Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uA71eQl1nA.exe

Overview

General Information

Sample name:uA71eQl1nA.exe
renamed because original name is a hash value
Original sample name:f65bf4180cc2a75e1897ef3675b1ddeb72e04dd884ff7a8566cc7104b6c26e2a.exe
Analysis ID:1502169
MD5:196c296463a4e3596f031f9bf492665f
SHA1:6945abc3f4670ae001b22fd59670e3336ef77b62
SHA256:f65bf4180cc2a75e1897ef3675b1ddeb72e04dd884ff7a8566cc7104b6c26e2a
Tags:119-45-147-28exe
Infos:

Detection

CobaltStrike, Metasploit
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected Metasploit Payload
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected potential crypto function
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • uA71eQl1nA.exe (PID: 572 cmdline: "C:\Users\user\Desktop\uA71eQl1nA.exe" MD5: 196C296463A4E3596F031F9BF492665F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://119.45.147.28:443/jquery-3.3.2.slim.min.js", "User Agent": "User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.130 Safari/537.36\r\n"}
{"Headers": "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: http://code.jquery.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.130 Safari/537.36\r\n", "Type": "Metasploit Download", "URL": "http://119.45.147.28/jquery-3.3.2.slim.min.js"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x11:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x7d:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        Click to see the 3 entries
        No Sigma rule has matched
        Timestamp:2024-08-31T11:46:40.736140+0200
        SID:2028765
        Severity:3
        Source Port:49711
        Destination Port:443
        Protocol:TCP
        Classtype:Unknown Traffic
        Timestamp:2024-08-31T11:47:44.891842+0200
        SID:2028765
        Severity:3
        Source Port:49723
        Destination Port:443
        Protocol:TCP
        Classtype:Unknown Traffic
        Timestamp:2024-08-31T11:45:59.094447+0200
        SID:2028765
        Severity:3
        Source Port:49726
        Destination Port:443
        Protocol:TCP
        Classtype:Unknown Traffic
        Timestamp:2024-08-31T11:47:12.829049+0200
        SID:2028765
        Severity:3
        Source Port:49719
        Destination Port:443
        Protocol:TCP
        Classtype:Unknown Traffic

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://119.45.147.28:443/jquery-3.3.2.slim.min.js", "User Agent": "User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.130 Safari/537.36\r\n"}
        Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: http://code.jquery.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.130 Safari/537.36\r\n", "Type": "Metasploit Download", "URL": "http://119.45.147.28/jquery-3.3.2.slim.min.js"}
        Source: uA71eQl1nA.exeReversingLabs: Detection: 31%
        Source: uA71eQl1nA.exeVirustotal: Detection: 22%Perma Link
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_08e1c10da83fbc83\MSVCR90.dllJump to behavior
        Source: uA71eQl1nA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

        Networking

        barindex
        Source: Malware configuration extractorURLs: http://119.45.147.28:443/jquery-3.3.2.slim.min.js
        Source: Malware configuration extractorURLs: http://119.45.147.28/jquery-3.3.2.slim.min.js
        Source: Joe Sandbox ViewASN Name: CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompa CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompa
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49711 -> 119.45.147.28:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49719 -> 119.45.147.28:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49723 -> 119.45.147.28:443
        Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49726 -> 119.45.147.28:443
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
        Source: uA71eQl1nA.exe, 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000C2F000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/
        Source: uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000003.2802840791.0000000000C64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/
        Source: uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/8
        Source: uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000003.2802840791.0000000000C64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/jquery-3.3.2.slim.min.js
        Source: uA71eQl1nA.exe, 00000000.00000003.3123468056.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000003.2802840791.0000000000C64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/jquery-3.3.2.slim.min.js#
        Source: uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/jquery-3.3.2.slim.min.js3fovzTE
        Source: uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/jquery-3.3.2.slim.min.jsYvdTA
        Source: uA71eQl1nA.exe, 00000000.00000003.3123468056.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000003.2802840791.0000000000C64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/jquery-3.3.2.slim.min.jss
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
        Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

        System Summary

        barindex
        Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeCode function: 0_2_0275010C0_2_0275010C
        Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: classification engineClassification label: mal84.troj.winEXE@1/0@0/1
        Source: uA71eQl1nA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: uA71eQl1nA.exeReversingLabs: Detection: 31%
        Source: uA71eQl1nA.exeVirustotal: Detection: 22%
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeFile read: C:\Users\user\Desktop\uA71eQl1nA.exeJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: uA71eQl1nA.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_08e1c10da83fbc83\MSVCR90.dllJump to behavior
        Source: uA71eQl1nA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeCode function: 0_2_0275010C push eax; ret 0_2_02750387
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeCode function: 0_2_0275012B push eax; ret 0_2_02750387
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000C50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeCode function: 0_2_00007FF6259612F0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,__crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,__crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00007FF6259612F0
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeCode function: 0_2_00007FF625961820 SetUnhandledExceptionFilter,0_2_00007FF625961820
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeCode function: 0_2_00007FF6259612F0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,__crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,__crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00007FF6259612F0
        Source: C:\Users\user\Desktop\uA71eQl1nA.exeCode function: 0_2_00007FF625961A64 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00007FF625961A64

