Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XCS1lNZ26O.exe

Overview

General Information

Sample name:XCS1lNZ26O.exe
renamed because original name is a hash value
Original sample name:81b91fcc443627c1f93f38451cd55079.exe
Analysis ID:1522466
MD5:81b91fcc443627c1f93f38451cd55079
SHA1:45678692d8ae0e7398d99ff14089ca286b4d0d4c
SHA256:af93dec8d543cfcb877a0d511e995e6988519f21174c63f2bfd623495f34cbc9
Tags:AsyncRATexeRATuser-abuse_ch
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • XCS1lNZ26O.exe (PID: 4268 cmdline: "C:\Users\user\Desktop\XCS1lNZ26O.exe" MD5: 81B91FCC443627C1F93F38451CD55079)
    • MyApp.exe (PID: 7100 cmdline: "C:\Users\user\AppData\Local\Microsoft\MyApp.exe" MD5: 81B91FCC443627C1F93F38451CD55079)
      • cvtres.exe (PID: 6740 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"External_config_on_Pastebin": "null", "Server": "dox2025.serveirc.com", "Ports": "4444,8888", "Version": "Xchallenger | 3Losh", "Autorun": "false", "Install_Folder": "Q1pJa01iRVIzTENHbTJYeHJBckhxRVdXa1lpR250aDQ=", "Install_File": "i3jd7xa5QNUqVMrtRHZl50Z/05h+o4nfCUc/M9+MN4Wult/3utPkzANfMMFC+7LUbzb5funZcWHz1mPj044Hp3Nndvcx/ny9cZtgzxKP6s0=", "AES_key": "CZIkMbER3LCGm2XxrArHqEWWkYiGnth4", "Mutex": "Vy9O/gADUUUFEnabd0J7i0cf2J70ToBbuJYvZnjvhsvNFh4sMEJe7ZeItlNpY46HxtL2J6k49xTNVQaZg9F4SqwlxJB2O6WahYpQXZncOlNsTzAcwUQqBAtWVe0nU+RfR1G80Ot7cbMHNFPhqsnq0rXM1rI/qITShDD/2I210J/TCilUN9cUO9m4lEwzIBvewHuzGWGNExrBYZMgw/mVLfufS0EMa6E7oXVZqo7QpsUOPqtFP/pQ/99eIalQebKwDU43Ctax+qlQAY5xy0fcm4NrTyJngThB7zLBB11xE/rpoaKuMr6D5RvVpAPTJ7x6tPm+yujrN/jjXArsBhc+6NjYPYWMoc4zY1YErMa2iHpC70spFgg5GkgyIql+MZMyreJ0HwFqNulE7wSN151ffBwnVxCU+CwkZCE9j+o4jmG2LO63CjS2QjbwyjXZzyTdbRQ/5SqPuxHIq4eHqdztml5E2mO9UIhxgOCwfVICjY326K/L68EXB7Og/PlWT8fV2x0aMYIS8rtBrmCf8srhH6AXPTbWxTyR2RkKHifZ+BeAm0se83NxoVGxPivnF7gvRAOhAbAqoFFYBy3b1eDgG5p31e67hKf2x6ufEc58ntqjYlYMIeiIqHPCZXSM6ARO9v/wDpIJhpcPGbIuNSMbtUcAe3Yb6YN9sgzmrH+p4V4=", "Certificate": "false", "ServerSignature": "true", "BDOS": "false", "Startup_Delay": "3", "Group": "null"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0xc736:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xe82e:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        7.2.cvtres.exe.400000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          7.2.cvtres.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0xc936:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          5.2.MyApp.exe.2a38002bb30.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            5.2.MyApp.exe.2a38002bb30.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0xab36:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            5.2.MyApp.exe.2a38002bb30.0.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              Click to see the 1 entries

              System Summary

              barindex
              Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Microsoft\MyApp.exe, ProcessId: 7100, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AnyDesk.lnk
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: XCS1lNZ26O.exeAvira: detected
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeAvira: detection malicious, Label: HEUR/AGEN.1361722
              Source: 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "dox2025.serveirc.com", "Ports": "4444,8888", "Version": "Xchallenger | 3Losh", "Autorun": "false", "Install_Folder": "Q1pJa01iRVIzTENHbTJYeHJBckhxRVdXa1lpR250aDQ=", "Install_File": "i3jd7xa5QNUqVMrtRHZl50Z/05h+o4nfCUc/M9+MN4Wult/3utPkzANfMMFC+7LUbzb5funZcWHz1mPj044Hp3Nndvcx/ny9cZtgzxKP6s0=", "AES_key": "CZIkMbER3LCGm2XxrArHqEWWkYiGnth4", "Mutex": "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", "Certificate": "false", "ServerSignature": "true", "BDOS": "false", "Startup_Delay": "3", "Group": "null"}
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeReversingLabs: Detection: 47%
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeVirustotal: Detection: 56%Perma Link
              Source: XCS1lNZ26O.exeReversingLabs: Detection: 47%
              Source: XCS1lNZ26O.exeVirustotal: Detection: 56%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeJoe Sandbox ML: detected
              Source: XCS1lNZ26O.exeJoe Sandbox ML: detected
              Source: XCS1lNZ26O.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Malware configuration extractorURLs: dox2025.serveirc.com
              Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 7.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.MyApp.exe.2a38002bb30.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.MyApp.exe.2a38002bb30.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MyApp.exe PID: 7100, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 6740, type: MEMORYSTR
              Source: 5.2.MyApp.exe.2a38002bb30.0.raw.unpack, LimeLogger.cs.Net Code: KeyboardLayout

