Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Stub.exe

Overview

General Information

Sample name:Stub.exe
Analysis ID:1502472
MD5:e50e5c919322ad54bd5ed6eefba01619
SHA1:988a6155484ea1e07883a1dd97ff1d97083adc5a
SHA256:e4384cce1f9ea5e5c1e2fdb0af7ed8f25724c2618e462ae9fced298c24d7b095
Tags:asyncratexe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Stub.exe (PID: 3128 cmdline: "C:\Users\user\Desktop\Stub.exe" MD5: E50E5C919322AD54BD5ED6EEFBA01619)
    • cmd.exe (PID: 3964 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 1248 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' MD5: 48C2FE20575769DE916F48EF0676A965)
    • cmd.exe (PID: 4128 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpAD4A.tmp.bat"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 3712 cmdline: timeout 3 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • gang.exe (PID: 5720 cmdline: "C:\Users\user\AppData\Roaming\gang.exe" MD5: E50E5C919322AD54BD5ED6EEFBA01619)
  • gang.exe (PID: 7116 cmdline: C:\Users\user\AppData\Roaming\gang.exe MD5: E50E5C919322AD54BD5ED6EEFBA01619)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Stub.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\gang.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      SourceRuleDescriptionAuthorStrings
      0.0.Stub.exe.7f0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        0.2.Stub.exe.2d03200.0.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Stub.exe", ParentImage: C:\Users\user\Desktop\Stub.exe, ParentProcessId: 3128, ParentProcessName: Stub.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit, ProcessId: 3964, ProcessName: cmd.exe
          Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Stub.exe", ParentImage: C:\Users\user\Desktop\Stub.exe, ParentProcessId: 3128, ParentProcessName: Stub.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit, ProcessId: 3964, ProcessName: cmd.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 3964, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' , ProcessId: 1248, ProcessName: schtasks.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Stub.exeAvira: detected
          Source: C:\Users\user\AppData\Roaming\gang.exeAvira: detection malicious, Label: TR/Dropper.Gen
          Source: C:\Users\user\AppData\Roaming\gang.exeReversingLabs: Detection: 65%
          Source: C:\Users\user\AppData\Roaming\gang.exeVirustotal: Detection: 59%Perma Link
          Source: Stub.exeVirustotal: Detection: 59%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Roaming\gang.exeJoe Sandbox ML: detected
          Source: Stub.exeJoe Sandbox ML: detected
          Source: Stub.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: Stub.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Yara matchFile source: Stub.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.Stub.exe.7f0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Stub.exe.2d03200.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: C:\Users\user\AppData\Roaming\gang.exe, type: DROPPED
          Source: global trafficTCP traffic: 192.168.2.5:49704 -> 147.185.221.22:26706
          Source: Joe Sandbox ViewIP Address: 147.185.221.22 147.185.221.22
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: com-distinct.gl.at.ply.gg
          Source: Stub.exe, 00000000.00000002.2035564774.0000000002CF5000.00000004.00000800.00020000.00000000.sdmp, gang.exe, 00000008.00000002.3218004845.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

