7ff7df5914e1 call 7ff7df591010 7->16 9->10 17 7ff7df5914ea-7ff7df5914fb call 7ff7df591010 CloseHandle 15->17 23 7ff7df591500-7ff7df591534 call 7ff7df591010 K32GetModuleInformation 16->23 24 7ff7df5914e3 16->24 17->9 27 7ff7df591551-7ff7df59158e call 7ff7df591010 23->27 28 7ff7df591536-7ff7df591545 GetLastError call 7ff7df591010 23->28 24->17 32 7ff7df5916b2-7ff7df5916d1 GetProcAddress NtUnmapViewOfSection 27->32 33 7ff7df591594-7ff7df5915a6 27->33 28->6 35 7ff7df5916d3-7ff7df5916e3 call 7ff7df591010 32->35 36 7ff7df5916e5-7ff7df5916f6 CloseHandle call 7ff7df591010 32->36 34 7ff7df5915b0 33->34 37 7ff7df5915b3-7ff7df5915bf 34->37 45 7ff7df591700-7ff7df591710 35->45 43 7ff7df5916fb 36->43 40 7ff7df591653-7ff7df59165d 37->40 41 7ff7df5915c5-7ff7df5915c9 37->41 40->34 44 7ff7df591663 40->44 41->37 46 7ff7df5915cb-7ff7df59163e call 7ff7df591010 * 3 call 7ff7df591300 NtProtectVirtualMemory 41->46 43->45 44->32 45->9 55 7ff7df591640-7ff7df59164e call 7ff7df591010 46->55 56 7ff7df591665-7ff7df591694 call 7ff7df59261f NtProtectVirtualMemory 46->56 55->45 61 7ff7df5916a6-7ff7df5916ad call 7ff7df591010 56->61 62 7ff7df591696-7ff7df5916a4 call 7ff7df591010 56->62 61->32 62->45
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1418597883.00007FF7DF591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DF590000, based on PE: true
    • Associated: 00000000.00000002.1418582197.00007FF7DF590000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418615351.00007FF7DF593000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418686713.00007FF7DF596000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7df590000_GxEyLSwNqM.jbxd
    Similarity
    • API ID: printf$Handle$AddressCloseErrorLastModuleProc__acrt_iob_func__stdio_common_vfprintf
    • String ID: [+] NTDLL is cleaned. Closing handles...$.text$NtUnmapViewOfSection$RtlInitUnicodeString$[*] Clean NTDLL .TEXT Section VA...........: 0x%p$[*] Clean NTDLL Base Address...............: 0x%p$[*] Clean Section Handle Address...........: 0x%p$[*] Hooked NTDLL .TEXT Section VA..........: 0x%p$[*] Hooked NTDLL Base Address..............: 0x%p$[*] Size of .TEXT Section..................: %zd$[*] Using Technique-2, Reads NTDLL From KnownDlls and Clean.$[+] All done.$[-] GetModuleHandleA error: %d$[-] GetModuleInformation error: %d$[-] NtMapViewOfSection error.$[-] NtOpenSection error.$[-] NtProtectVirtualMemory - 1: Error.$[-] NtProtectVirtualMemory - 2: Error.$[-] NtUnmapViewOfSection error: %X$\KnownDlls\ntdll.dll$ntdll.dll
    • API String ID: 3667996920-1111665865
    • Opcode ID: 17433d8e5b18d352697a7b495b8225d878b9aa8bba58b30be5a7a49aa5fbee4b
    • Instruction ID: ebfbae909a98a4a4efd97622ff7a9f9dc50dc8a960bebb1595e88d6a68d60adf
    • Opcode Fuzzy Hash: 17433d8e5b18d352697a7b495b8225d878b9aa8bba58b30be5a7a49aa5fbee4b
    • Instruction Fuzzy Hash: 09A17121B08ADA95EB14EB20E8402FDA764EF48788FC04637D95F53699EF3CE555C360

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1418597883.00007FF7DF591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DF590000, based on PE: true
    • Associated: 00000000.00000002.1418582197.00007FF7DF590000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418615351.00007FF7DF593000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418686713.00007FF7DF596000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7df590000_GxEyLSwNqM.jbxd
    Similarity
    • API ID: printf$Internet$HeapOpen$AllocCreateErrorFileHandleLastModuleRead_wcsnicmpmallocmemcpy
    • String ID: myapp$qvan
    • API String ID: 3871366772-30057361
    • Opcode ID: ea5788ac8741f9db8325683b7f9a115cd81f8e4bb8d0dc42e7ae88fd5e91e5ff
    • Instruction ID: ef131044fdcf856d00076edc8d815652efa98637e4f4b8b7556fe046e7d1e2d3
    • Opcode Fuzzy Hash: ea5788ac8741f9db8325683b7f9a115cd81f8e4bb8d0dc42e7ae88fd5e91e5ff
    • Instruction Fuzzy Hash: 62411B62A0C6D595EB54AB24E5103BEFBA4FB49B90FC45236DA8F03B65DF2CD184C710