              System Summary

              barindex
              Source: 7.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 5.2.MyApp.exe.2a38002bb30.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 5.2.MyApp.exe.2a38002bb30.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: cvtres.exe PID: 6740, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeCode function: 0_2_00007FFD9B8912FC0_2_00007FFD9B8912FC
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeCode function: 0_2_00007FFD9B890CE40_2_00007FFD9B890CE4
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeCode function: 0_2_00007FFD9B890F3C0_2_00007FFD9B890F3C
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeCode function: 0_2_00007FFD9B891DD90_2_00007FFD9B891DD9
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeCode function: 0_2_00007FFD9B8929460_2_00007FFD9B892946
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeCode function: 0_2_00007FFD9B8929460_2_00007FFD9B892946
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeCode function: 5_2_00007FFD9B8712FC5_2_00007FFD9B8712FC
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeCode function: 5_2_00007FFD9B870F3C5_2_00007FFD9B870F3C
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeCode function: 5_2_00007FFD9B871DD95_2_00007FFD9B871DD9
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeCode function: 5_2_00007FFD9B870CE45_2_00007FFD9B870CE4
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeCode function: 5_2_00007FFD9B8729465_2_00007FFD9B872946
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeCode function: 5_2_00007FFD9B8729465_2_00007FFD9B872946
              Source: XCS1lNZ26O.exeStatic PE information: invalid certificate
              Source: XCS1lNZ26O.exeStatic PE information: No import functions for PE file found
              Source: MyApp.exe.0.drStatic PE information: No import functions for PE file found
              Source: XCS1lNZ26O.exe, 00000000.00000002.2308536238.0000028728256000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename@Dox_2.exen' vs XCS1lNZ26O.exe
              Source: XCS1lNZ26O.exe, 00000000.00000000.1682480832.0000028714B1C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename$ vs XCS1lNZ26O.exe
              Source: XCS1lNZ26O.exe, 00000000.00000002.2323082395.000002872EEB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename@Dox_2.exen' vs XCS1lNZ26O.exe
              Source: XCS1lNZ26O.exeBinary or memory string: OriginalFilename$ vs XCS1lNZ26O.exe
              Source: 7.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 5.2.MyApp.exe.2a38002bb30.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 5.2.MyApp.exe.2a38002bb30.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: cvtres.exe PID: 6740, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 5.2.MyApp.exe.2a38002bb30.0.raw.unpack, Settings.csBase64 encoded string: 'SBVdQtDYN9gFrBId+sO8der+hBTNwETh1H6wDVXTqm7EsrH6vSMNhw5uzzfOAhx/KCEllNStKiclQhbya0gSTA==', 'imMXblR4Dl/PBGCmuX0XMMiWh/LPswF89CBcSWsnHMIsYPj/aLQWK1TVnllu7fq8N8mzPeTKCVCSAqYEfPqJO6fDzJhGBtprvJ1IsebUurY=', 'H+VpgrEI8xntrsFvHjgPJAvFJ6S9mAaUPkCkJS3qIvxu4cUKfCFz//lHMRG0uB4LlSHhpg5o4svW5Og1ZTT+Kg==', 'i3jd7xa5QNUqVMrtRHZl50Z/05h+o4nfCUc/M9+MN4Wult/3utPkzANfMMFC+7LUbzb5funZcWHz1mPj044Hp3Nndvcx/ny9cZtgzxKP6s0=', 'sEUzFZritEkn6n/Li8He+RV5nB4zcZCdqZbIGE0R3b3gSskddNEil+k+uZ+Yj3aNEkA+g4jTqfVgrw/g/EbAjA==', 'WUf70kEKs9OHQ2sHkwFnifqeCtGbjn5Z7Xb8z3oiZ9IMtTQCQfVoDw+fjoLBaDDXkDSenilYMIe6+BTpq75FoQ==', 'pGEvscW97c8keX6EkSQM/gLxoQSbMwfKddh2209Ga3JfvablCf1m0vIfFU3aLuxnOhs4+bIuAJuDCUtCBa8t7Q=='
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/5@1/0
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeFile created: C:\Users\user\AppData\Local\XboxJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMutant created: NULL
              Source: XCS1lNZ26O.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: XCS1lNZ26O.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: XCS1lNZ26O.exeReversingLabs: Detection: 47%
              Source: XCS1lNZ26O.exeVirustotal: Detection: 56%
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeFile read: C:\Users\user\Desktop\XCS1lNZ26O.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\XCS1lNZ26O.exe "C:\Users\user\Desktop\XCS1lNZ26O.exe"
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess created: C:\Users\user\AppData\Local\Microsoft\MyApp.exe "C:\Users\user\AppData\Local\Microsoft\MyApp.exe"
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess created: C:\Users\user\AppData\Local\Microsoft\MyApp.exe "C:\Users\user\AppData\Local\Microsoft\MyApp.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"Jump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: AnyDesk.lnk.5.drLNK file: ..\..\..\..\..\..\..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Source: XCS1lNZ26O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: XCS1lNZ26O.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: XCS1lNZ26O.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: XCS1lNZ26O.exeStatic file information: File size 4384832 > 1048576
              Source: XCS1lNZ26O.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x419200
              Source: XCS1lNZ26O.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: XCS1lNZ26O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

              Data Obfuscation

              barindex
              Source: 5.2.MyApp.exe.2a38002bb30.0.raw.unpack, Packet.cs.Net Code: Plugins System.AppDomain.Load(byte[])
              Source: XCS1lNZ26O.exeStatic PE information: 0xCCFF75A6 [Mon Dec 26 15:24:22 2078 UTC]
              Source: XCS1lNZ26O.exeStatic PE information: real checksum: 0x43901a should be: 0x439ad6
              Source: MyApp.exe.0.drStatic PE information: real checksum: 0x43901a should be: 0x439ad6
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeCode function: 5_2_00007FFD9B88062A push ebp; ret 5_2_00007FFD9B880630
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeFile created: C:\Users\user\AppData\Local\Microsoft\MyApp.exeJump to dropped file

