Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RanSomWarek.exe

Overview

General Information

Sample name:RanSomWarek.exe
Analysis ID:1502151
MD5:fb5dab5f2f251b022952afb562d8a7c1
SHA1:b0a83cd10acddf68b95bae578809df662713c1fe
SHA256:175f89c8cce9ddf703f4faf4c4c2500a85c21041cbb383e95e2ea13d6bf28a7a
Tags:exe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • RanSomWarek.exe (PID: 3716 cmdline: "C:\Users\user\Desktop\RanSomWarek.exe" MD5: FB5DAB5F2F251B022952AFB562D8A7C1)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RanSomWarek.exeAvira: detected
Source: RanSomWarek.exeReversingLabs: Detection: 60%
Source: RanSomWarek.exeVirustotal: Detection: 59%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: RanSomWarek.exeJoe Sandbox ML: detected
Source: RanSomWarek.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\RanSomWarek.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]0_2_07484B10
Source: C:\Users\user\Desktop\RanSomWarek.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]0_2_07484B08
Source: C:\Users\user\Desktop\RanSomWarek.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh0_2_07484C15
Source: C:\Users\user\Desktop\RanSomWarek.exeCode function: 4x nop then mov dword ptr [ebp-20h], 7FFFFFFFh0_2_07484C20
Source: unknownDNS traffic detected: query: 171.39.242.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
Source: C:\Users\user\Desktop\RanSomWarek.exeCode function: 0_2_016B94B80_2_016B94B8
Source: C:\Users\user\Desktop\RanSomWarek.exeCode function: 0_2_07481A180_2_07481A18
Source: RanSomWarek.exe, 00000000.00000002.2047829606.000000000117E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs RanSomWarek.exe
Source: RanSomWarek.exe, 00000000.00000000.1996362797.0000000000D5E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRanSomWare.exe6 vs RanSomWarek.exe
Source: RanSomWarek.exeBinary or memory string: OriginalFilenameRanSomWare.exe6 vs RanSomWarek.exe
Source: classification engineClassification label: mal68.evad.winEXE@1/1@1/0
Source: C:\Users\user\Desktop\RanSomWarek.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RanSomWarek.exe.logJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeMutant created: NULL
Source: RanSomWarek.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: RanSomWarek.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\RanSomWarek.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: RanSomWarek.exeReversingLabs: Detection: 60%
Source: RanSomWarek.exeVirustotal: Detection: 59%
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\RanSomWarek.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: RanSomWarek.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: RanSomWarek.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: RanSomWarek.exe, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeMemory allocated: 16B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeMemory allocated: 3000000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeMemory allocated: 5000000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exe TID: 6564Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeQueries volume information: C:\Users\user\Desktop\RanSomWarek.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\RanSomWarek.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Software Packing
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RanSomWarek.exe61%ReversingLabsByteCode-MSIL.Ransomware.CryptoLocker
RanSomWarek.exe59%VirustotalBrowse
RanSomWarek.exe100%AviraTR/Dropper.MSIL.Gen
RanSomWarek.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
171.39.242.20.in-addr.arpa0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