          Operating System Destruction

          barindex
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: 00 00 00 00 Jump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: 01 00 00 00 Jump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_01080774 NtQueryInformationProcess,0_2_01080774
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_010807C4 NtQueryInformationProcess,0_2_010807C4
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_01081792 NtQueryInformationProcess,0_2_01081792
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_010807AA NtQueryInformationProcess,0_2_010807AA
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_010823C0 NtQueryInformationProcess,0_2_010823C0
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 8_2_01220774 NtQueryInformationProcess,8_2_01220774
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 8_2_012223C8 NtQueryInformationProcess,8_2_012223C8
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 8_2_01221791 NtQueryInformationProcess,8_2_01221791
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 8_2_012223C0 NtQueryInformationProcess,8_2_012223C0
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_028107C4 NtQueryInformationProcess,9_2_028107C4
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_02810774 NtQueryInformationProcess,9_2_02810774
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_02811797 NtQueryInformationProcess,9_2_02811797
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_02811D4F NtQueryInformationProcess,9_2_02811D4F
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_010869A80_2_010869A8
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_010818480_2_01081848
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_010872780_2_01087278
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_010866600_2_01086660
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 8_2_012269A88_2_012269A8
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 8_2_012272788_2_01227278
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 8_2_012266608_2_01226660
          Source: Stub.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: Stub.exe, OqYABVnrsXllVHT.csBase64 encoded string: 'hCEGbre2T4CPo6tDQACWvyyw/2eLU2RmBA9qY3604i2IwuQB6y8pObjjxqJlysTQ1xxyrkmh/Td9R1jo3RAHVA==', 'NctAcy+9RoxPV8Hi1VUTEIboudoFizF6na+O+wGnbguyDaMPJRJL3tqCn7CM1WSvIUkBVr+W7rPH5f3ruSvqpA==', 'MrXZdogAHRvOg644WSQ1NehkZqueuRRzrvnToASlAqqiZH6amCsacgJS4kHTreI/DbNWCnNERXfOIM4Dipr+X9nBKGGc6l/NABWyAgY4RVw=', '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', 'N6zOgxxNBXmwL0pQ+cmzGligw/7/Ma56DsC1ym0USeVA2yAcK23ryrXjcDHVdQS9l/RPi132zU/hc4pD1p89Nk9dCiIYXPnuHAXj8ZHay3Y106Zm3u9b77ddQAH2NepQaIuybvu6qKuBKS2c0213Go07L29rlXCPGVeTuoCS5hHwz4rL3ReMI5jkbX1MbUKDj3mPdLZTPja7J6AwPXRdthdBfYBg/1EoPBCDEyn846HG8LV5h7cjkJBHaHSBXPY6530fwbaJP+AywmkIGfTd12bQZXeqAZksyBPTKjALw2kgML22pXrIj8U3WrkkKanNIsdsIT5ol77
          Source: gang.exe.0.dr, OqYABVnrsXllVHT.csBase64 encoded string: 'hCEGbre2T4CPo6tDQACWvyyw/2eLU2RmBA9qY3604i2IwuQB6y8pObjjxqJlysTQ1xxyrkmh/Td9R1jo3RAHVA==', 'NctAcy+9RoxPV8Hi1VUTEIboudoFizF6na+O+wGnbguyDaMPJRJL3tqCn7CM1WSvIUkBVr+W7rPH5f3ruSvqpA==', 'MrXZdogAHRvOg644WSQ1NehkZqueuRRzrvnToASlAqqiZH6amCsacgJS4kHTreI/DbNWCnNERXfOIM4Dipr+X9nBKGGc6l/NABWyAgY4RVw=', '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', 'N6zOgxxNBXmwL0pQ+cmzGligw/7/Ma56DsC1ym0USeVA2yAcK23ryrXjcDHVdQS9l/RPi132zU/hc4pD1p89Nk9dCiIYXPnuHAXj8ZHay3Y106Zm3u9b77ddQAH2NepQaIuybvu6qKuBKS2c0213Go07L29rlXCPGVeTuoCS5hHwz4rL3ReMI5jkbX1MbUKDj3mPdLZTPja7J6AwPXRdthdBfYBg/1EoPBCDEyn846HG8LV5h7cjkJBHaHSBXPY6530fwbaJP+AywmkIGfTd12bQZXeqAZksyBPTKjALw2kgML22pXrIj8U3WrkkKanNIsdsIT5ol77
          Source: 0.2.Stub.exe.2d03200.0.raw.unpack, OqYABVnrsXllVHT.csBase64 encoded string: 'hCEGbre2T4CPo6tDQACWvyyw/2eLU2RmBA9qY3604i2IwuQB6y8pObjjxqJlysTQ1xxyrkmh/Td9R1jo3RAHVA==', 'NctAcy+9RoxPV8Hi1VUTEIboudoFizF6na+O+wGnbguyDaMPJRJL3tqCn7CM1WSvIUkBVr+W7rPH5f3ruSvqpA==', 'MrXZdogAHRvOg644WSQ1NehkZqueuRRzrvnToASlAqqiZH6amCsacgJS4kHTreI/DbNWCnNERXfOIM4Dipr+X9nBKGGc6l/NABWyAgY4RVw=', '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', 'N6zOgxxNBXmwL0pQ+cmzGligw/7/Ma56DsC1ym0USeVA2yAcK23ryrXjcDHVdQS9l/RPi132zU/hc4pD1p89Nk9dCiIYXPnuHAXj8ZHay3Y106Zm3u9b77ddQAH2NepQaIuybvu6qKuBKS2c0213Go07L29rlXCPGVeTuoCS5hHwz4rL3ReMI5jkbX1MbUKDj3mPdLZTPja7J6AwPXRdthdBfYBg/1EoPBCDEyn846HG8LV5h7cjkJBHaHSBXPY6530fwbaJP+AywmkIGfTd12bQZXeqAZksyBPTKjALw2kgML22pXrIj8U3WrkkKanNIsdsIT5ol77
          Source: gang.exe.0.dr, dfHxNbZDwC.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: gang.exe.0.dr, dfHxNbZDwC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.Stub.exe.2d03200.0.raw.unpack, dfHxNbZDwC.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.Stub.exe.2d03200.0.raw.unpack, dfHxNbZDwC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: Stub.exe, dfHxNbZDwC.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: Stub.exe, dfHxNbZDwC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: classification engineClassification label: mal100.troj.evad.winEXE@15/5@1/1
          Source: C:\Users\user\Desktop\Stub.exeFile created: C:\Users\user\AppData\Roaming\gang.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2764:120:WilError_03
          Source: C:\Users\user\AppData\Roaming\gang.exeMutant created: \Sessions\1\BaseNamedObjects\SuperBoo_mtex_920393
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4352:120:WilError_03
          Source: C:\Users\user\Desktop\Stub.exeFile created: C:\Users\user\AppData\Local\Temp\tmpAD4A.tmpJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpAD4A.tmp.bat""
          Source: Stub.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: Stub.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\Stub.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Stub.exeVirustotal: Detection: 59%
          Source: C:\Users\user\Desktop\Stub.exeFile read: C:\Users\user\Desktop\Stub.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Stub.exe "C:\Users\user\Desktop\Stub.exe"
          Source: C:\Users\user\Desktop\Stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpAD4A.tmp.bat""
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\gang.exe C:\Users\user\AppData\Roaming\gang.exe
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\gang.exe "C:\Users\user\AppData\Roaming\gang.exe"
          Source: C:\Users\user\Desktop\Stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exitJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpAD4A.tmp.bat""Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\gang.exe "C:\Users\user\AppData\Roaming\gang.exe" Jump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
          Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: Stub.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Stub.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Stub.exe, uooxPsfrCkDz.cs.Net Code: eMGTwYJKwJLOb
          Source: gang.exe.0.dr, uooxPsfrCkDz.cs.Net Code: eMGTwYJKwJLOb
          Source: 0.2.Stub.exe.2d03200.0.raw.unpack, uooxPsfrCkDz.cs.Net Code: eMGTwYJKwJLOb
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_02811AE0 push edx; retf 9_2_02811AEE
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_02810812 push ecx; retf 9_2_02810813
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_0281081D push ecx; retf 9_2_0281081F
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_02810844 push esp; retf 9_2_02810846
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_02811848 push ecx; retf 9_2_02811856
          Source: C:\Users\user\AppData\Roaming\gang.exeCode function: 9_2_02813D5D push esp; retf 9_2_02813D6E
          Source: Stub.exe, DplwvdqGVLVF.csHigh entropy of concatenated method names: 'NtQueryInformationProcess', 'GetParentProcess', 'GetParentProcess', 'GetParentProcess', 'GpdnDjALeJzNDZzDUhLZTFPvCjUrYSLSCSYoKpasUgwcIOBAnJeNaKgazHLtojNlYGkKakSEgsfMiNMOIudoOXRRMXOdEHdLskecDQzcRzHIFtSMUWLUfzxbOsYcwPZzouuXIKlRUaxopjmsfciIVjFTNcnkSwGbzitkZVdkKTZfbiLFgGXtGrDePAjGwbZxtvOhPctjYYXbjzREqIemzmuhEovyLwNJUCLGuDPemNvIuBVpJFpOXNYhaHDBGUyBlnhHOlkMTZZLRMNctgPfhYMhDEFManxspTwhuoBxvCUXNnpnUAhAfsumBZdjFxMFCHwYpFIfErKEdOtqorSAgXmWykFvkrSXQpvgRrYoRcVOIQiMFMVoEmzEuzzfanUnyMNOtmzXtEIdcyoIbSPywDtEQQMrSSnEiHpVcutsmXUZEwCWlQdhxwRVtjYCAi', 'GetParentProcess', 'CloseHandle', 'IsDebuggerPresent', 'OutputDebugString', 'Worker'
          Source: Stub.exe, RvjpCZIkLLBwzlL.csHigh entropy of concatenated method names: 'GLKpWNWDtTH', 'fczTPxGOAlKyGuu', 'aTPvtgkXZAx', 'HUZTyyIWnrhKCt', 'KUnRicCAGxWOC', 'JkjvQGlpiGztB', 'xKHXggCvIbuO', 'CygWsQLLyKZVNx', 'TiSILyePgsS', 'PpsPlKYiSrEI'
          Source: gang.exe.0.dr, DplwvdqGVLVF.csHigh entropy of concatenated method names: 'NtQueryInformationProcess', 'GetParentProcess', 'GetParentProcess', 'GetParentProcess', 'GpdnDjALeJzNDZzDUhLZTFPvCjUrYSLSCSYoKpasUgwcIOBAnJeNaKgazHLtojNlYGkKakSEgsfMiNMOIudoOXRRMXOdEHdLskecDQzcRzHIFtSMUWLUfzxbOsYcwPZzouuXIKlRUaxopjmsfciIVjFTNcnkSwGbzitkZVdkKTZfbiLFgGXtGrDePAjGwbZxtvOhPctjYYXbjzREqIemzmuhEovyLwNJUCLGuDPemNvIuBVpJFpOXNYhaHDBGUyBlnhHOlkMTZZLRMNctgPfhYMhDEFManxspTwhuoBxvCUXNnpnUAhAfsumBZdjFxMFCHwYpFIfErKEdOtqorSAgXmWykFvkrSXQpvgRrYoRcVOIQiMFMVoEmzEuzzfanUnyMNOtmzXtEIdcyoIbSPywDtEQQMrSSnEiHpVcutsmXUZEwCWlQdhxwRVtjYCAi', 'GetParentProcess', 'CloseHandle', 'IsDebuggerPresent', 'OutputDebugString', 'Worker'
          Source: gang.exe.0.dr, RvjpCZIkLLBwzlL.csHigh entropy of concatenated method names: 'GLKpWNWDtTH', 'fczTPxGOAlKyGuu', 'aTPvtgkXZAx', 'HUZTyyIWnrhKCt', 'KUnRicCAGxWOC', 'JkjvQGlpiGztB', 'xKHXggCvIbuO', 'CygWsQLLyKZVNx', 'TiSILyePgsS', 'PpsPlKYiSrEI'
          Source: 0.2.Stub.exe.2d03200.0.raw.unpack, DplwvdqGVLVF.csHigh entropy of concatenated method names: 'NtQueryInformationProcess', 'GetParentProcess', 'GetParentProcess', 'GetParentProcess', 'GpdnDjALeJzNDZzDUhLZTFPvCjUrYSLSCSYoKpasUgwcIOBAnJeNaKgazHLtojNlYGkKakSEgsfMiNMOIudoOXRRMXOdEHdLskecDQzcRzHIFtSMUWLUfzxbOsYcwPZzouuXIKlRUaxopjmsfciIVjFTNcnkSwGbzitkZVdkKTZfbiLFgGXtGrDePAjGwbZxtvOhPctjYYXbjzREqIemzmuhEovyLwNJUCLGuDPemNvIuBVpJFpOXNYhaHDBGUyBlnhHOlkMTZZLRMNctgPfhYMhDEFManxspTwhuoBxvCUXNnpnUAhAfsumBZdjFxMFCHwYpFIfErKEdOtqorSAgXmWykFvkrSXQpvgRrYoRcVOIQiMFMVoEmzEuzzfanUnyMNOtmzXtEIdcyoIbSPywDtEQQMrSSnEiHpVcutsmXUZEwCWlQdhxwRVtjYCAi', 'GetParentProcess', 'CloseHandle', 'IsDebuggerPresent', 'OutputDebugString', 'Worker'
          Source: 0.2.Stub.exe.2d03200.0.raw.unpack, RvjpCZIkLLBwzlL.csHigh entropy of concatenated method names: 'GLKpWNWDtTH', 'fczTPxGOAlKyGuu', 'aTPvtgkXZAx', 'HUZTyyIWnrhKCt', 'KUnRicCAGxWOC', 'JkjvQGlpiGztB', 'xKHXggCvIbuO', 'CygWsQLLyKZVNx', 'TiSILyePgsS', 'PpsPlKYiSrEI'
          Source: C:\Users\user\Desktop\Stub.exeFile created: C:\Users\user\AppData\Roaming\gang.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"'
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Roaming\gang.exeSection loaded: OutputDebugStringW count: 1954
          Source: Stub.exe, 00000000.00000002.2035564774.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, gang.exe, 00000008.00000002.3218004845.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\Stub.exeMemory allocated: 1080000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeMemory allocated: 2BA0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeMemory allocated: 2A90000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeMemory allocated: 1220000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeMemory allocated: 4ED0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeMemory allocated: E50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeMemory allocated: 29B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeMemory allocated: 2770000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeWindow / User API: threadDelayed 4483Jump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeWindow / User API: threadDelayed 4607Jump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeWindow / User API: threadDelayed 427Jump to behavior
          Source: C:\Users\user\Desktop\Stub.exe TID: 4984Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exe TID: 5768Thread sleep time: -4483000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exe TID: 5756Thread sleep time: -4607000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exe TID: 6304Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
          Source: C:\Users\user\AppData\Roaming\gang.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Stub.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: gang.exe, 00000008.00000002.3218004845.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: gang.exe, 00000008.00000002.3221641595.0000000005A7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\Stub.exeProcess information queried: ProcessInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\Stub.exeCode function: 0_2_010878B0 CheckRemoteDebuggerPresent,0_2_010878B0
          Source: C:\Users\user\Desktop\Stub.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exitJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpAD4A.tmp.bat""Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\gang.exe "C:\Users\user\AppData\Roaming\gang.exe" Jump to behavior
          Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Users\user\Desktop\Stub.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeQueries volume information: C:\Users\user\AppData\Roaming\gang.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\gang.exeQueries volume information: C:\Users\user\AppData\Roaming\gang.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Stub.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information1
          Scripting
          Valid Accounts1
          Windows Management Instrumentation
          1
          Scheduled Task/Job
          11
          Process Injection
          1
          Masquerading
          OS Credential Dumping321
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Scheduled Task/Job
          1
          Scripting
          1
          Scheduled Task/Job
          1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAt1
          DLL Side-Loading
          1
          DLL Side-Loading
          151
          Virtualization/Sandbox Evasion
          Security Account Manager151
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
          Obfuscated Files or Information
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Software Packing
          Cached Domain Credentials23
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502472 Sample: Stub.exe Startdate: 01/09/2024 Architecture: WINDOWS Score: 100 34 com-distinct.gl.at.ply.gg 2->34 38 Antivirus / Scanner detection for submitted sample 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 .NET source code contains potential unpacker 2->42 44 5 other signatures 2->44 8 Stub.exe 7 2->8         started        12 gang.exe 2 2->12         started        signatures3 process4 dnsIp5 30 C:\Users\user\AppData\Roaming\gang.exe, PE32 8->30 dropped 32 C:\Users\user\AppData\Local\...\Stub.exe.log, ASCII 8->32 dropped 46 Protects its processes via BreakOnTermination flag 8->46 48 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->48 50 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 8->50 15 cmd.exe 1 8->15         started        18 cmd.exe 1 8->18         started        36 com-distinct.gl.at.ply.gg 147.185.221.22, 26706, 49704, 49711 SALSGIVERUS United States 12->36 52 Antivirus detection for dropped file 12->52 54 Multi AV Scanner detection for dropped file 12->54 56 Machine Learning detection for dropped file 12->56 58 Tries to delay execution (extensive OutputDebugStringW loop) 12->58 file6 signatures7 process8 signatures9 60 Uses schtasks.exe or at.exe to add and modify task schedules 15->60 20 conhost.exe 15->20         started        22 schtasks.exe 1 15->22         started        24 gang.exe 3 18->24         started        26 conhost.exe 18->26         started        28 timeout.exe 1 18->28         started        process10