              Boot Survival

              barindex
              Source: Yara matchFile source: 7.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.MyApp.exe.2a38002bb30.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.MyApp.exe.2a38002bb30.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MyApp.exe PID: 7100, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 6740, type: MEMORYSTR
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AnyDesk.lnkJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AnyDesk.lnkJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 7.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.MyApp.exe.2a38002bb30.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.MyApp.exe.2a38002bb30.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MyApp.exe PID: 7100, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 6740, type: MEMORYSTR
              Source: MyApp.exe, 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmp, MyApp.exe, 00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeMemory allocated: 28714E60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeMemory allocated: 2872E6A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeMemory allocated: 2A3EBA50000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeMemory allocated: 2A3ED330000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: BF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 27D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 47D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exe TID: 3228Thread sleep time: -40000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exe TID: 3228Thread sleep time: -45500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exe TID: 4852Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exe TID: 7052Thread sleep time: -40000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exe TID: 7052Thread sleep time: -45500s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exe TID: 5304Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeThread delayed: delay time: 40000Jump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeThread delayed: delay time: 40000Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: MyApp.exe, 00000005.00000002.2930165475.000002A3EDDC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_
              Source: cvtres.exe, 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
              Source: XCS1lNZ26O.exe, 00000000.00000002.2306447217.0000028714D4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\`
              Source: MyApp.exe, 00000005.00000002.2930165475.000002A3EDDC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\y
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 402000Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 412000Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 414000Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 76B008Jump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeProcess created: C:\Users\user\AppData\Local\Microsoft\MyApp.exe "C:\Users\user\AppData\Local\Microsoft\MyApp.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"Jump to behavior
              Source: C:\Users\user\Desktop\XCS1lNZ26O.exeQueries volume information: C:\Users\user\Desktop\XCS1lNZ26O.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\MyApp.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\MyApp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: 7.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.MyApp.exe.2a38002bb30.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.MyApp.exe.2a38002bb30.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MyApp.exe PID: 7100, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 6740, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              311
              Process Injection
              1
              Masquerading
              1
              Input Capture
              21
              Security Software Discovery
              Remote Services1
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Registry Run Keys / Startup Folder
              1
              Scheduled Task/Job
              1
              Disable or Modify Tools
              LSASS Memory31
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              DLL Side-Loading
              2
              Registry Run Keys / Startup Folder
              31
              Virtualization/Sandbox Evasion
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared Drive11
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              311
              Process Injection
              NTDS12
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
              Obfuscated Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Software Packing
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Timestomp
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              XCS1lNZ26O.exe47%ReversingLabsByteCode-MSIL.Trojan.Generic
              XCS1lNZ26O.exe57%VirustotalBrowse
              XCS1lNZ26O.exe100%AviraHEUR/AGEN.1361722
              XCS1lNZ26O.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Microsoft\MyApp.exe100%AviraHEUR/AGEN.1361722
              C:\Users\user\AppData\Local\Microsoft\MyApp.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Microsoft\MyApp.exe47%ReversingLabsByteCode-MSIL.Trojan.Generic
              C:\Users\user\AppData\Local\Microsoft\MyApp.exe57%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              198.187.3.20.in-addr.arpa1%VirustotalBrowse
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              198.187.3.20.in-addr.arpa
              unknown
              unknownfalseunknown
              NameMaliciousAntivirus DetectionReputation
              dox2025.serveirc.comtrue
                unknown
                No contacted IP infos
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1522466
                Start date and time:2024-09-30 07:11:10 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 11s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:XCS1lNZ26O.exe
                renamed because original name is a hash value