171.39.242.20.in-addr.arpa
unknown
unknownfalseunknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502151
Start date and time:2024-08-31 08:31:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 54s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:RanSomWarek.exe
Detection:MAL
Classification:mal68.evad.winEXE@1/1@1/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 93%
  • Number of executed functions: 21
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\RanSomWarek.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):1119
Entropy (8bit):5.345080863654519
Encrypted:false
SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
MD5:88593431AEF401417595E7A00FE86E5F
SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
Malicious:true
Reputation:moderate, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):6.208848745515054
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
  • Win32 Executable (generic) a (10002005/4) 49.78%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
File name:RanSomWarek.exe
File size:47'616 bytes
MD5:fb5dab5f2f251b022952afb562d8a7c1
SHA1:b0a83cd10acddf68b95bae578809df662713c1fe
SHA256:175f89c8cce9ddf703f4faf4c4c2500a85c21041cbb383e95e2ea13d6bf28a7a
SHA512:9f4e33beef83ba449a2fa9478cf60d709e4ca432b789d799aade7f84870d4c57d25dde39982eebab95ed98befc1a060c9087249dcaee2abf31b2e5aae2cf269a
SSDEEP:768:e0b6jgeRDAuBWGxKEmZ0EFfLcSbJgC2GQkXTJtOjtdb2FxQvZjtPv0FNmGgWX8:nED1pq0MLcSbJgvRk1tiVLxjCXPgWX8
TLSH:57239F4813DD5B37EABC087EC4FB339E4291D06E2686E70EADC4C33B5A517D98422847
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..........".................A.... ........@.. ....................... ............`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x40cf41
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x66CF8319 [Wed Aug 28 20:05:45 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xcef70x4a.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x5ae.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000xaf470xb000312edff7534b516237cf1a4a43eec7a8False0.5849831321022727data6.320680369467725IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0xe0000x5ae0x600def3cd81fc6e0b8e2f458f00aa512b85False0.42578125data4.10797965604595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x100000xc0x2007a2f275c33ff75e0317933e4e47d1bc0False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0xe05c0x32cdata0.4211822660098522
RT_MANIFEST0xe3c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
mscoree.dll_CorExeMain
TimestampSource PortDest PortSource IPDest IP
Aug 31, 2024 08:32:29.548857927 CEST5349519162.159.36.2192.168.2.5
Aug 31, 2024 08:32:30.013742924 CEST5007153192.168.2.51.1.1.1
Aug 31, 2024 08:32:30.046387911 CEST53500711.1.1.1192.168.2.5
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Aug 31, 2024 08:32:30.013742924 CEST192.168.2.51.1.1.10xc68Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Aug 31, 2024 08:32:30.046387911 CEST1.1.1.1192.168.2.50xc68Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:02:31:55
Start date:31/08/2024
Path:C:\Users\user\Desktop\RanSomWarek.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\RanSomWarek.exe"
Imagebase:0xd50000
File size:47'616 bytes
MD5 hash:FB5DAB5F2F251B022952AFB562D8A7C1
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:12.2%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:5.6%
    Total number of Nodes:72
    Total number of Limit Nodes:3