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Stub.exe59%VirustotalBrowse
          Stub.exe100%AviraTR/Dropper.Gen
          Stub.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\gang.exe100%AviraTR/Dropper.Gen
          C:\Users\user\AppData\Roaming\gang.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\gang.exe66%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
          C:\Users\user\AppData\Roaming\gang.exe59%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLink
          com-distinct.gl.at.ply.gg4%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          com-distinct.gl.at.ply.gg
          147.185.221.22
          truefalseunknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameStub.exe, 00000000.00000002.2035564774.0000000002CF5000.00000004.00000800.00020000.00000000.sdmp, gang.exe, 00000008.00000002.3218004845.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          147.185.221.22
          com-distinct.gl.at.ply.ggUnited States
          12087SALSGIVERUSfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1502472
          Start date and time:2024-09-01 18:15:05 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 23s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:13
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Stub.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@15/5@1/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 48
          • Number of non-executed functions: 1
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          TimeTypeDescription
          12:16:27API Interceptor458416x Sleep call for process: gang.exe modified
          18:15:55Task SchedulerRun new task: gang path: "C:\Users\user\AppData\Roaming\gang.exe"
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          147.185.221.22abomr3e.exeGet hashmaliciousXWormBrowse
            ChenzeCheats.exeGet hashmaliciousXWormBrowse
              XClient.exeGet hashmaliciousXWormBrowse
                Ozj6OxEatlic.exeGet hashmaliciousXWormBrowse
                  Neverlose.exeGet hashmaliciousXWormBrowse
                    Solara.exeGet hashmaliciousXWormBrowse
                      XClient.exeGet hashmaliciousXWormBrowse
                        dsjjzgRwZe.exeGet hashmaliciousNjratBrowse
                          22.08.2024.exeGet hashmaliciousXmrigBrowse
                            SolaraBootstrapper.exeGet hashmaliciousXWormBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SALSGIVERUSN7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
                              • 147.185.221.21
                              N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
                              • 147.185.221.21
                              stub (5).batGet hashmaliciousUnknownBrowse
                              • 147.185.221.19
                              MicrosoftEdgeWebview2.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.20
                              abomr3e.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.22
                              SenditIllrunitinmyvirtualmachineinsidemyvirtualmachine.batGet hashmaliciousUnknownBrowse
                              • 147.185.221.21
                              ChenzeCheats.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.22
                              XClient.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.22
                              Image Logger Installer.exeGet hashmaliciousAsyncRAT, XWormBrowse
                              • 147.185.221.21
                              Ozj6OxEatlic.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.22
                              No context
                              No context
                              Process:C:\Users\user\Desktop\Stub.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):739
                              Entropy (8bit):5.348505694476449
                              Encrypted:false
                              SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaWzAbDLI4MNldKZat92n4M6:ML9E4KlKDE4KhKiKhBsXE4qdK284j
                              MD5:A65F13C4355387C4645D260206AE915F
                              SHA1:F8857636BB3B50E634E96E7B0ECE6AD77656BA5F
                              SHA-256:DB8CA2E253F03395ABECD812505666B3BD5CE699B798E3F624D22EE605FB290E
                              SHA-512:0584E8911FD08CC0BB833C6373AE5D161D00CF40FB4533B5DD0D31F38CF1783BB25E34084995A2D116AFB01ABAD14005D62EE51A1D9B79E262EF28775B878AB6
                              Malicious:true
                              Reputation:moderate, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Management\96012833bebd5f21714fc508603cda97\System.Management.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                              Process:C:\Users\user\AppData\Roaming\gang.exe
                              File Type:CSV text
                              Category:dropped
                              Size (bytes):425
                              Entropy (8bit):5.353683843266035
                              Encrypted:false
                              SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                              MD5:859802284B12C59DDBB85B0AC64C08F0
                              SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                              SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                              SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                              Process:C:\Users\user\Desktop\Stub.exe
                              File Type:DOS batch file, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):150
                              Entropy (8bit):4.981753004557284
                              Encrypted:false
                              SSDEEP:3:mKDDCMNqTtvL5oUkh4EaKC5rAIvmqRDUkh4E2J5xAInTRIOEm5ZPy:hWKqTtT69aZ5rAIvmq1923fTvEm5k
                              MD5:49985256B303ACFEF78497CFA757B318
                              SHA1:2D051EBE38C2DF4F6B000D968BC09710987D2314
                              SHA-256:7E773892955B22127EF14BBA8C885AD08C34B06D0116518B50A507CD736A160A
                              SHA-512:DCBEEDEFD1BC8054B7B569E9AFB0C236DFBB1EE35FBAFFA6587E62CA4F454EC711CC5DD875D74769ECA7075C325B059CC31EB11FBADB152604677F843422BABE
                              Malicious:false
                              Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\gang.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmpAD4A.tmp.bat" /f /q..
                              Process:C:\Users\user\Desktop\Stub.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):61952
                              Entropy (8bit):5.950435551429037
                              Encrypted:false
                              SSDEEP:1536:4EKoM1cSSTTGBfu4maBqJubMo/ZlB9wyaeXAFmf+:XK4aBjmaBqJubMsp97hXAQm
                              MD5:E50E5C919322AD54BD5ED6EEFBA01619
                              SHA1:988A6155484EA1E07883A1DD97FF1D97083ADC5A
                              SHA-256:E4384CCE1F9EA5E5C1E2FDB0AF7ED8F25724C2618E462AE9FCED298C24D7B095
                              SHA-512:5E017CCCA9ABECCF8837C4C249B09019DB8AD06E041B5A3D14D97B5CB0E16C57651E548936B872171EAC43C8D16BC864E4726C6431E6A5FF947B68163F395BE5
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\gang.exe, Author: Joe Security
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 66%
                              • Antivirus: Virustotal, Detection: 59%, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d............................N.... ... ....@.. .......................`............`.....................................O.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H........x.................................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~"...*..."...*.~#...*...#...*.~$...*...$...*.~%...*...%...*.~&...*...&...*.~'...*...'...*.~(...*...(...*.~)...*.~*...*...*...*.~+...*...+...*.~,...*...,...**.(Y......*2~.....oZ...*.s.....)...*.(=...-.(>...-.(?...-.(;...-.(<...,..(....*V(....s.... ...o....*b~-...,.~-...o......-...*f~....(....,.(D...,.(T...*.r.,.pr...pr...p(.... .a.!.(....~....(.....2...*.s.
                              Process:C:\Windows\SysWOW64\timeout.exe
                              File Type:ASCII text, with CRLF line terminators, with overstriking
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.41440934524794
                              Encrypted:false
                              SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                              MD5:3DD7DD37C304E70A7316FE43B69F421F
                              SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                              SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                              SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                              Malicious:false
                              Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):5.950435551429037
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:Stub.exe
                              File size:61'952 bytes
                              MD5:e50e5c919322ad54bd5ed6eefba01619
                              SHA1:988a6155484ea1e07883a1dd97ff1d97083adc5a
                              SHA256:e4384cce1f9ea5e5c1e2fdb0af7ed8f25724c2618e462ae9fced298c24d7b095
                              SHA512:5e017ccca9abeccf8837c4c249b09019db8ad06e041b5a3d14d97b5cb0e16c57651e548936b872171eac43c8d16bc864e4726c6431e6a5ff947b68163f395be5
                              SSDEEP:1536:4EKoM1cSSTTGBfu4maBqJubMo/ZlB9wyaeXAFmf+:XK4aBjmaBqJubMsp97hXAQm
                              TLSH:84537D043FBA422DE2BE5B7860E1304506BB91933A03DBF91CD941C727877D79A21EE9
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d............................N.... ... ....@.. .......................`............`................................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x41044e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x64AB7FC1 [Mon Jul 10 03:49:21 2023 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x103fc0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x7e4.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xe4540xe600a688678a9c4250b2b5988ff773a9f930False0.5197180706521739data6.0132468928458485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x120000x7e40x80074eef6c1cb627ee5a576a756707f8526False0.4150390625data4.805813992760355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x140000xc0x200b5ea470c0657070d8e2c71b9f07957b5False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0x120a00x2ccdata0.43575418994413406
                              RT_MANIFEST0x1236c0x478exported SGML document, Unicode text, UTF-8 (with BOM) text0.4423076923076923
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSource PortDest PortSource IPDest IP
                              Sep 1, 2024 18:16:01.038258076 CEST4970426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:01.043301105 CEST2670649704147.185.221.22192.168.2.5
                              Sep 1, 2024 18:16:01.043396950 CEST4970426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:01.072412014 CEST4970426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:01.077299118 CEST2670649704147.185.221.22192.168.2.5
                              Sep 1, 2024 18:16:22.446301937 CEST2670649704147.185.221.22192.168.2.5
                              Sep 1, 2024 18:16:22.446408987 CEST4970426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:27.468947887 CEST4970426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:27.469775915 CEST4971126706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:27.474178076 CEST2670649704147.185.221.22192.168.2.5
                              Sep 1, 2024 18:16:27.475507021 CEST2670649711147.185.221.22192.168.2.5
                              Sep 1, 2024 18:16:27.475581884 CEST4971126706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:27.475918055 CEST4971126706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:27.482297897 CEST2670649711147.185.221.22192.168.2.5
                              Sep 1, 2024 18:16:48.837759018 CEST2670649711147.185.221.22192.168.2.5
                              Sep 1, 2024 18:16:48.837946892 CEST4971126706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:53.843485117 CEST4971126706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:53.844274044 CEST4971326706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:53.991710901 CEST2670649711147.185.221.22192.168.2.5
                              Sep 1, 2024 18:16:53.991728067 CEST2670649713147.185.221.22192.168.2.5
                              Sep 1, 2024 18:16:53.991820097 CEST4971326706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:53.992177010 CEST4971326706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:16:53.997867107 CEST2670649713147.185.221.22192.168.2.5
                              Sep 1, 2024 18:17:15.357405901 CEST2670649713147.185.221.22192.168.2.5
                              Sep 1, 2024 18:17:15.357487917 CEST4971326706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:20.373354912 CEST4971326706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:20.374047995 CEST4971426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:20.382720947 CEST2670649713147.185.221.22192.168.2.5
                              Sep 1, 2024 18:17:20.383174896 CEST2670649714147.185.221.22192.168.2.5
                              Sep 1, 2024 18:17:20.383296967 CEST4971426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:20.383644104 CEST4971426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:20.389739037 CEST2670649714147.185.221.22192.168.2.5
                              Sep 1, 2024 18:17:41.796091080 CEST2670649714147.185.221.22192.168.2.5
                              Sep 1, 2024 18:17:41.796283007 CEST4971426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:46.810853004 CEST4971426706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:46.811939001 CEST4971526706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:46.815890074 CEST2670649714147.185.221.22192.168.2.5
                              Sep 1, 2024 18:17:46.817014933 CEST2670649715147.185.221.22192.168.2.5
                              Sep 1, 2024 18:17:46.817106962 CEST4971526706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:46.817395926 CEST4971526706192.168.2.5147.185.221.22
                              Sep 1, 2024 18:17:46.822520018 CEST2670649715147.185.221.22192.168.2.5
                              TimestampSource PortDest PortSource IPDest IP
                              Sep 1, 2024 18:16:00.959286928 CEST5106853192.168.2.51.1.1.1
                              Sep 1, 2024 18:16:00.984272003 CEST53510681.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Sep 1, 2024 18:16:00.959286928 CEST192.168.2.51.1.1.10x3cd1Standard query (0)com-distinct.gl.at.ply.ggA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Sep 1, 2024 18:16:00.984272003 CEST1.1.1.1192.168.2.50x3cd1No error (0)com-distinct.gl.at.ply.gg147.185.221.22A (IP address)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:12:15:49
                              Start date:01/09/2024
                              Path:C:\Users\user\Desktop\Stub.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\Stub.exe"
                              Imagebase:0x7f0000
                              File size:61'952 bytes
                              MD5 hash:E50E5C919322AD54BD5ED6EEFBA01619
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:12:15:53
                              Start date:01/09/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"' & exit
                              Imagebase:0x790000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:12:15:53
                              Start date:01/09/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6d64d0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:12:15:53
                              Start date:01/09/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpAD4A.tmp.bat""
                              Imagebase:0x790000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:5
                              Start time:12:15:54
                              Start date:01/09/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6d64d0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:6
                              Start time:12:15:54
                              Start date:01/09/2024
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:schtasks /create /f /sc onlogon /rl highest /tn "gang" /tr '"C:\Users\user\AppData\Roaming\gang.exe"'
                              Imagebase:0x80000
                              File size:187'904 bytes
                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:7
                              Start time:12:15:54
                              Start date:01/09/2024
                              Path:C:\Windows\SysWOW64\timeout.exe
                              Wow64 process (32bit):true
                              Commandline:timeout 3
                              Imagebase:0xe90000
                              File size:25'088 bytes
                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:8
                              Start time:12:15:55
                              Start date:01/09/2024
                              Path:C:\Users\user\AppData\Roaming\gang.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\AppData\Roaming\gang.exe
                              Imagebase:0xbe0000
                              File size:61'952 bytes
                              MD5 hash:E50E5C919322AD54BD5ED6EEFBA01619
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\gang.exe, Author: Joe Security
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 66%, ReversingLabs
                              • Detection: 59%, Virustotal, Browse
                              Reputation:low
                              Has exited:false