                Original Sample Name:81b91fcc443627c1f93f38451cd55079.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@5/5@1/0
                EGA Information:
                • Successful, ratio: 66.7%
                HCA Information:
                • Successful, ratio: 79%
                • Number of executed functions: 11
                • Number of non-executed functions: 1
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target cvtres.exe, PID 6740 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                01:12:02API Interceptor3x Sleep call for process: XCS1lNZ26O.exe modified
                01:13:04API Interceptor5x Sleep call for process: MyApp.exe modified
                06:14:06AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AnyDesk.lnk
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\AppData\Local\Microsoft\MyApp.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1268
                Entropy (8bit):5.390238876397219
                Encrypted:false
                SSDEEP:24:ML9E4KQwKDE4KGKZI6Kh6+84xp3/Vcll1qE4GIs0E4KRLE4qE4j:MxHKQwYHKGSI6o6+vxp3/ell1qHGIs0D
                MD5:D1B01A839BBB86C79BC74380B128F9ED
                SHA1:866E0271B677B23A99B22F3A2207B03C7BCA794C
                SHA-256:ADC0D2AB0AF65966A4B20574E244CA981B4F8996C8614DCF03C02C641CE088D4
                SHA-512:57DA7DD620D998C0EFBCD28E610768323F95C6F53324C06FD0A5650E305A42CC20432752E05122544E5A4E5DF9F29426314A18E06B2390CE83EA39367375BAD8
                Malicious:false
                Reputation:low
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_6
                Process:C:\Users\user\Desktop\XCS1lNZ26O.exe
                File Type:CSV text
                Category:dropped
                Size (bytes):1088
                Entropy (8bit):5.389928136181357
                Encrypted:false
                SSDEEP:24:ML9E4KQwKDE4KGKZI6Kh6+84xp3/Vcll1qE4GIs0E4KD:MxHKQwYHKGSI6o6+vxp3/ell1qHGIs0K
                MD5:7F03B15120D277413D7C08047184C8F5
                SHA1:0A6EEC1B9E6BB8FF846D21F7575E78B29C42A00F
                SHA-256:18E01DE8BB5C3C111EA89C01A4D28F1834BB02E26C0ECD86D8CCAB3835C79B2C
                SHA-512:8995C0BEA34B69FFEEE03FBB332223AB95502938A4789E64CBE8329F596E43C74676FF4550AD4F8506AAF6B955E6F8A5BDEAF1A5B6D71275D265DCE2D5478754
                Malicious:true
                Reputation:moderate, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_6
                Process:C:\Users\user\Desktop\XCS1lNZ26O.exe
                File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):4384832
                Entropy (8bit):1.3150665040622804
                Encrypted:false
                SSDEEP:1536:56OKjiCxtfTRVp/G/3W9hKBJjAqQCe1nwdsmZ45TT4MZ1zztxZ:EjjnRVJogh4ydDeuw49T4KzpxZ
                MD5:81B91FCC443627C1F93F38451CD55079
                SHA1:45678692D8AE0E7398D99FF14089CA286B4D0D4C
                SHA-256:AF93DEC8D543CFCB877A0D511E995E6988519F21174C63F2BFD623495F34CBC9
                SHA-512:A3B5D646DE324A5D1E9D06AA9F02DAEF8C076660155F252F96A14C26886379C28A5D4C8A46CAC843E21D53BDDC535E3F256C7423E885FC8929649768F5B88D74
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 47%
                • Antivirus: Virustotal, Detection: 57%, Browse
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....u............"...0...A..,........... .....@..... ........................C.......C...`...@......@............... ................................A.j*............B.@(..........<H............................................................... ..H............text....A.. ....A................. ..`.rsrc...j*....A..,....A.............@..@........................................H.......$...`............G...............................................0..2........o.......[.+......+....[...o......(.......X...2..*...0..&.......s.......+.....o.......XX....i2..o....*B(....~....o....*..0............i...+.......+............X.....2...+....(....(....o..........i.Y..pa...i.X.+...........8......+...%.....(...........,...( ...(!.....o..........%..2...( ....(".....2.........%......a....a.2....o#....+......(....o.....Y3....+....X.....X......i.Y>d.......i.Y(...+..*....0..
                Process:C:\Users\user\Desktop\XCS1lNZ26O.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Reputation:high, very likely benign file
                Preview:[ZoneTransfer]....ZoneId=0
                Process:C:\Users\user\AppData\Local\Microsoft\MyApp.exe
                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
                Category:dropped
                Size (bytes):1118
                Entropy (8bit):3.3153320316747497
                Encrypted:false
                SSDEEP:12:8AlXFm/3BVSXvk44X3ojsqzKtnWNjW+UcCsvXfrUMMlWlhf2iTEEtAkMAAiNL4tK:8A4/BHYVKVWA+/CWvrUMkWDnECx5qy
                MD5:67D07E10037B0788536E089B40817417
                SHA1:43869347F4BA9A77F98D81EB1F872BD046E001A3
                SHA-256:EF6AD3DA8EE1BB019D07CA84C8EEDCBB486ED85600959EDB9F3487080EC3ABBD
                SHA-512:FC69678E19ED7E4E994F1D9EF9F8DA9D3D5CD752022844FDCB60C8AA581BD7BA28DC8E153A625DC3B016B3FC6798C89AEA89B83235107B49080FF00828E4C9BF
                Malicious:false
                Reputation:low
                Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@............................................W.i.n.d.o.w.s.....Z.1...........System32..B............................................S.y.s.t.e.m.3.2.....t.1...........WindowsPowerShell.T............................................W.i.n.d.o.w.s.P.o.w.e.r.S.h.e.l.l... .N.1...........v1.0..:............................................v.1...0.....l.2...........powershell.exe..N............................................p.o.w.e.r.s.h.e.l.l...e.x.e.......Q.....\.....\.....\.....\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.S.y.s.t.e.m.3.2.\.W.i.n.d.o.w.s.P.o.w.e.r.S.h.e.l.l.\.v.1...0.\.p.o.w.e.r.s.h.e.l.l...e.x.e.J.S.t.a.r.t.-.P.r.o.c.e.s.s. .-.F.i.l.e.P.a.t.h. .(.G.e.t.-.I.t.e.m.P.r.o.p.e.r.t.y. .'.H.K.C.U.:.S.o.f.t.w.a.r.e.\.A.n.y.D.e.s.k.'.)...A.n.y.D.e.s.k.........%...............wN....]N.D...Q..................1SPS.XF.L8C....&.m.q......