    execution_graph 15020 7482d18 15021 7482d2c 15020->15021 15025 7482e68 15021->15025 15028 7482e58 15021->15028 15022 7482dfe 15026 7482e76 15025->15026 15031 7482ec0 15025->15031 15026->15022 15030 7482ec0 5 API calls 15028->15030 15029 7482e76 15029->15022 15030->15029 15032 7482ee2 15031->15032 15033 7482f37 15032->15033 15036 7483020 15032->15036 15040 7483013 15032->15040 15033->15026 15038 748302f 15036->15038 15037 748309b 15037->15033 15038->15037 15044 748317b 15038->15044 15042 748302f 15040->15042 15041 748309b 15041->15033 15042->15041 15043 748317b 5 API calls 15042->15043 15043->15041 15048 74831a0 15044->15048 15057 7483193 15044->15057 15045 748318a 15045->15037 15049 74831fd 15048->15049 15050 7483248 GetCurrentThreadId 15049->15050 15051 748323b 15049->15051 15054 7483243 15049->15054 15052 7483276 15050->15052 15066 7482304 15051->15066 15052->15054 15070 7484930 15052->15070 15076 7484921 15052->15076 15058 74831fd 15057->15058 15059 7483248 GetCurrentThreadId 15058->15059 15060 748323b 15058->15060 15063 7483243 15058->15063 15061 7483276 15059->15061 15062 7482304 PostThreadMessageW 15060->15062 15061->15063 15064 7484930 2 API calls 15061->15064 15065 7484921 2 API calls 15061->15065 15062->15063 15064->15063 15065->15063 15067 748230f PostThreadMessageW 15066->15067 15069 748350b 15067->15069 15069->15054 15071 748494f 15070->15071 15082 7484a10 15071->15082 15072 7484983 15086 7483ecc 15072->15086 15074 7484992 15074->15054 15077 748494f 15076->15077 15081 7484a10 GetCurrentThreadId 15077->15081 15078 7484983 15079 7483ecc GetCurrentThreadId 15078->15079 15080 7484992 15079->15080 15080->15054 15081->15078 15083 7484a6f GetCurrentThreadId 15082->15083 15085 7484ab5 15083->15085 15085->15072 15087 7483ed7 15086->15087 15088 7484eb4 GetCurrentThreadId 15087->15088 15089 7484edf 15087->15089 15088->15089 15089->15074 15090 7484b10 15091 7484b74 EnumThreadWindows 15090->15091 15092 7484b69 15090->15092 15093 7484bc2 15091->15093 15092->15091 15016 16bf580 15017 16bf5d3 15016->15017 15018 16bf5e5 GetModuleHandleW 15016->15018 15017->15018 15019 16bf624 15018->15019 15094 16bf670 15095 16bf684 15094->15095 15096 16bf6a9 15095->15096 15098 16be918 15095->15098 15099 16bf890 LoadLibraryExW 15098->15099 15101 16bf94c 15099->15101 15101->15096 15102 16b86f0 15103 16b8740 RegOpenKeyExW 15102->15103 15105 16b87ce 15103->15105

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 488 7484b08-7484b67 490 7484b69-7484b71 488->490 491 7484b74-7484bc0 EnumThreadWindows 488->491 490->491 492 7484bc9-7484c09 491->492 493 7484bc2-7484bc8 491->493 493->492
    APIs
    • EnumThreadWindows.USER32(?,?,?), ref: 07484BB0
    Memory Dump Source
    • Source File: 00000000.00000002.2049618604.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7480000_RanSomWarek.jbxd
    Similarity
    • API ID: EnumThreadWindows
    • String ID:
    • API String ID: 2941952884-0
    • Opcode ID: 52ec9be1ae8282c75db7daed93a56530184110457001ef9243a92f8ad3da32a5
    • Instruction ID: 9cc5d1e8397e94aa19a5156e693e7f7ab2b6d86bf03b6ae074e90ac3f403b5d4
    • Opcode Fuzzy Hash: 52ec9be1ae8282c75db7daed93a56530184110457001ef9243a92f8ad3da32a5
    • Instruction Fuzzy Hash: 9131ABB5C012599FCB10DFA9D984AEEFBF1BB49310F24942AE418B7350D374AA45CFA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 498 7484b10-7484b67 499 7484b69-7484b71 498->499 500 7484b74-7484bc0 EnumThreadWindows 498->500 499->500 501 7484bc9-7484c09 500->501 502 7484bc2-7484bc8 500->502 502->501
    APIs
    • EnumThreadWindows.USER32(?,?,?), ref: 07484BB0
    Memory Dump Source
    • Source File: 00000000.00000002.2049618604.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7480000_RanSomWarek.jbxd
    Similarity
    • API ID: EnumThreadWindows
    • String ID:
    • API String ID: 2941952884-0
    • Opcode ID: 25b7021e67d38003378001af297aa9765a7f8aa57017d42fc36e4cc09f6b6825