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        12
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Obfuscated Files or Information
        LSASS Memory11
        Security Software Discovery
        Remote Desktop ProtocolData from Removable Media11
        Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
        System Information Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        uA71eQl1nA.exe32%ReversingLabsWin64.Backdoor.Meterpreter
        uA71eQl1nA.exe23%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://119.45.147.28/80%Avira URL Cloudsafe
        https://119.45.147.28/jquery-3.3.2.slim.min.js3fovzTE0%Avira URL Cloudsafe
        http://119.45.147.28/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
        http://119.45.147.28:443/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
        http://code.jquery.com/0%Avira URL Cloudsafe
        https://119.45.147.28/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
        https://119.45.147.28/0%Avira URL Cloudsafe
        http://119.45.147.28:443/jquery-3.3.2.slim.min.js1%VirustotalBrowse
        https://119.45.147.28/jquery-3.3.2.slim.min.jsYvdTA0%Avira URL Cloudsafe
        https://119.45.147.28/jquery-3.3.2.slim.min.js#0%Avira URL Cloudsafe
        https://119.45.147.28/jquery-3.3.2.slim.min.jss0%Avira URL Cloudsafe
        https://119.45.147.28/jquery-3.3.2.slim.min.js#1%VirustotalBrowse
        https://119.45.147.28/jquery-3.3.2.slim.min.jss2%VirustotalBrowse
        https://119.45.147.28/jquery-3.3.2.slim.min.js1%VirustotalBrowse
        http://code.jquery.com/1%VirustotalBrowse
        https://119.45.147.28/2%VirustotalBrowse
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        http://119.45.147.28/jquery-3.3.2.slim.min.jstrue
        • Avira URL Cloud: safe
        unknown
        http://119.45.147.28:443/jquery-3.3.2.slim.min.jstrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://119.45.147.28/8uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://119.45.147.28/jquery-3.3.2.slim.min.js3fovzTEuA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://code.jquery.com/uA71eQl1nA.exe, 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000C2F000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmptrue
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://119.45.147.28/jquery-3.3.2.slim.min.jsuA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000003.2802840791.0000000000C64000.00000004.00000020.00020000.00000000.sdmpfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://119.45.147.28/uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000003.2802840791.0000000000C64000.00000004.00000020.00020000.00000000.sdmpfalse
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://119.45.147.28/jquery-3.3.2.slim.min.jsYvdTAuA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000BDA000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://119.45.147.28/jquery-3.3.2.slim.min.js#uA71eQl1nA.exe, 00000000.00000003.3123468056.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000003.2802840791.0000000000C64000.00000004.00000020.00020000.00000000.sdmpfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://119.45.147.28/jquery-3.3.2.slim.min.jssuA71eQl1nA.exe, 00000000.00000003.3123468056.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000002.3354694858.0000000000C64000.00000004.00000020.00020000.00000000.sdmp, uA71eQl1nA.exe, 00000000.00000003.2802840791.0000000000C64000.00000004.00000020.00020000.00000000.sdmpfalse
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        119.45.147.28
        unknownChina
        45090CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompatrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1502169
        Start date and time:2024-08-31 11:45:11 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 41s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:uA71eQl1nA.exe
        renamed because original name is a hash value
        Original Sample Name:f65bf4180cc2a75e1897ef3675b1ddeb72e04dd884ff7a8566cc7104b6c26e2a.exe
        Detection:MAL
        Classification:mal84.troj.winEXE@1/0@0/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 87%
        • Number of executed functions: 6
        • Number of non-executed functions: 4
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Report size getting too big, too many NtQueryValueKey calls found.
        No simulations
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompalinux_amd64.elfGet hashmaliciousUnknownBrowse
        • 119.29.233.208
        SecuriteInfo.com.Linux.Siggen.9999.28377.24731.elfGet hashmaliciousMiraiBrowse
        • 152.136.47.156
        BjdhvHE9Lu.exeGet hashmaliciousUnknownBrowse
        • 122.51.240.117
        SecuriteInfo.com.Trojan.DownLoader46.48074.21382.27832.exeGet hashmaliciousUnknownBrowse
        • 106.53.77.23
        firmware.m68k.elfGet hashmaliciousUnknownBrowse
        • 140.143.139.193
        KKveTTgaAAsecNNaaaa.sh4.elfGet hashmaliciousUnknownBrowse
        • 146.56.230.81
        KKveTTgaAAsecNNaaaa.spc.elfGet hashmaliciousUnknownBrowse
        • 120.53.107.161
        KKveTTgaAAsecNNaaaa.mpsl.elfGet hashmaliciousUnknownBrowse
        • 118.28.5.155
        kovENvYM9C.elfGet hashmaliciousUnknownBrowse
        • 134.175.132.160
        pzGt29I16y.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        • 111.229.0.18