                File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                Entropy (8bit):1.3150665040622804
                TrID:
                • Win64 Executable GUI Net Framework (217006/5) 49.88%
                • Win64 Executable GUI (202006/5) 46.43%
                • Win64 Executable (generic) (12005/4) 2.76%
                • Generic Win/DOS Executable (2004/3) 0.46%
                • DOS Executable Generic (2002/1) 0.46%
                File name:XCS1lNZ26O.exe
                File size:4'384'832 bytes
                MD5:81b91fcc443627c1f93f38451cd55079
                SHA1:45678692d8ae0e7398d99ff14089ca286b4d0d4c
                SHA256:af93dec8d543cfcb877a0d511e995e6988519f21174c63f2bfd623495f34cbc9
                SHA512:a3b5d646de324a5d1e9d06aa9f02daef8c076660155f252f96a14c26886379c28a5d4c8a46cac843e21d53bddc535e3f256c7423e885fc8929649768f5b88d74
                SSDEEP:1536:56OKjiCxtfTRVp/G/3W9hKBJjAqQCe1nwdsmZ45TT4MZ1zztxZ:EjjnRVJogh4ydDeuw49T4KzpxZ
                TLSH:3516FEE06EBC97A9F656DE3F49929501B336ACEBA881C343438E537F09B316E5DC1901
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....u............"...0...A..,........... .....@..... ........................C.......C...`...@......@............... .....
                Icon Hash:399378336e583c3c
                Entrypoint:0x140000000
                Entrypoint Section:
                Digitally signed:true
                Imagebase:0x140000000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0xCCFF75A6 [Mon Dec 26 15:24:22 2078 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:
                Signature Valid:false
                Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                Signature Validation Error:The digital signature of the object did not verify
                Error Number:-2146869232
                Not Before, Not After
                • 19/10/2023 20:51:56 16/10/2024 20:51:56
                Subject Chain
                • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                Version:3
                Thumbprint MD5:87AC6386A8291ECF334EB3022D315F82
                Thumbprint SHA-1:05A822642CF64464460CB4684FF11C7F476873CA
                Thumbprint SHA-256:36305D4DDFD4756D17FCDFB742FD2031A3D5133BCE34BD8E3080BC803AE44D0B
                Serial:33000003A54111E8F07FBE0B750000000003A5
                Instruction
                dec ebp
                pop edx
                nop
                add byte ptr [ebx], al
                add byte ptr [eax], al
                add byte ptr [eax+eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x41c0000x12a6a.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x42c0000x2840.rsrc
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x483c0x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x4190c80x4192009416b67fcdc2da2addbd6a28f9013ad5unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x41c0000x12a6a0x12c00dadb0bb609d156f239137e54e2cac299False0.7869010416666666data7.1011837793100545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x41c2e00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3
                RT_ICON0x41c9480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.4112903225806452
                RT_ICON0x41cc300x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5709459459459459
                RT_ICON0x41cd580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.55090618336887
                RT_ICON0x41dc000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6651624548736462
                RT_ICON0x41e4a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.42557803468208094
                RT_ICON0x41ea100xbd63PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9922859559020688
                RT_ICON0x42a7740x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.38516597510373446
                RT_ICON0x42cd1c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.44183864915572235
                RT_ICON0x42ddc40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5177304964539007
                RT_GROUP_ICON0x42e22c0x92dataEnglishUnited States0.6438356164383562
                RT_VERSION0x42e2c00x2e0dataEnglishUnited States0.4320652173913043
                RT_MANIFEST0x42e5a00x4caXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4355628058727569
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSource PortDest PortSource IPDest IP
                Sep 30, 2024 07:12:22.792712927 CEST53514031.1.1.1192.168.2.4
                Sep 30, 2024 07:12:36.261866093 CEST5364924162.159.36.2192.168.2.4
                Sep 30, 2024 07:12:36.730247021 CEST6030053192.168.2.41.1.1.1
                Sep 30, 2024 07:12:36.738009930 CEST53603001.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Sep 30, 2024 07:12:36.730247021 CEST192.168.2.41.1.1.10x27d8Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Sep 30, 2024 07:12:36.738009930 CEST1.1.1.1192.168.2.40x27d8Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:01:12:02
                Start date:30/09/2024
                Path:C:\Users\user\Desktop\XCS1lNZ26O.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\XCS1lNZ26O.exe"
                Imagebase:0x28714700000
                File size:4'384'832 bytes
                MD5 hash:81B91FCC443627C1F93F38451CD55079
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:5
                Start time:01:13:04
                Start date:30/09/2024
                Path:C:\Users\user\AppData\Local\Microsoft\MyApp.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\AppData\Local\Microsoft\MyApp.exe"
                Imagebase:0x2a3eb300000
                File size:4'384'832 bytes
                MD5 hash:81B91FCC443627C1F93F38451CD55079
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000005.00000002.2915475019.000002A3801BB000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000005.00000002.2915475019.000002A380001000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                • Detection: 47%, ReversingLabs
                • Detection: 57%, Virustotal, Browse
                Reputation:low
                Has exited:true