    • Instruction ID: bf6e0e7c7d11e59f3be9680d12a3fa5795bfc216634c453c384d75c340871464
    • Opcode Fuzzy Hash: 25b7021e67d38003378001af297aa9765a7f8aa57017d42fc36e4cc09f6b6825
    • Instruction Fuzzy Hash: 8231BDB4C012599FCB10DFA9D984AEEFBF1BB49310F14942AE414B7310C334AA45CF54
    Memory Dump Source
    • Source File: 00000000.00000002.2049618604.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7480000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b129150105195a1c0e2e4b8e15dfbd99f8b9fafcd9f7c58a27c92ab634945939
    • Instruction ID: a1bb7b97348ba4490dc76d6e446552e80850cc1e71c01a67ded59fd0af035d87
    • Opcode Fuzzy Hash: b129150105195a1c0e2e4b8e15dfbd99f8b9fafcd9f7c58a27c92ab634945939
    • Instruction Fuzzy Hash: 57D18CB17016098FDB59EB69C8607AF77EBAF89700F14486ED146CB390DB35E842C751
    Memory Dump Source
    • Source File: 00000000.00000002.2048395238.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_16b0000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7f2ef2a652b7a43bf0e5112b6e50efdd10940b9750ea95aebaf5f2794dd50429
    • Instruction ID: 783d08f61109144f63fd96e2e2d5cb5f5f8a6e29a6928744282ff0795463b9b8
    • Opcode Fuzzy Hash: 7f2ef2a652b7a43bf0e5112b6e50efdd10940b9750ea95aebaf5f2794dd50429
    • Instruction Fuzzy Hash: 66B1E574E10209CFCB14EFB4C894ADDB7B2FF99304F608529D5066B364EB75A986CB44

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 416 74831a0-74831fb 417 74831fd 416->417 418 7483202-748321e 416->418 417->418 420 7483411-748343e 418->420 421 7483224-7483239 418->421 430 748343f 420->430 423 7483248-7483274 GetCurrentThreadId 421->423 424 748323b-748323e call 7482304 421->424 425 748327d-7483292 423->425 426 7483276-748327c 423->426 431 7483243 424->431 428 74832ed-7483326 425->428 429 7483294-748329b 425->429 426->425 437 7483328-748332d call 7484fc9 428->437 438 748333b-7483342 428->438 434 748329d 429->434 435 74832a5 429->435 430->430 433 7483409 431->433 433->420 434->435 460 74832a8 call 7484930 435->460 461 74832a8 call 7484921 435->461 442 7483333-7483338 437->442 440 748334a-7483370 438->440 441 7483344 438->441 439 74832ad-74832d4 449 74832ea 439->449 450 74832d6-74832dc 439->450 445 7483372 440->445 446 7483377-74833c0 440->446 441->440 442->438 445->446 456 74833ca-74833cb 446->456 457 74833c2 446->457 449->428 450->449 451 74832de-74832e5 call 7482314 450->451 451->449 456->433 457->456 460->439 461->439
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 07483260
    Memory Dump Source
    • Source File: 00000000.00000002.2049618604.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7480000_RanSomWarek.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID:
    • API String ID: 2882836952-0
    • Opcode ID: 43b28bdb1167300b9e849d415046ce4e617679a9204d991d9ece242795edd553
    • Instruction ID: 07bcad8a457a61d31d28c90374c9fad4f233cdbfce65d2425646762dbc69b9ed
    • Opcode Fuzzy Hash: 43b28bdb1167300b9e849d415046ce4e617679a9204d991d9ece242795edd553
    • Instruction Fuzzy Hash: 536129B0A1020DDFDB54EF99D994BEEBBB1FF48B10F14845AE401AB351CB759885CB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 462 16b86e8-16b8757 465 16b876b-16b87cc RegOpenKeyExW 462->465 466 16b8759-16b8768 462->466 467 16b87ce-16b87d4 465->467 468 16b87d5-16b880b 465->468 466->465 467->468
    APIs
    • RegOpenKeyExW.KERNELBASE(?,?,?,?,?), ref: 016B87BC
    Memory Dump Source
    • Source File: 00000000.00000002.2048395238.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_16b0000_RanSomWarek.jbxd
    Similarity
    • API ID: Open
    • String ID:
    • API String ID: 71445658-0
    • Opcode ID: e38240d91981eeedb1c182cfa4c2ec987eda958e5d89f75384f466e23835702d