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (GUI) x86-64, for MS Windows
        Entropy (8bit):3.520458238473574
        TrID:
        • Win64 Executable GUI (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:uA71eQl1nA.exe
        File size:176'544 bytes
        MD5:196c296463a4e3596f031f9bf492665f
        SHA1:6945abc3f4670ae001b22fd59670e3336ef77b62
        SHA256:f65bf4180cc2a75e1897ef3675b1ddeb72e04dd884ff7a8566cc7104b6c26e2a
        SHA512:006ea3974ede4b3d5ad123e4fb178aba8250ade2db86d1936f21ce79f21d748f92a192704871c4ebe47fbdfe34786f720b1a7160616885dc39e36fd237b3647e
        SSDEEP:768:euef6Rn2q5+tf2NI1BZmYZ76gkHYPxCBX4loBU534vi3yFIcTqGUD:eHf7qwtF976goYpCooo46guD
        TLSH:DB04F982E97DFC52F93CB5F0ECED9A225CAC2C1E00F7387535B6B26A86379255B00255
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........6u@.X&@.X&@.X&^..&B.X&^..&A.X&^..&P.X&gY#&G.X&@.Y&t.X&^..&D.X&^..&A.X&^..&A.X&Rich@.X&........................PE..d....E.f...
        Icon Hash:8bb585a684a685ab
        Entrypoint:0x14000167c
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x66A345AD [Fri Jul 26 06:43:57 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:2
        File Version Major:5
        File Version Minor:2
        Subsystem Version Major:5
        Subsystem Version Minor:2
        Import Hash:3650c83ce97dfda9cdbfb2fc40f4282d
        Instruction
        dec eax
        sub esp, 28h
        call 00007F0B3CDA0134h
        dec eax
        add esp, 28h
        jmp 00007F0B3CD9FA53h
        int3
        int3
        dec eax
        mov dword ptr [esp+08h], ecx
        dec eax
        sub esp, 00000088h
        dec eax
        lea ecx, dword ptr [00001A4Dh]
        call dword ptr [0000099Fh]
        dec esp
        mov ebx, dword ptr [00001B38h]
        dec esp
        mov dword ptr [esp+58h], ebx
        inc ebp
        xor eax, eax
        dec eax
        lea edx, dword ptr [esp+60h]
        dec eax
        mov ecx, dword ptr [esp+58h]
        call 00007F0B3CDA01CAh
        dec eax
        mov dword ptr [esp+50h], eax
        dec eax
        cmp dword ptr [esp+50h], 00000000h
        je 00007F0B3CD9FD93h
        dec eax
        mov dword ptr [esp+38h], 00000000h
        dec eax
        lea eax, dword ptr [esp+48h]
        dec eax
        mov dword ptr [esp+30h], eax
        dec eax
        lea eax, dword ptr [esp+40h]
        dec eax
        mov dword ptr [esp+28h], eax
        dec eax
        lea eax, dword ptr [000019F8h]
        dec eax
        mov dword ptr [esp+20h], eax
        dec esp
        mov ecx, dword ptr [esp+50h]
        dec esp
        mov eax, dword ptr [esp+58h]
        dec eax
        mov edx, dword ptr [esp+60h]
        xor ecx, ecx
        call 00007F0B3CDA0178h
        jmp 00007F0B3CD9FD74h
        dec eax
        mov eax, dword ptr [esp+00000088h]
        dec eax
        mov dword ptr [00001AC4h], eax
        dec eax
        lea eax, dword ptr [esp+00000088h]
        dec eax
        add eax, 08h
        dec eax
        mov dword ptr [00001A51h], eax
        dec eax
        mov eax, dword ptr [00001AAAh]
        dec eax
        mov dword ptr [0000191Bh], eax
        Programming Language:
        • [IMP] VS2008 build 21022
        • [ASM] VS2008 build 21022
        • [ C ] VS2008 build 21022
        • [IMP] VS2005 build 50727
        • [C++] VS2008 build 21022
        • [RES] VS2008 build 21022
        • [LNK] VS2008 build 21022
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x237c0x64.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x50000x28d60.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x40000xfc.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x2e0000x14.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x1c0.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xbb10xc00ef6eb144facb11a3ef9054a3451698ceFalse0.6569010416666666zlib compressed data5.909520251721885IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x20000x91a0xa00e85936076208180a2af15cac861c233fFalse0.412890625data4.100320919739271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x30000x5f80x200ba5e9ac632de125965c5dfac3d6de948False0.06640625data0.4546902913731214IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pdata0x40000xfc0x200eaeb198cd5ff6ba4c2eca7618b46d748False0.31640625data2.0827576937226624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x50000x290000x28e0064e3336ba35b28b9e2113ad72da2d999False0.07062906154434251data3.346189228650437IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x2e0000x3c0x200db561ee9d53ceb463ab25a7d84b0c8dfFalse0.0625data0.2311581448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x56340x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.271505376344086
        RT_ICON0x591c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4560810810810811
        RT_ICON0x5a440x2ca8Device independent bitmap graphic, 96 x 192 x 8, image size 9216, 256 important colorsChineseChina0.06088173547935619
        RT_ICON0x86ec0x1bc8Device independent bitmap graphic, 72 x 144 x 8, image size 5184, 256 important colorsChineseChina0.09195725534308212
        RT_ICON0xa2b40x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsChineseChina0.10401974612129761
        RT_ICON0xb8dc0x1418Device independent bitmap graphic, 60 x 120 x 8, image size 3600, 256 important colorsChineseChina0.11061430793157076