                              Target ID:9
                              Start time:12:15:57
                              Start date:01/09/2024
                              Path:C:\Users\user\AppData\Roaming\gang.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Roaming\gang.exe"
                              Imagebase:0x700000
                              File size:61'952 bytes
                              MD5 hash:E50E5C919322AD54BD5ED6EEFBA01619
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:19.1%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:17.1%
                                Total number of Nodes:35
                                Total number of Limit Nodes:4
                                execution_graph 4924 10809a8 4927 1080ab0 4924->4927 4925 10809c3 4929 1080add 4927->4929 4928 1080d1e 4928->4925 4929->4928 4932 1081528 4929->4932 4936 1081538 4929->4936 4933 1081538 4932->4933 4934 1081680 4933->4934 4940 1080774 4933->4940 4934->4929 4939 1081568 4936->4939 4937 1081680 4937->4929 4938 1080774 NtQueryInformationProcess 4938->4939 4939->4937 4939->4938 4941 1081798 NtQueryInformationProcess 4940->4941 4943 1081826 4941->4943 4943->4933 4962 1087b78 4963 1087b95 4962->4963 4966 10878b0 4963->4966 4967 1087bd8 CheckRemoteDebuggerPresent 4966->4967 4969 1087ba9 4967->4969 4944 108296d 4945 108298d 4944->4945 4946 1082a11 FindCloseChangeNotification 4945->4946 4948 10829ae 4945->4948 4951 1082a11 4945->4951 4950 1082a4e 4946->4950 4952 1082a21 FindCloseChangeNotification 4951->4952 4953 1082a4e 4952->4953 4953->4946 4954 10825cf 4955 1082576 OutputDebugStringW 4954->4955 4958 10825d4 4954->4958 4957 10825af 4955->4957 4959 10886a0 4960 10886e3 RtlSetProcessIsCritical 4959->4960 4961 1088714 4960->4961

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 319 10807aa-1082454 NtQueryInformationProcess 323 108245d-1082471 319->323 324 1082456-108245c 319->324 324->323
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 01082447
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: 09ac30e78a3e9052dd748ce073180cc4a17de6cd609c918db9d9903c66102432
                                • Instruction ID: 6dea33a6cc523b3e595badf2593106d3ea179756b753e78da5ed59a83dcd7dbf
                                • Opcode Fuzzy Hash: 09ac30e78a3e9052dd748ce073180cc4a17de6cd609c918db9d9903c66102432
                                • Instruction Fuzzy Hash: 892137B5909388DFCB11DF9AD850ACEBFF4FF49310F10845AE958A7261C374A514CBA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 326 10878b0-1087c5c CheckRemoteDebuggerPresent 329 1087c5e-1087c64 326->329 330 1087c65-1087ca0 326->330 329->330
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 01087C4F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 7155f80bb40a0e7a18cbaaecf87ffe8adcbf40b5c60f51dc2d55dc0221dd1bab
                                • Instruction ID: 92c0d4f2ccbf67c0127280c34e2941901063a0dffe62c9a5869cd1b652328e48
                                • Opcode Fuzzy Hash: 7155f80bb40a0e7a18cbaaecf87ffe8adcbf40b5c60f51dc2d55dc0221dd1bab
                                • Instruction Fuzzy Hash: 222136B18002598FCB10DF9AD484BEEFBF4EF49310F24846AE959A3350D778A944CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 339 10823c0-1082454 NtQueryInformationProcess 342 108245d-1082471 339->342 343 1082456-108245c 339->343 343->342
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 01082447
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: 8ebf866b06268cc76886f157e02920c92d6eda1cd5b590da272dee1e70e0f752
                                • Instruction ID: a74fc46d9dbca33483d26b40b7350602bf62b9573401392f5e92f7d2ac9e2806
                                • Opcode Fuzzy Hash: 8ebf866b06268cc76886f157e02920c92d6eda1cd5b590da272dee1e70e0f752
                                • Instruction Fuzzy Hash: 4B21DBB5901248DFCB10DF9AD884ADEBBF4FB49310F10842AE958A7210D379A940CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 345 1080774-1081824 NtQueryInformationProcess 348 108182d-1081841 345->348 349 1081826-108182c 345->349 349->348
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 01081817
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: b935efb3e48d05b684af734a57169ef0a4f838993310def3c956639ecf4ed498
                                • Instruction ID: 18550193044e97ea92721d342b6bf7e513408e1bbbf89ba32418f9192134f705
                                • Opcode Fuzzy Hash: b935efb3e48d05b684af734a57169ef0a4f838993310def3c956639ecf4ed498
                                • Instruction Fuzzy Hash: 6821D0B5900348DFCB10DF9AD884ADEBBF4FF48310F10842AEA58A7210C375A944CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 357 1081792-1081824 NtQueryInformationProcess 360 108182d-1081841 357->360 361 1081826-108182c 357->361 361->360
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 01081817
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: 3c90773b07bdc268daad7f8095329f025fcf0491dc9751915cca0e64809a4988
                                • Instruction ID: 4ecebfa76b8ed131f3bdbea9f7f03b8c1c7a6bfc4d0b084a4dcf30ad3f4a0199
                                • Opcode Fuzzy Hash: 3c90773b07bdc268daad7f8095329f025fcf0491dc9751915cca0e64809a4988
                                • Instruction Fuzzy Hash: 7521EDB5900248EFCB10DF9AD884ADEFBF4FF48310F10842AE958A7210C379A941CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 351 10807c4-1082454 NtQueryInformationProcess 354 108245d-1082471 351->354 355 1082456-108245c 351->355 355->354
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 01082447
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: c2139faa3e926298becb45fce2d4997b8aaddb4838ae07c2478d8a5af653668f
                                • Instruction ID: 234ad85ab0608f34e4b1b6af20e1b50effa0fb7dc928b410431310428b5707ff
                                • Opcode Fuzzy Hash: c2139faa3e926298becb45fce2d4997b8aaddb4838ae07c2478d8a5af653668f
                                • Instruction Fuzzy Hash: 2221DBB5901348DFCB10DF9AD884ADEBBF4FB48310F10842AEA58A7250C379A940CFA5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 37286cf2a33a7b3359c1a89944a0044c57503e49f7b2d32c781dd2e8f98d3f9d
                                • Instruction ID: e0e88869b35e8f4ae175a3b1f2ff209ae0b1425837f1f47b75da1c2102bd09d8
                                • Opcode Fuzzy Hash: 37286cf2a33a7b3359c1a89944a0044c57503e49f7b2d32c781dd2e8f98d3f9d
                                • Instruction Fuzzy Hash: 54D1AD31B046058FC718EF74C8516AEB7E2FF85304F24896AD49A9B385DB36ED478B81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e4d7a90e11a023e708d14f63ef1ae2cc850f7cb4bc18e877419e95219895001b
                                • Instruction ID: d5f4d88b60ee00aef6331503ee684e9a79fa0b8687a2c7bec7aa5dff516b9ac0
                                • Opcode Fuzzy Hash: e4d7a90e11a023e708d14f63ef1ae2cc850f7cb4bc18e877419e95219895001b
                                • Instruction Fuzzy Hash: EAB17E70E042098FDF50DFA9C8857EDBBF2EF88304F158129D895A7294EB759885CF81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 939edde44622716e066e599fdb970feabb0c5b032b92a6cbd6ad6a93681dc8b0
                                • Instruction ID: c27f2beadbe5d29b4e5feeb1e357b6990c56015dd121e708d5163758f9e2c255
                                • Opcode Fuzzy Hash: 939edde44622716e066e599fdb970feabb0c5b032b92a6cbd6ad6a93681dc8b0
                                • Instruction Fuzzy Hash: D1B15F70E042098FDF54DFA9D8817EDBFF2AF88314F248529D895E7258EB749841CB92