                Target ID:7
                Start time:01:14:05
                Start date:30/09/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                Imagebase:0xe00000
                File size:46'832 bytes
                MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000007.00000002.2932331935.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                Reputation:moderate
                Has exited:false

                Reset < >

                  Execution Graph

                  Execution Coverage:32.3%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:6
                  Total number of Limit Nodes:0
                  execution_graph 1265 7ffd9b89327a 1266 7ffd9b893289 LoadLibraryA 1265->1266 1268 7ffd9b893416 1266->1268 1269 7ffd9b8934c2 1270 7ffd9b8934d1 VirtualProtect 1269->1270 1272 7ffd9b8935bb 1270->1272

                  Callgraph

                  • Executed
                  • Not Executed
                  • Opacity -> Relevance
                  • Disassembly available
                  callgraph 0 Function_00007FFD9B8928F5 1 Function_00007FFD9B8935F8 2 Function_00007FFD9B89327A 7 Function_00007FFD9B893474 2->7 3 Function_00007FFD9B8904FA 4 Function_00007FFD9B8912FC 5 Function_00007FFD9B89016D 6 Function_00007FFD9B893A6E 37 Function_00007FFD9B890228 7->37 8 Function_00007FFD9B8906E8 9 Function_00007FFD9B890B6A 16 Function_00007FFD9B890498 9->16 23 Function_00007FFD9B890488 9->23 10 Function_00007FFD9B891A5E 11 Function_00007FFD9B890060 12 Function_00007FFD9B8901E2 13 Function_00007FFD9B8907E3 14 Function_00007FFD9B890CE4 15 Function_00007FFD9B892C15 17 Function_00007FFD9B89030D 18 Function_00007FFD9B891D0F 19 Function_00007FFD9B893A91 20 Function_00007FFD9B890593 21 Function_00007FFD9B890485 22 Function_00007FFD9B890685 24 Function_00007FFD9B89027D 25 Function_00007FFD9B8908FD 26 Function_00007FFD9B8925FD 27 Function_00007FFD9B892200 27->0 27->27 28 Function_00007FFD9B8907B5 29 Function_00007FFD9B890F3C 30 Function_00007FFD9B89012D 31 Function_00007FFD9B8900AD 32 Function_00007FFD9B8904AD 33 Function_00007FFD9B892CAD 34 Function_00007FFD9B892D2D 35 Function_00007FFD9B890328 36 Function_00007FFD9B892DA8 38 Function_00007FFD9B893A28 39 Function_00007FFD9B8902AA 40 Function_00007FFD9B89322C 40->37 41 Function_00007FFD9B89021F 42 Function_00007FFD9B8902A3 43 Function_00007FFD9B8905D5 44 Function_00007FFD9B890758 45 Function_00007FFD9B891DD9 45->0 45->27 46 Function_00007FFD9B89014D 47 Function_00007FFD9B8907D2 48 Function_00007FFD9B8904D3 49 Function_00007FFD9B8906D3 50 Function_00007FFD9B892946 51 Function_00007FFD9B8906C8 52 Function_00007FFD9B893649 52->8 52->44 52->51 53 Function_00007FFD9B892C49 54 Function_00007FFD9B893A4B 55 Function_00007FFD9B89033D 56 Function_00007FFD9B892DBD 56->40 57 Function_00007FFD9B8934C2

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 75 7ffd9b891dd9-7ffd9b891de5 76 7ffd9b891de7 75->76 77 7ffd9b891de9-7ffd9b891e26 75->77 76->77 78 7ffd9b891e29-7ffd9b891e4f 76->78 77->78 82 7ffd9b891e6f-7ffd9b891e86 78->82 83 7ffd9b891e51-7ffd9b891e54 78->83 85 7ffd9b891e89-7ffd9b891e9d 82->85 84 7ffd9b891e56-7ffd9b891e5f 83->84 83->85 88 7ffd9b891e66-7ffd9b891e6d 84->88 89 7ffd9b891e9f 85->89 90 7ffd9b891ea1-7ffd9b891ee0 85->90 88->82 88->83 89->90 91 7ffd9b891ee1-7ffd9b891eeb 89->91 90->91 94 7ffd9b891eed-7ffd9b891eee 91->94 95 7ffd9b891f0f-7ffd9b891f69 91->95 96 7ffd9b891ef1-7ffd9b891efc 94->96 98 7ffd9b8921c8-7ffd9b89222d 95->98 109 7ffd9b891f6f-7ffd9b891fa0 95->109 96->98 99 7ffd9b891f02-7ffd9b891f0d 96->99 104 7ffd9b89226b-7ffd9b892276 98->104 105 7ffd9b89222f-7ffd9b89225b 98->105 99->95 99->96 105->104 112 7ffd9b892277-7ffd9b892308 105->112 113 7ffd9b891fa6-7ffd9b891fc8 109->113 114 7ffd9b89219c-7ffd9b8921c7 109->114 128 7ffd9b892786-7ffd9b892799 112->128 129 7ffd9b89230e-7ffd9b892312 call 7ffd9b892200 112->129 120 7ffd9b891fcc-7ffd9b8920b8 113->120 153 7ffd9b8920ba-7ffd9b8920bd 120->153 154 7ffd9b8920be-7ffd9b8920c2 120->154 134 7ffd9b89279b-7ffd9b8927a2 128->134 135 7ffd9b8927a3-7ffd9b892802 call 7ffd9b890590 128->135 129->128 134->135 148 7ffd9b892808-7ffd9b892827 135->148 149 7ffd9b8928ca-7ffd9b8928f4 call 7ffd9b8928f5 135->149 156 7ffd9b892829-7ffd9b89283e 148->156 157 7ffd9b892840-7ffd9b89289a call 7ffd9b8905a0 148->157 153->154 154->98 158 7ffd9b8920c8-7ffd9b8920d7 154->158 156->157 182 7ffd9b8928bc-7ffd9b8928bf call 7ffd9b8905b0 157->182 183 7ffd9b89289c-7ffd9b8928b4 157->183 158->98 162 7ffd9b8920dd-7ffd9b89215a 158->162 162->98 171 7ffd9b89215c-7ffd9b892189 162->171 177 7ffd9b89218b-7ffd9b89218d 171->177 178 7ffd9b89218f 171->178 179 7ffd9b892191-7ffd9b892196 177->179 178->179 179->114 179->120 187 7ffd9b8928c4-7ffd9b8928e9 call 7ffd9b8928f5 182->187 183->148 186 7ffd9b8928ba 183->186 186->149
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2323920294.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffd9b890000_XCS1lNZ26O.jbxd
                  Similarity
                  • API ID:
                  • String ID: Zj&$Zj&
                  • API String ID: 0-3250716521
                  • Opcode ID: 548c87e853e074e53acecfcee869b0e48925f2f6d7cb3b54f3da90c4efda0333
                  • Instruction ID: 3067c7e7f81a0c733240de96be3be144c04b32c05d6e5feb7d1109afb0240100
                  • Opcode Fuzzy Hash: 548c87e853e074e53acecfcee869b0e48925f2f6d7cb3b54f3da90c4efda0333
                  • Instruction Fuzzy Hash: 11F17C31B0DA8D4FEB69EFAC98546757BD1EF99300F1501BED08DC71A7DE24A8428381