        RT_ICON0xccf40xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.13352878464818763
        RT_ICON0xdb9c0xba8Device independent bitmap graphic, 40 x 80 x 8, image size 1600, 256 important colorsChineseChina0.13672922252010725
        RT_ICON0xe7440x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.16561371841155234
        RT_ICON0xefec0x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsChineseChina0.21428571428571427
        RT_ICON0xf6b40x608Device independent bitmap graphic, 20 x 40 x 8, image size 400, 256 important colorsChineseChina0.24093264248704663
        RT_ICON0xfcbc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.19291907514450868
        RT_ICON0x102240xab2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.8623082542001461
        RT_ICON0x10cd80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016ChineseChina0.022650830355265925
        RT_ICON0x1a1800x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600ChineseChina0.03322550831792976
        RT_ICON0x1f6080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.038202645252716105
        RT_ICON0x238300x3a48Device independent bitmap graphic, 60 x 120 x 32, image size 14880ChineseChina0.04028150134048258
        RT_ICON0x272780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.051970954356846476
        RT_ICON0x298200x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720ChineseChina0.059319526627218934
        RT_ICON0x2b2880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.08161350844277673
        RT_ICON0x2c3300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.12868852459016394
        RT_ICON0x2ccb80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680ChineseChina0.1813953488372093
        RT_ICON0x2d3700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.17464539007092197
        RT_MENU0x2d7d80x50dataChineseChina0.8375
        RT_DIALOG0x2d8280x134dataChineseChina0.5876623376623377
        RT_STRING0x2d95c0x54dataChineseChina0.5714285714285714
        RT_ACCELERATOR0x2d9b00x10dataChineseChina1.25
        RT_GROUP_ICON0x2d9c00x148dataChineseChina0.573170731707317
        RT_MANIFEST0x2db080x258ASCII text, with CRLF line terminatorsEnglishUnited States0.5116666666666667
        DLLImport
        KERNEL32.dllGetModuleFileNameA, Sleep, VirtualFree, VirtualAlloc, GetCommandLineW, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetStartupInfoA, GetSystemTimeAsFileTime
        USER32.dllGetCursorPos, MessageBoxW
        SHELL32.dllCommandLineToArgvW
        MSVCR90.dll_XcptFilter, _exit, _ismbblead, _cexit, exit, _acmdln, _initterm, _initterm_e, __C_specific_handler, __setusermatherr, _commode, _fmode, _encode_pointer, __set_app_type, __crt_debugger_hook, ?terminate@@YAXXZ, _unlock, __dllonexit, _lock, _onexit, _decode_pointer, __getmainargs, _amsg_exit, memcpy, abs, memset, fopen, fseek, fread, _configthreadlocale
        Language of compilation systemCountry where language is spokenMap
        ChineseChina
        EnglishUnited States
        TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
        2024-08-31T11:46:40.736140+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex349711443192.168.2.6119.45.147.28
        2024-08-31T11:47:44.891842+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex349723443192.168.2.6119.45.147.28
        2024-08-31T11:45:59.094447+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex349726443192.168.2.6119.45.147.28
        2024-08-31T11:47:12.829049+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex349719443192.168.2.6119.45.147.28
        TimestampSource PortDest PortSource IPDest IP
        Aug 31, 2024 11:46:08.663294077 CEST49711443192.168.2.6119.45.147.28
        Aug 31, 2024 11:46:08.663335085 CEST44349711119.45.147.28192.168.2.6
        Aug 31, 2024 11:46:08.663444042 CEST49711443192.168.2.6119.45.147.28
        Aug 31, 2024 11:46:08.670948982 CEST49711443192.168.2.6119.45.147.28
        Aug 31, 2024 11:46:08.670963049 CEST44349711119.45.147.28192.168.2.6
        Aug 31, 2024 11:46:40.736140013 CEST49711443192.168.2.6119.45.147.28
        Aug 31, 2024 11:46:40.743164062 CEST49719443192.168.2.6119.45.147.28
        Aug 31, 2024 11:46:40.743218899 CEST44349719119.45.147.28192.168.2.6
        Aug 31, 2024 11:46:40.743304968 CEST49719443192.168.2.6119.45.147.28
        Aug 31, 2024 11:46:40.743542910 CEST49719443192.168.2.6119.45.147.28
        Aug 31, 2024 11:46:40.743557930 CEST44349719119.45.147.28192.168.2.6
        Aug 31, 2024 11:47:12.829049110 CEST49719443192.168.2.6119.45.147.28
        Aug 31, 2024 11:47:12.834815025 CEST49723443192.168.2.6119.45.147.28
        Aug 31, 2024 11:47:12.834851027 CEST44349723119.45.147.28192.168.2.6
        Aug 31, 2024 11:47:12.834925890 CEST49723443192.168.2.6119.45.147.28
        Aug 31, 2024 11:47:12.835185051 CEST49723443192.168.2.6119.45.147.28
        Aug 31, 2024 11:47:12.835200071 CEST44349723119.45.147.28192.168.2.6
        Aug 31, 2024 11:47:44.891841888 CEST49723443192.168.2.6119.45.147.28
        Aug 31, 2024 11:47:44.924423933 CEST49726443192.168.2.6119.45.147.28
        Aug 31, 2024 11:47:44.924457073 CEST44349726119.45.147.28192.168.2.6
        Aug 31, 2024 11:47:44.924551010 CEST49726443192.168.2.6119.45.147.28
        Aug 31, 2024 11:47:44.924786091 CEST49726443192.168.2.6119.45.147.28
        Aug 31, 2024 11:47:44.924797058 CEST44349726119.45.147.28192.168.2.6