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1418597883.00007FF7DF591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DF590000, based on PE: true
    • Associated: 00000000.00000002.1418582197.00007FF7DF590000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418615351.00007FF7DF593000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418686713.00007FF7DF596000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7df590000_GxEyLSwNqM.jbxd
    Similarity
    • API ID: printf$Virtual$AllocProtect__acrt_iob_func__stdio_common_vfprintf_wcsnicmp
    • String ID: .data$[!] Cannot allocate memory for syscals stubs.$[!] Cannot find NTDLL.$[*] NtCreateSection syscall number.........: %02x$[*] NtMapViewOfSection syscall number......: %02x$[*] NtOpenFile syscall number..............: %02x$[*] NtOpenSection syscall number...........: %02x$[*] Parsing LdrpThunkSignature For Clean Syscalls.$ntdll.dll
    • API String ID: 3446100313-3203066525
    • Opcode ID: c4fb6a64e285f025b2dd7b4954e966771b637f8367b8ac5cfb684afa2db38014
    • Instruction ID: c3834009493511ed007d105ca2551890db203f8d33ae1a6577bb97b66f3e1aed
    • Opcode Fuzzy Hash: c4fb6a64e285f025b2dd7b4954e966771b637f8367b8ac5cfb684afa2db38014
    • Instruction Fuzzy Hash: 9071A231B0869992EB18AB15E5402ADBBA0EB89B94FD44137CA4E437A5DF3DD852C720

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1418597883.00007FF7DF591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DF590000, based on PE: true
    • Associated: 00000000.00000002.1418582197.00007FF7DF590000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418615351.00007FF7DF593000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418686713.00007FF7DF596000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7df590000_GxEyLSwNqM.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 120244420-0
    • Opcode ID: 05778728840da570b37273fd8b88859eec4bde9f80d254427fb08511bcc2c7df
    • Instruction ID: baf703ebd170e849b644901c1e119f24f6132b1b5cb0de7414f281cf45c8f2fa
    • Opcode Fuzzy Hash: 05778728840da570b37273fd8b88859eec4bde9f80d254427fb08511bcc2c7df
    • Instruction Fuzzy Hash: FC313D21A0C1DA92FA1CBB2595653FDA692AF49784FC45037E90F4B2E7DE2CA8458370

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1418597883.00007FF7DF591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DF590000, based on PE: true
    • Associated: 00000000.00000002.1418582197.00007FF7DF590000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418615351.00007FF7DF593000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418686713.00007FF7DF596000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7df590000_GxEyLSwNqM.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 318deca273402c680eef2276bbcd3dc1456a643cb717147b589ec6ee87fdda17
    • Instruction ID: c37f56358786905b8f233735c0c08c24d035c531b7a94602a037ff6b3f4d60c9
    • Opcode Fuzzy Hash: 318deca273402c680eef2276bbcd3dc1456a643cb717147b589ec6ee87fdda17
    • Instruction Fuzzy Hash: D3316F72609AC585EB649F60E8503EDB764FB84748FC4403ADA4F47A88DF3CD648C710
    Memory Dump Source
    • Source File: 00000000.00000002.1418597883.00007FF7DF591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7DF590000, based on PE: true
    • Associated: 00000000.00000002.1418582197.00007FF7DF590000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418615351.00007FF7DF593000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1418686713.00007FF7DF596000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7df590000_GxEyLSwNqM.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: eb274de3c1f8bb1215ec636cc87a6d02b522714a5a38c6da363feac6ae4a8357
    • Instruction ID: fa2ba17adb763515590cdbd5fb43cf0065352d566adf854e0cce8694b9d1e762
    • Opcode Fuzzy Hash: eb274de3c1f8bb1215ec636cc87a6d02b522714a5a38c6da363feac6ae4a8357
    • Instruction Fuzzy Hash: 0FA0022294CC8ED0EA0CAB05E8501B8A734FB50308BC04233C40F414789F3CA494C361