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 137 1082788-1082796 139 1082799-10827a1 137->139 140 1082782-1082783 139->140 141 10827a3-10827ac 139->141 140->137 142 108280c 141->142 143 10827ae-10827b9 141->143 145 108286c 142->145 146 108280e-1082820 142->146 143->139 144 10827bb-10827c0 143->144 147 10827c2-10827e1 144->147 148 10828cc-1082969 145->148 149 108286e-108289d 145->149 152 108289e-10828c0 146->152 153 1082822-1082826 146->153 157 10827e2-1082801 147->157 149->152 169 10828c2-10828c6 152->169 170 1082845-1082849 152->170 156 1082828-1082844 153->156 156->170 167 1082803-108280b 157->167 167->142 169->148 170->156 174 108284b-1082869 170->174
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f4345ee7c701582a200a88f43f93dd4aec496d5dfefb25f80c25b9dad730c407
                                • Instruction ID: 03768239482b1120faaf1b3cc6aedab6ffb4c1c3eb169214d0c92598e0f603b2
                                • Opcode Fuzzy Hash: f4345ee7c701582a200a88f43f93dd4aec496d5dfefb25f80c25b9dad730c407
                                • Instruction Fuzzy Hash: 65B1E16185E3E18FD707ABB898742C67FB4AF17214B1A40E7C4C0DB1A3D668494DC7BA

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 333 1087bd0-1087c5c CheckRemoteDebuggerPresent 335 1087c5e-1087c64 333->335 336 1087c65-1087ca0 333->336 335->336
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 01087C4F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 3fd58f7fc0212cbfff073654c284625ae30ffb7e2d7ac33b58fbafe432f54e62
                                • Instruction ID: a50cabe1a1b7a123d579e34c193d5d9ef87d10480cf5df0bae087cba8ae86fea
                                • Opcode Fuzzy Hash: 3fd58f7fc0212cbfff073654c284625ae30ffb7e2d7ac33b58fbafe432f54e62
                                • Instruction Fuzzy Hash: 3A2136B18012598FCB14CF9AD484BEEFBF4AF49310F24845EE459A7251C778A944CF61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 363 1082528-108257a 366 108257c-108257f 363->366 367 1082582-10825ad OutputDebugStringW 363->367 366->367 368 10825af-10825b5 367->368 369 10825b6-10825ca 367->369 368->369
                                APIs
                                • OutputDebugStringW.KERNELBASE(00000000), ref: 010825A0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: DebugOutputString
                                • String ID:
                                • API String ID: 1166629820-0
                                • Opcode ID: 1a63c1cbbf23a021ae59241a80660f92383654d5b7f9b608dd377ed741798505
                                • Instruction ID: 377f1a967e3fb0f66e149783fb48aab233c60302cafce5cd800a4e047df9a476
                                • Opcode Fuzzy Hash: 1a63c1cbbf23a021ae59241a80660f92383654d5b7f9b608dd377ed741798505
                                • Instruction Fuzzy Hash: EC1112B5C046599FCB14DF9AD444ADEFBF4FB49320F10816AD859A3240C378A644CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 371 10825cf-10825d2 372 10825d4 371->372 373 1082576-108257a 371->373 374 1082634 372->374 375 10825d6-10825e3 372->375 376 108257c-108257f 373->376 377 1082582-10825ad OutputDebugStringW 373->377 378 1082694-108269f 374->378 379 1082636-108264b 374->379 376->377 380 10825af-10825b5 377->380 381 10825b6-10825ca 377->381 379->378 380->381
                                APIs
                                • OutputDebugStringW.KERNELBASE(00000000), ref: 010825A0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: DebugOutputString
                                • String ID:
                                • API String ID: 1166629820-0
                                • Opcode ID: bd2ffe46d34f13da5e3fe9f53740b9f6eff1d894323f0368932c5bcf34094db5
                                • Instruction ID: 3842f856bc3094e9b5e4da1fb86e52b37160cfd69a192d603d094ab6e5fb4fe2
                                • Opcode Fuzzy Hash: bd2ffe46d34f13da5e3fe9f53740b9f6eff1d894323f0368932c5bcf34094db5
                                • Instruction Fuzzy Hash: 6411E3B58087448FCB11EF89D4683ADBBE0FF09320F20408AD5969B311D3359544CBA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 384 1082530-108257a 386 108257c-108257f 384->386 387 1082582-10825ad OutputDebugStringW 384->387 386->387 388 10825af-10825b5 387->388 389 10825b6-10825ca 387->389 388->389
                                APIs
                                • OutputDebugStringW.KERNELBASE(00000000), ref: 010825A0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: DebugOutputString
                                • String ID:
                                • API String ID: 1166629820-0
                                • Opcode ID: bdf1a28c424bf0fe272e85c4158b5ddd4ca82533e6f333beb430fb3e86dfa462
                                • Instruction ID: 1c70d1952375aee88e68296eba40956276c49dd5585416592aad2ac8a9b2606d
                                • Opcode Fuzzy Hash: bdf1a28c424bf0fe272e85c4158b5ddd4ca82533e6f333beb430fb3e86dfa462
                                • Instruction Fuzzy Hash: 171132B1C0065A9FCB14DF9AD444A9EFBF4FF48320F10812AD859B3240C378AA40CFA1
                                APIs
                                • FindCloseChangeNotification.KERNELBASE(00000000), ref: 01082A3F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: eb8e5c67725ffd28f32ad83b39c31e886d6e94d2b3787b6c7e5bbef6f71d4fa2
                                • Instruction ID: 9f7564f865af5f4211985e40df3a73d320717ac35f6a29801a1369b776d6498d
                                • Opcode Fuzzy Hash: eb8e5c67725ffd28f32ad83b39c31e886d6e94d2b3787b6c7e5bbef6f71d4fa2
                                • Instruction Fuzzy Hash: B6113AB18047498FDB20DF9AC4457EEFBF8EF48310F108469D558A3251D378A944CFA5
                                APIs
                                • RtlSetProcessIsCritical.NTDLL(?,?,?), ref: 01088705
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: CriticalProcess
                                • String ID:
                                • API String ID: 2695349919-0
                                • Opcode ID: 090cf511d166630bf0ba4f5f8ae2f2fbba6cb204ab085563a9766cb8262a915a
                                • Instruction ID: 001f9dfe0e4936a45f0ad9428b32686f3bbbda53335e594393b583d127bc2a33
                                • Opcode Fuzzy Hash: 090cf511d166630bf0ba4f5f8ae2f2fbba6cb204ab085563a9766cb8262a915a
                                • Instruction Fuzzy Hash: 001113B59002488FDB20DF9AC484BDEBFF4FB48314F20805AD958A7650C375A940CFA1
                                APIs
                                • RtlSetProcessIsCritical.NTDLL(?,?,?), ref: 01088705
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: CriticalProcess
                                • String ID:
                                • API String ID: 2695349919-0
                                • Opcode ID: 92db3588fa069d248b47b0bb1cd3a2cb73ad1cc7cb287203697fdeaa19708c73
                                • Instruction ID: 1423ffef30fb899b0d80953f1e40ce845072191cd0e57f7644bf7bd25b471e9b
                                • Opcode Fuzzy Hash: 92db3588fa069d248b47b0bb1cd3a2cb73ad1cc7cb287203697fdeaa19708c73
                                • Instruction Fuzzy Hash: 2D11F2B59006488FDB20EF9AC884BDEBFF4FB48314F208459D558A7250C775A944CFA5
                                APIs
                                • FindCloseChangeNotification.KERNELBASE(00000000), ref: 01082A3F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: 4d2e92d3d51fd91d0abc4d0582a4ba8465a7c201ef7a3310856ed510b87035bb
                                • Instruction ID: 7291ae04a238c359de8630ec38eea12f643b7c678cbdb21c19d7dea31171c355
                                • Opcode Fuzzy Hash: 4d2e92d3d51fd91d0abc4d0582a4ba8465a7c201ef7a3310856ed510b87035bb
                                • Instruction Fuzzy Hash: 5DF037B19002098FDB20DF99D4447EEFBF4EF48324F24846AD698A3251D778A585CFA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2035362406.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1080000_Stub.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c86cce2cb5bada4c72085ccc0e744e01c70c704f64f03da6d51ef9cb65134edf
                                • Instruction ID: 57ef76dc98794526aab2b48c53d1d492a455176614efa96eda5ffb7e044f51a5
                                • Opcode Fuzzy Hash: c86cce2cb5bada4c72085ccc0e744e01c70c704f64f03da6d51ef9cb65134edf
                                • Instruction Fuzzy Hash: F6916BB0E04209DFDF54EFA8C9917DDBBF2BF88314F158129D499A7294EB359842CB81