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:05:46:01
        Start date:31/08/2024
        Path:C:\Users\user\Desktop\uA71eQl1nA.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\uA71eQl1nA.exe"
        Imagebase:0x7ff625960000
        File size:176'544 bytes
        MD5 hash:196C296463A4E3596F031F9BF492665F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
        • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
        • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3354581565.0000000000AFA000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
        Reputation:low
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:24%
          Dynamic/Decrypted Code Coverage:4.7%
          Signature Coverage:18.8%
          Total number of Nodes:85
          Total number of Limit Nodes:3
          execution_graph 383 7ff62596154d 384 7ff62596155c _exit 383->384 385 7ff625961565 383->385 384->385 386 7ff62596157a 385->386 387 7ff62596156e _cexit 385->387 387->386 298 7ff62596138c GetStartupInfoA 299 7ff6259613b9 298->299 300 7ff6259613cb 299->300 301 7ff6259613d2 Sleep 299->301 302 7ff6259613ea _amsg_exit 300->302 304 7ff6259613f4 300->304 301->299 302->304 303 7ff62596143e _initterm 305 7ff62596145b 303->305 304->303 304->305 313 7ff62596141f 304->313 306 7ff6259614b2 305->306 307 7ff62596152b _ismbblead 305->307 305->313 314 7ff625961170 306->314 307->305 310 7ff6259614fa exit 311 7ff625961502 310->311 312 7ff62596150b _cexit 311->312 311->313 312->313 331 7ff6259610fc GetCursorPos 314->331 317 7ff6259611a9 319 7ff6259611ae Sleep 317->319 318 7ff6259611c1 MessageBoxW 320 7ff6259611dd 318->320 319->319 321 7ff6259611bf 319->321 336 7ff625961000 320->336 321->320 324 7ff625961237 343 7ff6259612f0 324->343 325 7ff6259611f0 VirtualAlloc 327 7ff6259610fc 4 API calls 325->327 328 7ff625961211 memcpy 327->328 330 7ff625961226 VirtualFree 328->330 329 7ff625961249 329->310 329->311 330->324 332 7ff62596114a SleepEx GetCursorPos 331->332 333 7ff625961115 GetCommandLineW CommandLineToArgvW 331->333 332->333 334 7ff625961122 332->334 333->317 333->318 334->332 334->333 335 7ff625961137 abs 334->335 335->333 335->334 337 7ff625961310 336->337 338 7ff625961045 GetModuleFileNameA fopen 337->338 339 7ff625961076 fseek fread 338->339 340 7ff625961072 338->340 339->340 341 7ff6259612f0 10 API calls 340->341 342 7ff6259610e1 341->342 342->324 342->325 344 7ff6259612f9 343->344 345 7ff625961304 344->345 346 7ff625961690 RtlCaptureContext RtlLookupFunctionEntry 344->346 345->329 347 7ff625961715 346->347 348 7ff6259616d4 RtlVirtualUnwind 346->348 349 7ff625961737 IsDebuggerPresent __crt_debugger_hook SetUnhandledExceptionFilter UnhandledExceptionFilter 347->349 348->349 350 7ff6259617b4 __crt_debugger_hook 349->350 351 7ff6259617be GetCurrentProcess TerminateProcess 349->351 350->351 351->329 358 7ff6259617dc 359 7ff625961816 358->359 361 7ff6259617eb 358->361 360 7ff625961810 ?terminate@ 360->359 361->359 361->360 362 7ff62596167c 365 7ff625961a64 362->365 366 7ff625961685 365->366 367 7ff625961a96 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 365->367 367->366 388 7ff625961b6c _unlock 352 275010c InternetConnectA 353 27501a4 352->353 356 275012b HttpOpenRequestA 353->356 357 2750152 356->357 368 7ff625961324 372 7ff6259618f0 368->372 371 7ff62596137a 375 7ff625961840 _decode_pointer 372->375 374 7ff625961334 __getmainargs 374->371 376 7ff62596186c 375->376 377 7ff625961861 _onexit 375->377 379 7ff625961876 _decode_pointer _decode_pointer _encode_pointer 376->379 378 7ff6259618e7 377->378 378->374 380 7ff625961b2a 379->380 381 7ff6259618b6 _encode_pointer _encode_pointer 380->381 381->378 389 7ff625961594 391 7ff6259615a6 __set_app_type _encode_pointer 389->391 392 7ff625961645 _RTC_Initialize 391->392 393 7ff625961653 __setusermatherr 392->393 394 7ff625961660 392->394 393->394 395 7ff625961669 _configthreadlocale 394->395 396 7ff625961672 394->396 395->396 382 7ff625961820 SetUnhandledExceptionFilter 397 7ff625961b50 _XcptFilter