    • Instruction ID: 0a69f32f58229dce4e46079c7ee8e8bdf98440faaf2523dcb8f02f4a1f8a4ba5
    • Opcode Fuzzy Hash: e38240d91981eeedb1c182cfa4c2ec987eda958e5d89f75384f466e23835702d
    • Instruction Fuzzy Hash: A74165B9D002589FCB10CFA9D984ADEFBB5BB49314F14902AE918B7320D335A946CF64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 471 16b86f0-16b8757 473 16b876b-16b87cc RegOpenKeyExW 471->473 474 16b8759-16b8768 471->474 475 16b87ce-16b87d4 473->475 476 16b87d5-16b880b 473->476 474->473 475->476
    APIs
    • RegOpenKeyExW.KERNELBASE(?,?,?,?,?), ref: 016B87BC
    Memory Dump Source
    • Source File: 00000000.00000002.2048395238.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_16b0000_RanSomWarek.jbxd
    Similarity
    • API ID: Open
    • String ID:
    • API String ID: 71445658-0
    • Opcode ID: c45fa35b5ebbe9304c547b05c2b9f3948a35038101c78cc4672ae0774ad400fd
    • Instruction ID: 59a1447a5187a5783ac742d4828acbd440c61e0cadc87747f097e175820f4538
    • Opcode Fuzzy Hash: c45fa35b5ebbe9304c547b05c2b9f3948a35038101c78cc4672ae0774ad400fd
    • Instruction Fuzzy Hash: A64165B9D002589FCB10CFA9D984ADEFBB5BB09310F14902AE918B7320D335A946CF64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 479 16be918-16bf8e4 481 16bf8f8-16bf94a LoadLibraryExW 479->481 482 16bf8e6-16bf8f5 479->482 483 16bf94c-16bf952 481->483 484 16bf953-16bf991 481->484 482->481 483->484
    APIs
    • LoadLibraryExW.KERNELBASE(?,?,?), ref: 016BF93A
    Memory Dump Source
    • Source File: 00000000.00000002.2048395238.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_16b0000_RanSomWarek.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 8ae566ecb57a62711009647188817b7a882d5390fc82fb51718e439749bf7585
    • Instruction ID: e14c094b796583cb1c3e3e331ec15213df3a8e19eddff103d15e3adf736a3530
    • Opcode Fuzzy Hash: 8ae566ecb57a62711009647188817b7a882d5390fc82fb51718e439749bf7585
    • Instruction Fuzzy Hash: 2B4179B4D002589FCB10DFA9D884ADEFBF5BB49310F14906AE918B7320D734A986CF54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 507 16bf580-16bf5d1 508 16bf5d3-16bf5e2 507->508 509 16bf5e5-16bf622 GetModuleHandleW 507->509 508->509 510 16bf62b-16bf659 509->510 511 16bf624-16bf62a 509->511 511->510
    APIs
    • GetModuleHandleW.KERNELBASE(?), ref: 016BF612
    Memory Dump Source
    • Source File: 00000000.00000002.2048395238.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_16b0000_RanSomWarek.jbxd
    Similarity
    • API ID: HandleModule
    • String ID:
    • API String ID: 4139908857-0
    • Opcode ID: b12829a5c0ff684d1ae0bca2b1decad096a60c4589abf45e1cc02964edd7915a
    • Instruction ID: df4c4f078c95ee9340fe693a8204070f0379a962cc560e3f7c239bfea28e7d3f
    • Opcode Fuzzy Hash: b12829a5c0ff684d1ae0bca2b1decad096a60c4589abf45e1cc02964edd7915a
    • Instruction Fuzzy Hash: FD318AB4D002599FCB14CFAAD984ADEFBF5BB49310F14906AE918B7320D335A945CFA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 514 7484a10-7484ab3 GetCurrentThreadId 518 7484abc-7484aeb call 7483f1c 514->518 519 7484ab5-7484abb 514->519 523 7484af0-7484afd 518->523 519->518
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 07484AA2
    Memory Dump Source
    • Source File: 00000000.00000002.2049618604.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7480000_RanSomWarek.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID:
    • API String ID: 2882836952-0
    • Opcode ID: 6813e66479176efdb15efb586822acb95effdcae0e1a62403e3b14a9fc87cf11
    • Instruction ID: d40e1c57029b044701929c14a547aec1ee2ff4a0240c92001df1f8818a14a0a5
    • Opcode Fuzzy Hash: 6813e66479176efdb15efb586822acb95effdcae0e1a62403e3b14a9fc87cf11