                  Control-flow Graph

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2323920294.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffd9b890000_XCS1lNZ26O.jbxd
                  Similarity
                  • API ID:
                  • String ID: BN_^
                  • API String ID: 0-4085728351
                  • Opcode ID: 490393c7a4b0647923fed115f9fe5f4382a86ce3101e9fdf6bbfe5391ce03005
                  • Instruction ID: 6a85ee86b07ff107161dcd4289d249b59367b66c48cbf56a241ffa944ee98555
                  • Opcode Fuzzy Hash: 490393c7a4b0647923fed115f9fe5f4382a86ce3101e9fdf6bbfe5391ce03005
                  • Instruction Fuzzy Hash: 16A1D231B1CA494FEB9CEB6C8865A7577D2FFA9310B1501BEE05EC72E2DE24AC418741

                  Control-flow Graph

                  Memory Dump Source
                  • Source File: 00000000.00000002.2323920294.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffd9b890000_XCS1lNZ26O.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9e2ad26d0f862c9616f515901aa677b58ffff6ee94ec93145d23a106dd92151f
                  • Instruction ID: e5e2e0f19b8026149523968df4c426c13b5727a32ab5f15f9dcf51599fbda48c
                  • Opcode Fuzzy Hash: 9e2ad26d0f862c9616f515901aa677b58ffff6ee94ec93145d23a106dd92151f
                  • Instruction Fuzzy Hash: CE322821B1CA4A4FEB5CAB6C5826675B7D2EF9C310F1541BFE05DC72E7DD24AC424282

                  Control-flow Graph

                  Memory Dump Source
                  • Source File: 00000000.00000002.2323920294.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffd9b890000_XCS1lNZ26O.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1f4b1f736ca02069a4bd03f5b7efaac2c03cb5761a4f346df2a1f7c208a4bfb3
                  • Instruction ID: f4b68afc86ab2d28e0b646abab1a6a58d8c723d45609b18206b47fe14adbc6d7
                  • Opcode Fuzzy Hash: 1f4b1f736ca02069a4bd03f5b7efaac2c03cb5761a4f346df2a1f7c208a4bfb3
                  • Instruction Fuzzy Hash: 44810631B1CA494FDB9CEB6C982557577D2EF99710B1502BEE05EC72E3EE24AC428341

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 191 7ffd9b89327a-7ffd9b893287 192 7ffd9b893289-7ffd9b893291 191->192 193 7ffd9b893292-7ffd9b8932a3 191->193 192->193 194 7ffd9b8932a5-7ffd9b8932ad 193->194 195 7ffd9b8932ae-7ffd9b89333d 193->195 194->195 199 7ffd9b89333f-7ffd9b893366 195->199 200 7ffd9b8933b0-7ffd9b893414 LoadLibraryA 195->200 199->200 203 7ffd9b893368-7ffd9b89336b 199->203 207 7ffd9b893416 200->207 208 7ffd9b89341c-7ffd9b893458 call 7ffd9b893474 200->208 205 7ffd9b8933a5-7ffd9b8933ad 203->205 206 7ffd9b89336d-7ffd9b893380 203->206 205->200 209 7ffd9b893382 206->209 210 7ffd9b893384-7ffd9b893397 206->210 207->208 215 7ffd9b89345a 208->215 216 7ffd9b89345f-7ffd9b893473 208->216 209->210 210->210 211 7ffd9b893399-7ffd9b8933a1 210->211 211->205 215->216
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2323920294.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffd9b890000_XCS1lNZ26O.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: c492d90381d42003c78468be0f601cea667472219f6f714f7b4ad7a69c74bd94
                  • Instruction ID: f96b01ed7e0aa11b914ccd6ec636d86c840c75c6edaee3fcc56e7b766d07a34f
                  • Opcode Fuzzy Hash: c492d90381d42003c78468be0f601cea667472219f6f714f7b4ad7a69c74bd94
                  • Instruction Fuzzy Hash: 47613630A0CA8D4FEB59DF6898567E97BE0FF59310F00426AE85DC32A2DE7499458B81

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 217 7ffd9b8934c2-7ffd9b8934cf 218 7ffd9b8934da-7ffd9b8934eb 217->218 219 7ffd9b8934d1-7ffd9b8934d9 217->219 220 7ffd9b8934f6-7ffd9b8935b9 VirtualProtect 218->220 221 7ffd9b8934ed-7ffd9b8934f5 218->221 219->218 225 7ffd9b8935bb 220->225 226 7ffd9b8935c1-7ffd9b8935f2 220->226 221->220 225->226
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2323920294.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffd9b890000_XCS1lNZ26O.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 0a819ad986aeb593ba25072c13a1047ff70deff4216085a443637dd0ab31fdf5
                  • Instruction ID: cd8778948241d318677c4c71b1ea490a634965060de927e79560457e2bde6bde
                  • Opcode Fuzzy Hash: 0a819ad986aeb593ba25072c13a1047ff70deff4216085a443637dd0ab31fdf5
                  • Instruction Fuzzy Hash: FE41193190C7884FDB1D9BA898166E97FE0EF56321F0443AFD059C3192DB78A806C796
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2323920294.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffd9b890000_XCS1lNZ26O.jbxd
                  Similarity
                  • API ID:
                  • String ID: x6j&
                  • API String ID: 0-3795241117
                  • Opcode ID: 1d2ea768ca8dbabc90ff17f4f5ab112658492e5d9aaa7f6f06d7f2802848b9bb
                  • Instruction ID: b5e4a66e3cd71f823c9aeb67198a0d46e22ef2f18110553ac378daafe3df87bf
                  • Opcode Fuzzy Hash: 1d2ea768ca8dbabc90ff17f4f5ab112658492e5d9aaa7f6f06d7f2802848b9bb
                  • Instruction Fuzzy Hash: 92A13721E09A4E4FE72EAFB48C655FA3BE1EF56210F0541BED49AC70DBDD6864068341