          Callgraph

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 97 275010c-27501a4 InternetConnectA call 275012b 100 27501a9-27501ac 97->100 101 2750213-2750217 100->101 102 27501ae 100->102 103 2750281-2750283 101->103 104 2750219 101->104 105 27501b0-27501b7 102->105 106 2750229-275022d 102->106 107 2750288 103->107 104->107 108 275021a-2750222 104->108 111 2750225 105->111 112 27501b9-27501c8 105->112 109 275029c-27502a1 106->109 110 275022f-2750233 106->110 114 27502ff-2750300 107->114 115 275028b-2750290 107->115 116 2750294-2750296 108->116 117 2750224 108->117 119 27502a3 109->119 120 2750308-275030b 109->120 118 2750235-2750239 110->118 111->106 112->104 113 27501ca-27501fe 112->113 122 2750200-2750204 113->122 123 275023a-275023b 113->123 121 2750302 114->121 115->116 116->121 125 2750298-2750299 116->125 117->111 118->123 126 27502a5-27502a6 119->126 124 275030c 120->124 127 2750303-2750306 121->127 122->118 128 2750206-275020c 122->128 132 275023d-2750245 123->132 133 275027a 123->133 129 275030d-2750311 124->129 130 27502c7 125->130 131 275029b 125->131 126->129 134 27502a8 126->134 127->120 135 275027e 128->135 136 275020e-275020f 128->136 141 2750313-2750319 129->141 142 275037c-2750387 129->142 139 27502e9 130->139 140 27502c9 130->140 131->109 143 27502bc-27502c4 132->143 144 2750248-275024d 132->144 137 27502e1-27502e8 133->137 138 275027c 133->138 145 27502d7-27502db 134->145 146 27502aa-27502ae 134->146 135->103 136->101 137->139 138->135 149 27502f7-27502fa 138->149 148 27502ea-27502f4 139->148 140->127 150 27502cb-27502d5 140->150 151 275031e 141->151 143->130 147 27502b0-27502b3 144->147 153 275024f-2750269 144->153 145->124 152 27502dd 145->152 146->147 146->148 147->151 155 27502b5-27502b9 147->155 148->149 159 27502fc-27502fe 149->159 160 275036b-2750371 149->160 150->145 151->143 157 275031f-275032a 151->157 158 27502e0 152->158 153->126 154 275026b-275026e 153->154 154->158 161 2750270-2750276 154->161 155->143 164 2750331-2750352 157->164 158->137 159->114 162 2750373-275037b 160->162 163 2750329-275032a 160->163 161->133 165 2750354-2750364 162->165 166 275037d-2750387 162->166 163->164 164->165 165->160
          APIs
          • InternetConnectA.WININET(00000003,00000003,00000002,00000001), ref: 02750127
            • Part of subcall function 0275012B: HttpOpenRequestA.WININET(00000000,00000000,84C03200,00000000), ref: 02750146
          Memory Dump Source
          • Source File: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2750000_uA71eQl1nA.jbxd
          Yara matches
          Similarity
          • API ID: ConnectHttpInternetOpenRequest
          • String ID:
          • API String ID: 1341064763-0
          • Opcode ID: 873df9c4afc2546a1442a618fe62eac0c09bbb6f8c60467f1a24664f2a33bf3d
          • Instruction ID: 6aae9cda68c6c9357563405910b4ddff8e8300f2158dd4ac2c00944dfa4c3606
          • Opcode Fuzzy Hash: 873df9c4afc2546a1442a618fe62eac0c09bbb6f8c60467f1a24664f2a33bf3d
          • Instruction Fuzzy Hash: 7E717C3165C3A55EDB269F78855A377FF95EB1E308B18159EDC81CB063C2E09842C74A