    • Instruction Fuzzy Hash: 2B3143B490024A8FCB10EF99E844BDEBBF5FF48314F14856AD458AB321C778A944CFA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 524 7482304-7483509 PostThreadMessageW 527 748350b-7483511 524->527 528 7483512-748352d 524->528 527->528
    APIs
    • PostThreadMessageW.USER32(?,00000012,00000000,00000000), ref: 074834F8
    Memory Dump Source
    • Source File: 00000000.00000002.2049618604.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7480000_RanSomWarek.jbxd
    Similarity
    • API ID: MessagePostThread
    • String ID:
    • API String ID: 1836367815-0
    • Opcode ID: 1512c8534f52cf4107ef97d6d5c37f45939b070c5ca672300740e5fd01b78042
    • Instruction ID: fe6573184324f779f43e98fb1b07c2f310f37160e0805cbe18b489629b10c0f1
    • Opcode Fuzzy Hash: 1512c8534f52cf4107ef97d6d5c37f45939b070c5ca672300740e5fd01b78042
    • Instruction Fuzzy Hash: E81125B08003499EDB20DF99D84ABEEBFF4FB08724F10880AE559A7240C3796944CFA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 530 7483490-7483509 PostThreadMessageW 532 748350b-7483511 530->532 533 7483512-748352d 530->533 532->533
    APIs
    • PostThreadMessageW.USER32(?,00000012,00000000,00000000), ref: 074834F8
    Memory Dump Source
    • Source File: 00000000.00000002.2049618604.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7480000_RanSomWarek.jbxd
    Similarity
    • API ID: MessagePostThread
    • String ID:
    • API String ID: 1836367815-0
    • Opcode ID: 060c6eb24c762674970155718e6cbaad10cfd11a4defadf30b2269fd95874da4
    • Instruction ID: ff3836e57c2fe91437b731c0aa3d697fe5a80101d21144d78f4e6c436cfd4309
    • Opcode Fuzzy Hash: 060c6eb24c762674970155718e6cbaad10cfd11a4defadf30b2269fd95874da4
    • Instruction Fuzzy Hash: D51136B18003499FDB20DF99D84ABDEBFF4FB08710F10880AE558A7250C3796544CFA1
    Memory Dump Source
    • Source File: 00000000.00000002.2048914432.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5580000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2fb542774f2048b17a8cabeb05db08548c18e9e000019d71cc64d14c52f3f29f
    • Instruction ID: e1bbddd8bdc65fba32b28c0ff14d1037fc693ca1039e2ec2d1b6e6d8d7c6c355
    • Opcode Fuzzy Hash: 2fb542774f2048b17a8cabeb05db08548c18e9e000019d71cc64d14c52f3f29f
    • Instruction Fuzzy Hash: 5D918E7054A3859FC7179BB8CC69BA93FB4AF03315F1941CAE184DB2E3C6755808C762
    Memory Dump Source
    • Source File: 00000000.00000002.2048232855.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_165d000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 78ba6713f8a0dfc5a3346b60635fa3e78640a077f6fe89c215fc124dc7acbcab
    • Instruction ID: 6089616bfd80606b62bfc599da32b9989959cca1ff3cbda782674909f443da76
    • Opcode Fuzzy Hash: 78ba6713f8a0dfc5a3346b60635fa3e78640a077f6fe89c215fc124dc7acbcab
    • Instruction Fuzzy Hash: 67210371500204DFDB45DF98D9C0F66BF65FB88314F20C569ED090B396C33AE456C6A2
    Memory Dump Source
    • Source File: 00000000.00000002.2048263993.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_166d000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c0a6ef56c387e559436855eefc09756878a57a94e689cf82d7efb4185899721f
    • Instruction ID: 8d8574d89f677b1a55d52cb2f2fe958f2a1de4b65420b278d71fd55b7f605104
    • Opcode Fuzzy Hash: c0a6ef56c387e559436855eefc09756878a57a94e689cf82d7efb4185899721f
    • Instruction Fuzzy Hash: 83210771604244EFDB05DF98D9C0F26BB6DFB88324F24C56DDA894B356C33AD446CA61
    Memory Dump Source
    • Source File: 00000000.00000002.2048263993.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_166d000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9182b2246f679b40b2067bcb3bab9e25a42aa480e904123acd459970ea77d5b3