                                Execution Graph

                                Execution Coverage:14.4%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:36
                                Total number of Limit Nodes:4
                                execution_graph 5742 12209a8 5745 1220ab0 5742->5745 5743 12209c3 5747 1220add 5745->5747 5746 1220d1e 5746->5743 5747->5746 5750 1221528 5747->5750 5754 1221538 5747->5754 5753 1221568 5750->5753 5751 1221680 5751->5747 5753->5751 5758 1220774 5753->5758 5756 1221568 5754->5756 5755 1221680 5755->5747 5756->5755 5757 1220774 NtQueryInformationProcess 5756->5757 5757->5756 5759 1221798 NtQueryInformationProcess 5758->5759 5761 1221826 5759->5761 5761->5753 5762 12223c8 5763 1222413 NtQueryInformationProcess 5762->5763 5764 1222456 5763->5764 5765 1228648 5766 122868b RtlSetProcessIsCritical 5765->5766 5767 12286bc 5766->5767 5781 1227b78 5782 1227b96 5781->5782 5785 12278ac 5782->5785 5786 1227bd8 CheckRemoteDebuggerPresent 5785->5786 5788 1227ba9 5786->5788 5768 12218a9 5771 1221887 5768->5771 5769 12218a2 5769->5769 5771->5769 5772 12207cc 5771->5772 5773 12229e0 FindCloseChangeNotification 5772->5773 5775 1222a4e 5773->5775 5775->5771 5776 12225cf 5777 122255c OutputDebugStringW 5776->5777 5778 12225d4 5776->5778 5780 12225af 5777->5780

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 556 1220774-1221824 NtQueryInformationProcess 559 1221826-122182c 556->559 560 122182d-1221841 556->560 559->560
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 01221817
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: 0ca6e284c9967fc0dbac7c5ccabfb2e0522d84ba5bd90639153e6b4b3abeaf27
                                • Instruction ID: 7ca08172ed164783044f558c713296db7dfaa0bf8a1cf2515156c5e3897163fe
                                • Opcode Fuzzy Hash: 0ca6e284c9967fc0dbac7c5ccabfb2e0522d84ba5bd90639153e6b4b3abeaf27
                                • Instruction Fuzzy Hash: B521BFB5901359EFCB10DF9AD884ADEFBF5FB48310F10842AEA18A7210D375A954CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 562 12223c0-1222454 NtQueryInformationProcess 564 1222456-122245c 562->564 565 122245d-1222471 562->565 564->565
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 01222447
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: d3a43e4ddce032721543f2ebcc38d5356734219d0216c9d5147a50c0d9f5563b
                                • Instruction ID: 5afa46da8537320a1e81f59dfa81c97180402dc715dba664eac66e84a2d8b5e3
                                • Opcode Fuzzy Hash: d3a43e4ddce032721543f2ebcc38d5356734219d0216c9d5147a50c0d9f5563b
                                • Instruction Fuzzy Hash: 6321DEB5900259EFCB10CF9AD984ADEBBF5FB49310F10842AE918A7250C339A544CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 567 1221791-1221824 NtQueryInformationProcess 569 1221826-122182c 567->569 570 122182d-1221841 567->570 569->570
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 01221817
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: f6f344df77e1123f09f87b4767f26409cedf409ed8f73194caedec8f5eb1ed22
                                • Instruction ID: 8d058351422943755566ce5c40013313a89bbee7113c0e5010b72d809faa950f
                                • Opcode Fuzzy Hash: f6f344df77e1123f09f87b4767f26409cedf409ed8f73194caedec8f5eb1ed22
                                • Instruction Fuzzy Hash: 7F21DEB5900359EFCB10CF9AD984ADEBBF5FB48310F10842AE918A7210C375A954CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 572 12223c8-1222454 NtQueryInformationProcess 574 1222456-122245c 572->574 575 122245d-1222471 572->575 574->575
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 01222447
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: 5bc1858a2208a0497b8f74d2b34f47a11e0517e3c8ec977bca2beb6aca8ba373
                                • Instruction ID: e1efa23fcddf525f4dbdda7d1843a701eff3e26f74d9e1f7f3281294d65ede49
                                • Opcode Fuzzy Hash: 5bc1858a2208a0497b8f74d2b34f47a11e0517e3c8ec977bca2beb6aca8ba373
                                • Instruction Fuzzy Hash: B521BFB5901259EFCB10DF9AD884ADEFBF4FB49310F10842AEA18A7210D375A544CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 346 1222780-122278e 348 1222791-1222799 346->348 349 122279b-12227b1 348->349 350 12227b8-12227c4 348->350 349->348 351 12227b3-12227b6 349->351 352 12227c6-12227d9 350->352 353 1222824 350->353 351->350 356 12227db-12227f6 352->356 357 12227f8-12227f9 352->357 354 1222884-122288e 353->354 355 1222825-122283a 353->355 361 1222890-1222895 354->361 367 122283d-1222841 355->367 356->357 358 12227fb-1222816 357->358 359 1222818 357->359 358->359 362 1222896-12228b1 359->362 363 122281a-122281f 359->363 361->362 362->361 370 12228b3-12228b8 362->370 366 1222820-1222823 363->366 366->353 367->366 370->367 372 12228ba-1222961 370->372
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 595860028e59890703b7943e094f7405afaa161e74bf39e3d70034fd23964f78
                                • Instruction ID: 818b7012b1e624de43b814a1d71e944aed3f36aabde7434f2bf425d1f6dfe21f
                                • Opcode Fuzzy Hash: 595860028e59890703b7943e094f7405afaa161e74bf39e3d70034fd23964f78
                                • Instruction Fuzzy Hash: D791C87281D3E59FD7078B7898642D97FB49F17210F5A40EBC080CF1A3D5AA894AC776