                  Execution Graph

                  Execution Coverage:17.5%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:7
                  Total number of Limit Nodes:0
                  execution_graph 5382 7ffd9b8734c2 5383 7ffd9b8734d1 VirtualProtect 5382->5383 5385 7ffd9b8735bb 5383->5385 5378 7ffd9b8732aa 5380 7ffd9b873307 5378->5380 5379 7ffd9b8733de LoadLibraryA 5381 7ffd9b873416 5379->5381 5380->5379 5380->5380

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 152 7ffd9b8732aa-7ffd9b87333d 155 7ffd9b87333f-7ffd9b873366 152->155 156 7ffd9b8733b0-7ffd9b873414 LoadLibraryA 152->156 155->156 159 7ffd9b873368-7ffd9b87336b 155->159 163 7ffd9b87341c-7ffd9b873458 call 7ffd9b873474 156->163 164 7ffd9b873416 156->164 161 7ffd9b87336d-7ffd9b873380 159->161 162 7ffd9b8733a5-7ffd9b8733ad 159->162 165 7ffd9b873384-7ffd9b873397 161->165 166 7ffd9b873382 161->166 162->156 171 7ffd9b87345f-7ffd9b873473 163->171 172 7ffd9b87345a 163->172 164->163 165->165 167 7ffd9b873399-7ffd9b8733a1 165->167 166->165 167->162 172->171
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.2931041565.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ffd9b870000_MyApp.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: c2407f611ea4f3d5a6ea605b117e12b1afbc1a013496763cad7dbc135124851d
                  • Instruction ID: b18f28c4bf8d53efda74d8356d0170f350a5982784966cb1fd60a16030ddb315
                  • Opcode Fuzzy Hash: c2407f611ea4f3d5a6ea605b117e12b1afbc1a013496763cad7dbc135124851d
                  • Instruction Fuzzy Hash: C151B530A08A8D4FDB68DF28C8557F97BE1FF59310F10826EE85DC7292DB7499458B82

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 173 7ffd9b8734c2-7ffd9b8734cf 174 7ffd9b8734d1-7ffd9b8734d9 173->174 175 7ffd9b8734da-7ffd9b8734eb 173->175 174->175 176 7ffd9b8734ed-7ffd9b8734f5 175->176 177 7ffd9b8734f6-7ffd9b8735b9 VirtualProtect 175->177 176->177 181 7ffd9b8735c1-7ffd9b8735f2 177->181 182 7ffd9b8735bb 177->182 182->181
                  APIs
                  Memory Dump Source
                  • Source File: 00000005.00000002.2931041565.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ffd9b870000_MyApp.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: bcd4d5ad0f645ddf66309904d28b6edb608c0a13b19f77880c560479b2f348c1
                  • Instruction ID: caa78ac6af26c5fb2453eea13ae1c2d3274ef7067af880e59b9deaea8650d431
                  • Opcode Fuzzy Hash: bcd4d5ad0f645ddf66309904d28b6edb608c0a13b19f77880c560479b2f348c1
                  • Instruction Fuzzy Hash: 89412B3190C7894FD71D9BA898566F97BE0EF56321F0443AFD059C3293DB74A806C792
                  Memory Dump Source
                  • Source File: 00000005.00000002.2931794823.00007FFD9B960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B960000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_7ffd9b960000_MyApp.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e71490d25803739feb21aea6b56a64c70a47db8d387ca8d85e0748c81b27e3ff
                  • Instruction ID: 76df67616a1f6acb5b4e452046c3005074c8b6aa454468120d1c26571d71410b
                  • Opcode Fuzzy Hash: e71490d25803739feb21aea6b56a64c70a47db8d387ca8d85e0748c81b27e3ff
                  • Instruction Fuzzy Hash: 3821F511F1EA895FD7A6876C18B46A43BE1DF9A560B0D01E7D48DC72EBEA089D42C381
                  Memory Dump Source
                  • Source File: 00000007.00000002.2932735808.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_7_2_bf0000_cvtres.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 60b9f26fe9d7b9790a06fe7fdf8734ec42b9bf497509601d4cf8bd417bfb01ab
                  • Instruction ID: 2076351c0b4bb8586dba9da9aa29798f38cc1e6a8bb375092aa3a3f977a42bf1
                  • Opcode Fuzzy Hash: 60b9f26fe9d7b9790a06fe7fdf8734ec42b9bf497509601d4cf8bd417bfb01ab
                  • Instruction Fuzzy Hash: CB31B23072030A8FDB65BB79995423E7AE5EF80704714486DD607C72B6EF24DC4A8B62
                  Memory Dump Source
                  • Source File: 00000007.00000002.2932735808.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_7_2_bf0000_cvtres.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 471cb18a42be1f2b452f30de329a2354baa7598dad13f4c2112c8416ede020f1
                  • Instruction ID: eb600313f1f60b74a25033c5f060c04f8d04a8511fe46c7d8cdb4b220854ffd7
                  • Opcode Fuzzy Hash: 471cb18a42be1f2b452f30de329a2354baa7598dad13f4c2112c8416ede020f1
                  • Instruction Fuzzy Hash: 8D41C3307207098FDB65BB79995423E3AE5FF8070431488AED607C72B6EF24DC498B52