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 7ff62596138c-7ff6259613b7 GetStartupInfoA 1 7ff6259613b9-7ff6259613c4 0->1 2 7ff6259613c6-7ff6259613c9 1->2 3 7ff6259613df-7ff6259613e8 1->3 4 7ff6259613cb-7ff6259613d0 2->4 5 7ff6259613d2-7ff6259613dd Sleep 2->5 6 7ff6259613ea-7ff6259613f2 _amsg_exit 3->6 7 7ff6259613f4-7ff6259613fc 3->7 4->3 5->1 8 7ff625961433-7ff62596143c 6->8 9 7ff625961429 7->9 10 7ff6259613fe-7ff62596141d call 7ff625961a58 7->10 11 7ff62596145b-7ff62596145d 8->11 12 7ff62596143e-7ff625961451 _initterm 8->12 9->8 10->8 17 7ff62596141f-7ff625961424 10->17 15 7ff625961468-7ff625961470 11->15 16 7ff62596145f-7ff625961461 11->16 12->11 18 7ff625961472-7ff625961480 call 7ff625961a10 15->18 19 7ff625961491-7ff6259614a0 15->19 16->15 20 7ff625961581-7ff625961591 17->20 18->19 28 7ff625961482-7ff625961489 18->28 22 7ff6259614a4-7ff6259614a7 19->22 24 7ff625961519-7ff62596151c 22->24 25 7ff6259614a9-7ff6259614ac 22->25 29 7ff62596152b-7ff625961536 _ismbblead 24->29 30 7ff62596151e-7ff625961527 24->30 26 7ff6259614b2-7ff6259614b5 25->26 27 7ff6259614ae-7ff6259614b0 25->27 31 7ff6259614b7-7ff6259614ba 26->31 32 7ff6259614c6-7ff6259614e6 call 7ff625961170 26->32 27->24 27->26 28->19 33 7ff625961538-7ff62596153b 29->33 34 7ff625961540-7ff625961548 29->34 30->29 31->32 36 7ff6259614bc-7ff6259614c4 31->36 38 7ff6259614eb-7ff6259614f8 32->38 33->34 34->22 35 7ff62596157a 34->35 35->20 36->26 39 7ff6259614fa-7ff6259614fc exit 38->39 40 7ff625961502-7ff625961509 38->40 39->40 41 7ff62596150b-7ff625961511 _cexit 40->41 42 7ff625961517 40->42 41->42 42->35
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3355194546.00007FF625961000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF625960000, based on PE: true
          • Associated: 00000000.00000002.3355182511.00007FF625960000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355211058.00007FF625962000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355224540.00007FF625964000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff625960000_uA71eQl1nA.jbxd
          Similarity
          • API ID: InfoSleepStartup_amsg_exit_cexit_initterm_ismbbleadexit
          • String ID:
          • API String ID: 4226152999-0
          • Opcode ID: efa9d08f026538eba5460a8e89d7678a35acb1d85a733ec47946ed4e924bc49a
          • Instruction ID: 5f4c3d295958bc98247abdd80ea68eea0483610757a98dbbf7dd513195d5243c
          • Opcode Fuzzy Hash: efa9d08f026538eba5460a8e89d7678a35acb1d85a733ec47946ed4e924bc49a
          • Instruction Fuzzy Hash: 5651E271E1C7D386FF718F21AD4037966A0AB50B91F445135D94EC36A2DF6CEC88AB82

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3355194546.00007FF625961000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF625960000, based on PE: true
          • Associated: 00000000.00000002.3355182511.00007FF625960000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355211058.00007FF625962000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355224540.00007FF625964000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff625960000_uA71eQl1nA.jbxd
          Similarity
          • API ID: CommandLineVirtual$AllocArgvCursorFreeMessageSleepmemcpy
          • String ID:
          • API String ID: 979759111-0
          • Opcode ID: b73ec664217b5a2a8efd1468c4b39278dedcd936ba1e329ffd9f8b4ff03f74ff
          • Instruction ID: 50d7dff96eeb9ea2a0adcf13843e49644f48c90efca4b3c9132a5e35d92f0477
          • Opcode Fuzzy Hash: b73ec664217b5a2a8efd1468c4b39278dedcd936ba1e329ffd9f8b4ff03f74ff
          • Instruction Fuzzy Hash: 21115E20F1C7C382FE389F61ED557B91251AF45F80F400035D94E86686DF2CEA0D9B82

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3355194546.00007FF625961000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF625960000, based on PE: true
          • Associated: 00000000.00000002.3355182511.00007FF625960000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355211058.00007FF625962000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355224540.00007FF625964000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff625960000_uA71eQl1nA.jbxd
          Similarity
          • API ID: FileModuleNamefopenfreadfseek
          • String ID:
          • API String ID: 61248797-0
          • Opcode ID: e2ab62533fe2727c4afed391eb0506a7d84d4cb0fd168770317e06c746f5a0c3
          • Instruction ID: c16529537bd02677bd078a43998e46b7217720b5f05fbd76d2753d9e41e24760
          • Opcode Fuzzy Hash: e2ab62533fe2727c4afed391eb0506a7d84d4cb0fd168770317e06c746f5a0c3
          • Instruction Fuzzy Hash: ED217F21F187C281EE349F22EC402AA6651BB88FC4F484535DE4E87656DF3DEA49DB41

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3355194546.00007FF625961000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF625960000, based on PE: true
          • Associated: 00000000.00000002.3355182511.00007FF625960000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355211058.00007FF625962000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355224540.00007FF625964000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff625960000_uA71eQl1nA.jbxd
          Similarity
          • API ID: Cursor$Sleep
          • String ID:
          • API String ID: 1847515627-0
          • Opcode ID: 5f998fbb9a03f8ce535d240d0b98797ae8a4175fc6e743fcc2beb06ba2ec3afa
          • Instruction ID: b335ddcfcbd879a1476679cbb2b511a144cf2de648c739dfc6039cc20b94f29b
          • Opcode Fuzzy Hash: 5f998fbb9a03f8ce535d240d0b98797ae8a4175fc6e743fcc2beb06ba2ec3afa
          • Instruction Fuzzy Hash: 0C01F432E1C6C387FE649F64EE8153D6260EF80F44F160035E64BC2596DF2CEC889A82