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 517 1222965-1222a19 523 1222a21-1222a4c FindCloseChangeNotification 517->523 524 1222a55-1222a76 523->524 525 1222a4e-1222a54 523->525 525->524
                                APIs
                                • FindCloseChangeNotification.KERNELBASE(00000000), ref: 01222A3F
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: c1538aca0f324a6c8855d1dc0d73bce57d46fc88900ad1bda0c25f48a736922e
                                • Instruction ID: 9a1c8a32ef08a7ddb5d4cf9182ed8ad4518972fc669eecac816d9a68eece7a92
                                • Opcode Fuzzy Hash: c1538aca0f324a6c8855d1dc0d73bce57d46fc88900ad1bda0c25f48a736922e
                                • Instruction Fuzzy Hash: E731CF718093948FCB11CF6DD8847EABFF4EF1A314F14409BD184AB263D6799948CBA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 527 12278ac-1227c5c CheckRemoteDebuggerPresent 530 1227c65-1227ca0 527->530 531 1227c5e-1227c64 527->531 531->530
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 01227C4F
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 3e74cafc6937fad8a59d962494bcd59ac83691d6a9f8699d07b1a8404d1eda4d
                                • Instruction ID: c040650d405940311b21c8c936db4ef717f5c3c194a5fe9a0904fd1b68b8271c
                                • Opcode Fuzzy Hash: 3e74cafc6937fad8a59d962494bcd59ac83691d6a9f8699d07b1a8404d1eda4d
                                • Instruction Fuzzy Hash: 7B2136B18002599FCB10DFAAD484BEEBBF4EF59310F14846AE959B3350D778A944CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 534 1227bd0-1227c5c CheckRemoteDebuggerPresent 536 1227c65-1227ca0 534->536 537 1227c5e-1227c64 534->537 537->536
                                APIs
                                • CheckRemoteDebuggerPresent.KERNELBASE(00000000,?), ref: 01227C4F
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 55836db4f7505785a48554e6528d9b44932b2c248e16743802d5bd75851713fe
                                • Instruction ID: 2a83712c19d21cc6f795155b40b5629c9cbe11acb729a0afac36d77509f62e93
                                • Opcode Fuzzy Hash: 55836db4f7505785a48554e6528d9b44932b2c248e16743802d5bd75851713fe
                                • Instruction Fuzzy Hash: A32178B18012598FCB10CFAAD484BEEFBF4AF48310F14846AE459A7350C738A944CFA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 540 12225cf-12225d2 541 12225d4 540->541 542 122255c-122257a 540->542 543 12225d6-12225e1 541->543 544 1222634 541->544 550 1222582-12225ad OutputDebugStringW 542->550 551 122257c-122257f 542->551 549 122261f-122262e 543->549 545 1222694 544->545 546 1222635-1222643 544->546 548 1222696-1222697 545->548 545->549 546->545 549->544 552 12225b6-12225ca 550->552 553 12225af-12225b5 550->553 551->550 553->552
                                APIs
                                • OutputDebugStringW.KERNELBASE(00000000), ref: 012225A0
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: DebugOutputString
                                • String ID:
                                • API String ID: 1166629820-0
                                • Opcode ID: 76f36d34d19dcd8745df65722c35d309e95d8dc5ac796926c3f20b676496ee25
                                • Instruction ID: aea693f5f268d208c4d213bb63a10e0688fce1e283ef16d2bdc7f67cf664f0d0
                                • Opcode Fuzzy Hash: 76f36d34d19dcd8745df65722c35d309e95d8dc5ac796926c3f20b676496ee25
                                • Instruction Fuzzy Hash: 3721CCB1814369DFCB15DF69D06429EBFF0AF15320F24808AC105AB262C3799A09CBE1
                                APIs
                                • OutputDebugStringW.KERNELBASE(00000000), ref: 012225A0
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: DebugOutputString
                                • String ID:
                                • API String ID: 1166629820-0
                                • Opcode ID: 25cd112947c69c503d0c28e600f5658192528e18d7d9a83c54b6a0bbb462a719
                                • Instruction ID: 5d6ef39261556290a412c37af314b390626b18cc6b96f53c57496fdbd63a10e3
                                • Opcode Fuzzy Hash: 25cd112947c69c503d0c28e600f5658192528e18d7d9a83c54b6a0bbb462a719
                                • Instruction Fuzzy Hash: CB1144B5C1021ADFCB14CF9AD544AEEFBB4FB48310F10811AD919B3240C778A644CFA5
                                APIs
                                • OutputDebugStringW.KERNELBASE(00000000), ref: 012225A0
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: DebugOutputString
                                • String ID:
                                • API String ID: 1166629820-0
                                • Opcode ID: e42236a6634cc55e13fccf31335b2c4edc78ddf2e5ea67b27b32fae81a9987dc
                                • Instruction ID: 5627a92247c5728f17d396af795778bb8678d2728eb6d2ffddbd08675777697c
                                • Opcode Fuzzy Hash: e42236a6634cc55e13fccf31335b2c4edc78ddf2e5ea67b27b32fae81a9987dc
                                • Instruction Fuzzy Hash: 0E1120B1C0065A9BCB14DF9AD444A9EFBF8FB48320F10812AD919A3240C778AA44CFE5
                                APIs
                                • FindCloseChangeNotification.KERNELBASE(00000000), ref: 01222A3F
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: 205eedee421cb0f437cdaffa65e5fa026f1f5885b8d239b94d4d2a4e77b3fdf0
                                • Instruction ID: e1e014151dfc447a176fd1e1b1d289b25296c6f2ab21ff3820270ec343e3546c
                                • Opcode Fuzzy Hash: 205eedee421cb0f437cdaffa65e5fa026f1f5885b8d239b94d4d2a4e77b3fdf0
                                • Instruction Fuzzy Hash: BF1128B1800259DFDB20DF9AC545BEEFBF8EF48310F208469D918A3251D779A944CFA5
                                APIs
                                • FindCloseChangeNotification.KERNELBASE(00000000), ref: 01222A3F
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: c35033051ed8d8fd0917c67a3ef035a1f1bbb184c935c3d1c87f9746b5dbbb13
                                • Instruction ID: dd63dfcb494362f649aaf1a97bff10cb1518db9a4cb1652c62bca28e9bfe957e
                                • Opcode Fuzzy Hash: c35033051ed8d8fd0917c67a3ef035a1f1bbb184c935c3d1c87f9746b5dbbb13
                                • Instruction Fuzzy Hash: F01158B1800249CFCB10DF9AC445BEEFBF8EB48310F208469D918A3650D378A940CFA5
                                APIs
                                • RtlSetProcessIsCritical.NTDLL(?,?,?), ref: 012286AD
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: CriticalProcess
                                • String ID:
                                • API String ID: 2695349919-0
                                • Opcode ID: 2cd0e9d070e57a2c4a9b1086dfd149760fd6edb3f45235b99ecbe00739cae9a5
                                • Instruction ID: 6066c711f3eddee2f39c2f1ca83062925432f756a9435dbd181b13a368800887
                                • Opcode Fuzzy Hash: 2cd0e9d070e57a2c4a9b1086dfd149760fd6edb3f45235b99ecbe00739cae9a5
                                • Instruction Fuzzy Hash: 4A11F5B58106499FDB20DF9AC984ADEBFF8EB48310F208419D518A7250D779A544CFE5
                                APIs
                                • RtlSetProcessIsCritical.NTDLL(?,?,?), ref: 012286AD
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217280276.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_1220000_gang.jbxd
                                Similarity
                                • API ID: CriticalProcess
                                • String ID:
                                • API String ID: 2695349919-0
                                • Opcode ID: a8efcbd23930a8b2b6757e37faee07df1380d70ea548c7849aeb746e641fe2b5
                                • Instruction ID: eafc6ac6eeae4a91cebd9c553036488cac0a9714915893187bcee97d07f8a6c9
                                • Opcode Fuzzy Hash: a8efcbd23930a8b2b6757e37faee07df1380d70ea548c7849aeb746e641fe2b5
                                • Instruction Fuzzy Hash: 011103B58006499FDB20DF9AC884BDEFFF4EF88310F208419D618A7250C778A944CFA5
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217057510.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_11cd000_gang.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 88921d08f6622e60ff521349cfb660d673e84e2c05c9ae6719b586705d2a78c6
                                • Instruction ID: 3041de0029fba715487737a27adbaed2e4cac2a67fbad5a82372be06b23e0a33
                                • Opcode Fuzzy Hash: 88921d08f6622e60ff521349cfb660d673e84e2c05c9ae6719b586705d2a78c6
                                • Instruction Fuzzy Hash: 0321E271500244DFDF099F98E9C0B66FF65FBA4720F20C57DDA090A656C33AE416C6E2
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217108974.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_11dd000_gang.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1b69a29a83a8cbf86c67e4ec978cfe59d941ac84637411587f9aa9521ebb16b7
                                • Instruction ID: ce7a1611f744d76cdfb06362a269a33f2fca264320bbbc32e80868da1bfb2516
                                • Opcode Fuzzy Hash: 1b69a29a83a8cbf86c67e4ec978cfe59d941ac84637411587f9aa9521ebb16b7
                                • Instruction Fuzzy Hash: 4521F271644204EFDF09DFA8E980B26BBA5FB84314F20C56DD9094B296C33AD406CAA2
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217057510.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_11cd000_gang.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                • Instruction ID: aa8e372027ae8c621d2ab498b2b936e702cc62d7f679ddf462f682a740854c1f
                                • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                • Instruction Fuzzy Hash: 6211CD72404280DFCF06CF44D5C4B56FF62FB94320F24C5A9DA090AA56C33AE45ACBA2
                                Memory Dump Source
                                • Source File: 00000008.00000002.3217108974.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_11dd000_gang.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                • Instruction ID: 0e71d71712355c74520d73bd81c5ce4fcc04043000574553cfead68669e0d356
                                • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                • Instruction Fuzzy Hash: 7611DD75504280DFDB06CF68E9C4B15FFB2FB84314F24C6A9D8494B296C33AD40ACBA2

                                Execution Graph

                                Execution Coverage:24.7%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:64
                                Total number of Limit Nodes:8
                                execution_graph 2059 2811e61 2062 2811e3f 2059->2062 2060 2811e5a 2060->2060 2062->2060 2063 2810804 2062->2063 2064 2813058 FindCloseChangeNotification 2063->2064 2066 28130c6 2064->2066 2066->2062 2155 2812fa0 2156 2812fa8 OutputDebugStringW 2155->2156 2158 2813027 2156->2158 2067 28109a7 2072 2810abf 2067->2072 2069 28109c9 2074 2810add 2072->2074 2073 28109c3 2077 2811857 2073->2077 2074->2073 2082 2811532 2074->2082 2086 2811538 2074->2086 2079 2811875 2077->2079 2078 2811ab0 2078->2069 2079->2078 2094 2811af0 2079->2094 2098 2811aef 2079->2098 2083 2811568 2082->2083 2084 2811680 2083->2084 2090 2810774 2083->2090 2084->2074 2089 2811568 2086->2089 2087 2810774 NtQueryInformationProcess 2087->2089 2088 2811680 2088->2074 2089->2087 2089->2088 2091 2811798 NtQueryInformationProcess 2090->2091 2093 2811826 2091->2093 2093->2083 2096 2811b20 2094->2096 2095 2811c38 2095->2079 2096->2095 2102 28107c4 2096->2102 2101 2811b20 2098->2101 2099 2811c38 2099->2079 2100 28107c4 NtQueryInformationProcess 2100->2101 2101->2099 2101->2100 2103 2811d50 NtQueryInformationProcess 2102->2103 2105 2811dde 2103->2105 2105->2096 2106 28109a8 2107 28109c3 2106->2107 2110 2810abf NtQueryInformationProcess 2106->2110 2109 2811857 NtQueryInformationProcess 2107->2109 2108 28109c9 2109->2108 2110->2107 2141 2811e0f 2142 2811e2b 2141->2142 2143 2810804 FindCloseChangeNotification 2142->2143 2144 2811e5a 2142->2144 2143->2142 2149 2813050 2150 2813099 FindCloseChangeNotification 2149->2150 2151 28130c6 2150->2151 2115 28128f2 2118 28124b7 2115->2118 2120 2810828 2115->2120 2117 2810828 FindCloseChangeNotification 2117->2118 2118->2117 2119 28124d2 2118->2119 2121 2813058 FindCloseChangeNotification 2120->2121 2123 28130c6 2121->2123 2123->2118 2152 2811797 2153 28117e3 NtQueryInformationProcess 2152->2153 2154 2811826 2153->2154 2128 281227a 2129 2810804 FindCloseChangeNotification 2128->2129 2131 2811e3f 2128->2131 2129->2131 2130 2810804 FindCloseChangeNotification 2130->2131 2131->2130 2132 2811e5a 2131->2132