    • Instruction ID: d06e57f2866a0aa2d76d4fbd0415cf77ad3060f87a7c7b667203ba2b0f6477af
    • Opcode Fuzzy Hash: 9182b2246f679b40b2067bcb3bab9e25a42aa480e904123acd459970ea77d5b3
    • Instruction Fuzzy Hash: 67210071604240DFCB15DF68D980B26BF69EB88314F20C569E98A0B396C33AD807CAA1
    Memory Dump Source
    • Source File: 00000000.00000002.2048232855.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_165d000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
    • Instruction ID: b4f587af941219bd4d2c5677b523d74e7977fa2fec453ccc7db42dd52500ba5c
    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
    • Instruction Fuzzy Hash: 8D11DF72404240CFDB12CF54D9C4B56BF62FB84324F24C6A9DD090B257C336E45ACBA2
    Memory Dump Source
    • Source File: 00000000.00000002.2048263993.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_166d000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
    • Instruction ID: 4a18bad06dab31834f0b2a709523a986c0f4abbfec88d75a091562f93fd71995
    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
    • Instruction Fuzzy Hash: 5311BE75604280CFDB12CF54D9C4B15BF61FB88314F24C6A9D8494B756C33AD40ACB62
    Memory Dump Source
    • Source File: 00000000.00000002.2048263993.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_166d000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
    • Instruction ID: 6d55090885b2d97be89ccfd147ac792faee67341dcd647cfe0e7d6d4ecc59702
    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
    • Instruction Fuzzy Hash: DA11BB75604280DFDB12CF54C9C4B15BFA5FB84224F28C6A9D9894B396C33AD44ACB62
    Memory Dump Source
    • Source File: 00000000.00000002.2048914432.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5580000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f0a8803dad93b4742e88e5cca9e9043eab1124196ef575f21a10caa85dbca4da
    • Instruction ID: 8a58ee4740e430a935877ba2bcc771befa112152d818e56bb3c30a35df42f8e6
    • Opcode Fuzzy Hash: f0a8803dad93b4742e88e5cca9e9043eab1124196ef575f21a10caa85dbca4da
    • Instruction Fuzzy Hash: D90148A184E3C14FC7138B788C696943FB09E13121B1E42DBD4D5CF2E3E629890AC7A3
    Memory Dump Source
    • Source File: 00000000.00000002.2048914432.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_5580000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 61600f84f475a495ed4e513d255d0a4e209b7765ec23515477b0e6e23313dd7a
    • Instruction ID: 3789faf251400b29b9228d23211a4fb41cebac20244abd7c53f7208fe5552e9f
    • Opcode Fuzzy Hash: 61600f84f475a495ed4e513d255d0a4e209b7765ec23515477b0e6e23313dd7a
    • Instruction Fuzzy Hash: 12E0EC70D11209DFC744EFB8E84979CBBB4BB04211F6042A9E91592391EB305A54DB91
    Memory Dump Source
    • Source File: 00000000.00000002.2049618604.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7480000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ee9e48c9fa3edb529d02ec615a7892cdf9f5efb5a388a4996570d72c4b5c5315
    • Instruction ID: 9eb027d9feb56d5f1e184df82bc170a856b75a3d8eb050c982f7fead9a3a1b37
    • Opcode Fuzzy Hash: ee9e48c9fa3edb529d02ec615a7892cdf9f5efb5a388a4996570d72c4b5c5315
    • Instruction Fuzzy Hash: A9219DB9D04219DFDB04CFA9D8809DEFBF1BB49320F10A16AE825B7350D73499418F58
    Memory Dump Source
    • Source File: 00000000.00000002.2049618604.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7480000_RanSomWarek.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 25a605aaa7cb7eaaee40427fac326104a22cb0d452142711df7f588f3f19b487
    • Instruction ID: 99bfe45ff16f1a938f5527d1ec773c373b01491510d1c0ec876b722e88e2ade5
    • Opcode Fuzzy Hash: 25a605aaa7cb7eaaee40427fac326104a22cb0d452142711df7f588f3f19b487
    • Instruction Fuzzy Hash: BD216BB8D04219DFCB04DFA9D8849DEFBF1BB49320F10A16AE815B7360D73499418F58