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 84 275012b-2750151 HttpOpenRequestA 85 2750152-275018e 84->85 88 2750194-2750197 85->88 89 2750331-2750352 85->89 90 275019d 88->90 91 2750329-275032a 88->91 93 2750354-2750371 89->93 90->85 91->89 93->91 95 2750373-275037b 93->95 95->93 96 275037d-2750387 95->96
          APIs
          • HttpOpenRequestA.WININET(00000000,00000000,84C03200,00000000), ref: 02750146
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3354927278.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2750000_uA71eQl1nA.jbxd
          Yara matches
          Similarity
          • API ID: HttpOpenRequest
          • String ID: U.;
          • API String ID: 1984915467-4213443877
          • Opcode ID: ab09341529980e95ac1e803047b3985bc20a26ea9b837d55d995e7e224907264
          • Instruction ID: 2a54fdcdec2b80e193de146d54597e6f2445e8d26245f518f39c011ae9f51d3d
          • Opcode Fuzzy Hash: ab09341529980e95ac1e803047b3985bc20a26ea9b837d55d995e7e224907264
          • Instruction Fuzzy Hash: AD116D6034890D1BF61C91AE7C5A73A61CAD7CC765F24813FB94EC33D6DDA8CC82815A

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3355194546.00007FF625961000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF625960000, based on PE: true
          • Associated: 00000000.00000002.3355182511.00007FF625960000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355211058.00007FF625962000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355224540.00007FF625964000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff625960000_uA71eQl1nA.jbxd
          Similarity
          • API ID: ExceptionFilterProcessUnhandled__crt_debugger_hook$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
          • String ID:
          • API String ID: 3815035489-0
          • Opcode ID: a17a8dd3c319054adf368a232480b45a907422023f50f7ca2f70aae9b8364634
          • Instruction ID: cb3ad7bb6044bc78888c79ed507f756f23575ba68b11b404895ec8a82b7194fc
          • Opcode Fuzzy Hash: a17a8dd3c319054adf368a232480b45a907422023f50f7ca2f70aae9b8364634
          • Instruction Fuzzy Hash: 3131B035D18B8795EE209F50E84036973A4FB84B90F900036DA8E83766DF7CE85C8B82

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3355194546.00007FF625961000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF625960000, based on PE: true
          • Associated: 00000000.00000002.3355182511.00007FF625960000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355211058.00007FF625962000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355224540.00007FF625964000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff625960000_uA71eQl1nA.jbxd
          Similarity
          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
          • String ID:
          • API String ID: 1445889803-0
          • Opcode ID: 397934418954568fb0fe083196244a5791e63ab94abec316ce2ef90042beb460
          • Instruction ID: e2f7f947d7bb6ff3222ead237784b08d3e89ab3662d6a3497a032fee74048b36
          • Opcode Fuzzy Hash: 397934418954568fb0fe083196244a5791e63ab94abec316ce2ef90042beb460
          • Instruction Fuzzy Hash: DF012721E29B8282EE608F21E8402656360BB49F91F546530EE6E877A5DF3CDC8C8781
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3355194546.00007FF625961000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF625960000, based on PE: true
          • Associated: 00000000.00000002.3355182511.00007FF625960000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355211058.00007FF625962000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355224540.00007FF625964000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff625960000_uA71eQl1nA.jbxd
          Similarity
          • API ID: ExceptionFilterUnhandled
          • String ID:
          • API String ID: 3192549508-0
          • Opcode ID: 1f564ca58756c1f2d77dcb3bbadb9968f820972ebdd681b75e89981cec4f8d3d
          • Instruction ID: a0a4b0da87a06ef409b90cd10ffe018b33d416f9dd78d57add60ba7b7be02685
          • Opcode Fuzzy Hash: 1f564ca58756c1f2d77dcb3bbadb9968f820972ebdd681b75e89981cec4f8d3d
          • Instruction Fuzzy Hash: 25B09224E15683C1DE14AF22AC8106012A0AB58B11FD00430C00EC0161DF1C999ECB42

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3355194546.00007FF625961000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF625960000, based on PE: true
          • Associated: 00000000.00000002.3355182511.00007FF625960000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355211058.00007FF625962000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3355224540.00007FF625964000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff625960000_uA71eQl1nA.jbxd
          Similarity
          • API ID: Initialize__set_app_type__setusermatherr_configthreadlocale_encode_pointer
          • String ID:
          • API String ID: 701925997-0
          • Opcode ID: e5586d1100ce49df95b454e37c57d21e9346bf3b03c12b805237ac8ffc22a98b
          • Instruction ID: 4979b82c99310394cf89feea5dc87e5c43a6d40862c42f2a70038f5e6c2b51a0
          • Opcode Fuzzy Hash: e5586d1100ce49df95b454e37c57d21e9346bf3b03c12b805237ac8ffc22a98b
          • Instruction Fuzzy Hash: B6219C70D197838AEF709F64AD4427432A0AB04F65F504635D52EC21E2DF3DAD8DEB82