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 106 28107c4-2811ddc NtQueryInformationProcess 109 2811de5-2811df9 106->109 110 2811dde-2811de4 106->110 110->109
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 02811DCF
                                Memory Dump Source
                                • Source File: 00000009.00000002.2115738332.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_2810000_gang.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: 63dfec4a7d6b3e57c9b711cddf00040963bd03b573af9c4c16602e4031b4df87
                                • Instruction ID: c4f1fd5fa36d986b20a2fd683cb3fc87239859682b846c14bb3ae8223cf2eb68
                                • Opcode Fuzzy Hash: 63dfec4a7d6b3e57c9b711cddf00040963bd03b573af9c4c16602e4031b4df87
                                • Instruction Fuzzy Hash: BE21B2B9901249DFCB10DF9AD884ADEBBF4FB49310F108429EA18A7250D375A954CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 100 2810774-2811824 NtQueryInformationProcess 103 2811826-281182c 100->103 104 281182d-2811841 100->104 103->104
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 02811817
                                Memory Dump Source
                                • Source File: 00000009.00000002.2115738332.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_2810000_gang.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: 29a44c4c85db37dbc8d652e3379029150e4b7b77785392bde33946e8efcc758c
                                • Instruction ID: 26f54197834ef58b5e37f21378cb84996cd2fae99d3b8d7b642456f1858faf10
                                • Opcode Fuzzy Hash: 29a44c4c85db37dbc8d652e3379029150e4b7b77785392bde33946e8efcc758c
                                • Instruction Fuzzy Hash: 4021B2B5900349DFCB10DF9AD884ADEFBF8FB49314F10842AEA18A7250D375A954CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 112 2811797-2811824 NtQueryInformationProcess 114 2811826-281182c 112->114 115 281182d-2811841 112->115 114->115
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 02811817
                                Memory Dump Source
                                • Source File: 00000009.00000002.2115738332.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_2810000_gang.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: 399b3428738c3e5310909789ce0040ad7927b33901d170b9bad137f73d17572d
                                • Instruction ID: eb0b4c096e394ad35c0764584a84ab5abfd9922d1c86bca9a78a1a1010ce8f25
                                • Opcode Fuzzy Hash: 399b3428738c3e5310909789ce0040ad7927b33901d170b9bad137f73d17572d
                                • Instruction Fuzzy Hash: 3421ABB99012499FCB10CF9AD884ADEBBF4FB49310F10852AE918A7250D379A954CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 117 2811d4f-2811ddc NtQueryInformationProcess 119 2811de5-2811df9 117->119 120 2811dde-2811de4 117->120 120->119
                                APIs
                                • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 02811DCF
                                Memory Dump Source
                                • Source File: 00000009.00000002.2115738332.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_2810000_gang.jbxd
                                Similarity
                                • API ID: InformationProcessQuery
                                • String ID:
                                • API String ID: 1778838933-0
                                • Opcode ID: e03e8a1a31bdd692fa10125d0edd21332b2836fed8fbcf65bf8b496b92e42b05
                                • Instruction ID: 8627338503cea4a9edde8bafa51e59c4b34e2e34abf7c567100e695691b05b6d
                                • Opcode Fuzzy Hash: e03e8a1a31bdd692fa10125d0edd21332b2836fed8fbcf65bf8b496b92e42b05
                                • Instruction Fuzzy Hash: 8021BFB99012499FCB10CF9AD884ADEBBF4FB49310F10852AE918A7250D375A944CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 122 2812fa0-2812ff2 125 2812ff4-2812ff7 122->125 126 2812ffa-2813025 OutputDebugStringW 122->126 125->126 127 2813027-281302d 126->127 128 281302e-2813042 126->128 127->128
                                APIs
                                • OutputDebugStringW.KERNELBASE(00000000), ref: 02813018
                                Memory Dump Source
                                • Source File: 00000009.00000002.2115738332.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_2810000_gang.jbxd
                                Similarity
                                • API ID: DebugOutputString
                                • String ID:
                                • API String ID: 1166629820-0
                                • Opcode ID: b773c925ce9396c8d4f0d034ce24411a0c2dc96f7228a52939bb99c21523c06d
                                • Instruction ID: db5c94e332b6d4b2b4a207656ec666985da1af0f307ecfc0b4cef781a54d2c81
                                • Opcode Fuzzy Hash: b773c925ce9396c8d4f0d034ce24411a0c2dc96f7228a52939bb99c21523c06d
                                • Instruction Fuzzy Hash: 8A1134B9C006599BCB14DF9AD545B9EFBF8FF49310F10816AD818B3240D378AA44CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 130 2810804-28130c4 FindCloseChangeNotification 133 28130c6-28130cc 130->133 134 28130cd-28130ee 130->134 133->134
                                APIs
                                • FindCloseChangeNotification.KERNELBASE(00000000), ref: 028130B7
                                Memory Dump Source
                                • Source File: 00000009.00000002.2115738332.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_2810000_gang.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: 72c56c98324c29b0921d4b1dcc2f6642447b45163e4f55c64fa9effd9e50b4e8
                                • Instruction ID: b00e2cbdb6b11b94a065820375217643219be236bcbb28ffbc03291bd612b3ef
                                • Opcode Fuzzy Hash: 72c56c98324c29b0921d4b1dcc2f6642447b45163e4f55c64fa9effd9e50b4e8
                                • Instruction Fuzzy Hash: C4113AB5900249CFCB10DF9AC445BEEFBF8EF49314F108469D558A3251D378A944CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 136 2810828-28130c4 FindCloseChangeNotification 139 28130c6-28130cc 136->139 140 28130cd-28130ee 136->140 139->140
                                APIs
                                • FindCloseChangeNotification.KERNELBASE(00000000), ref: 028130B7
                                Memory Dump Source
                                • Source File: 00000009.00000002.2115738332.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_2810000_gang.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: a923302aa2cbc4b276568725699d389f30a1732731b664fcf6c8799015e639d2
                                • Instruction ID: d4c86ee5dd12fadfbcf588c9c9853aa8ac05a0e9296a77bb6de2fdc5e29931e0
                                • Opcode Fuzzy Hash: a923302aa2cbc4b276568725699d389f30a1732731b664fcf6c8799015e639d2
                                • Instruction Fuzzy Hash: 621125B5900649CFCB20DF9AC445BEEBBF8EB49324F10846AD518A3291D378A944CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 142 2812fa8-2812ff2 144 2812ff4-2812ff7 142->144 145 2812ffa-2813025 OutputDebugStringW 142->145 144->145 146 2813027-281302d 145->146 147 281302e-2813042 145->147 146->147
                                APIs
                                • OutputDebugStringW.KERNELBASE(00000000), ref: 02813018
                                Memory Dump Source
                                • Source File: 00000009.00000002.2115738332.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_2810000_gang.jbxd
                                Similarity
                                • API ID: DebugOutputString
                                • String ID:
                                • API String ID: 1166629820-0
                                • Opcode ID: 98bea84309c900bb24324971a841b5a12776494f409e88890d22f2645f3eb068
                                • Instruction ID: 41e0cb3670143b086bd466b5971ee50680479fe4e86e4a93e7918e516189315c
                                • Opcode Fuzzy Hash: 98bea84309c900bb24324971a841b5a12776494f409e88890d22f2645f3eb068
                                • Instruction Fuzzy Hash: ED1102B9C0065A9BCB14DF9AD544B9EFBF8FF49320F10815AD818B3240D778AA44CFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 149 2813050-2813091 150 2813099-28130c4 FindCloseChangeNotification 149->150 151 28130c6-28130cc 150->151 152 28130cd-28130ee 150->152 151->152
                                APIs
                                • FindCloseChangeNotification.KERNELBASE(00000000), ref: 028130B7
                                Memory Dump Source
                                • Source File: 00000009.00000002.2115738332.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_2810000_gang.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: 8de80d648b539768d021486492834dc062a5a82330f24fd86ac8c624beb46d2d
                                • Instruction ID: 7a0b1772de687c8875deade539b28d3a5500f7c24417e0aaa1a898b6fa6e13ad
                                • Opcode Fuzzy Hash: 8de80d648b539768d021486492834dc062a5a82330f24fd86ac8c624beb46d2d
                                • Instruction Fuzzy Hash: EF1116B58006498FDB10DF9AC445BEEBBF4EF49310F20845AD558A3251D378A544CFA5
                                Memory Dump Source
                                • Source File: 00000009.00000002.2113739721.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_cad000_gang.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f8e55a4996fea4b3a8e930d64d5a76a2aa6677aa4f5914d1543ea50fe86dc8b6
                                • Instruction ID: 77d2bfe3df698a0950d6e441a707f88cd99f52dce362e86bda838d6043f224c8
                                • Opcode Fuzzy Hash: f8e55a4996fea4b3a8e930d64d5a76a2aa6677aa4f5914d1543ea50fe86dc8b6
                                • Instruction Fuzzy Hash: E52142B1900205DFCB05DF14C9C4F26BFA5FB9932CF248569E90B0B656C33AD946DBA2
                                Memory Dump Source
                                • Source File: 00000009.00000002.2113739721.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_2_cad000_gang.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                • Instruction ID: aef569f34214cde05e57b8599ca5599f153efc9c9dc14797f3ff0fcaebbfc0a8
                                • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                • Instruction Fuzzy Hash: A71126B6804340CFCB02CF00D5C4B16BF71FB99318F24C6A9D90A0B656C33AD95ACBA2