Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1522708
MD5:30b8e89d006911aedd4ddd9f199cea4b
SHA1:fdb6adf5fee95333a5f0811249ef35a9b0a6a5a4
SHA256:2315b5fa9423d0538154c84333a95d3fcea5011f9fb3b1585608b3ffcd70d4ca
Tags:exeuser-jstrosch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Enables debug privileges
Found evasive API chain (may stop execution after accessing registry keys)
PE file contains executable resources (Code or Archives)
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 3468 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 30B8E89D006911AEDD4DDD9F199CEA4B)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: file.exeReversingLabs: Detection: 73%
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
Source: file.exeStatic PE information: Resource name: IDR_BINARY type: PE32 executable (console) Intel 80386, for MS Windows
Source: file.exeStatic PE information: Resource name: IDR_BINARY type: PE32 executable (console) Intel 80386, for MS Windows
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401170 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00401170
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004014C0 GetModuleHandleA,FindResourceA,SizeofResource,LoadResource,LockResource,??2@YAPAXI@Z,memset,memcpy,FreeResource,0_2_004014C0
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 73%
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401F71 push ecx; ret 0_2_00401F84
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-337
Source: C:\Users\user\Desktop\file.exeEvasive API call chain: RegQueryValue,DecisionNodes,Sleepgraph_0-338
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401740 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00401740
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401740 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00401740
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401CA3 SetUnhandledExceptionFilter,0_2_00401CA3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401FD8 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00401FD8
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Access Token Manipulation
1
Access Token Manipulation
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe74%ReversingLabsWin32.Downloader.Small
file.exe100%AviraTR/Dropper.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1522708
Start date and time:2024-09-30 15:47:13 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 14s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal56.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 7
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • VT rate limit hit for: file.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):1.4518192204256555
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:148'480 bytes
MD5:30b8e89d006911aedd4ddd9f199cea4b
SHA1:fdb6adf5fee95333a5f0811249ef35a9b0a6a5a4
SHA256:2315b5fa9423d0538154c84333a95d3fcea5011f9fb3b1585608b3ffcd70d4ca
SHA512:022eaffd80029c29b110967cb2ee7df50bee5544a64b6ccb4e71ded5f968e0abcdb4d048a6dbf81a89a5548e90d6b8ba021e60c76ddf1ee784c87fd76b296fed
SSDEEP:384:YsjQQs+IoTeJ5hv4UCYte0I+eTUsRZXvXshycJuOCqzGGd:YsMQs+IZHfM0xeTUiXUxJuOdV
TLSH:E8E3190AFE4A8073EB4904704ABB87728679AD9237992DD3F7A03D5D1E712E4D4370AD
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>l..z...z...z...suL.x...suJ.y...su\.o...]...}...z.../...su[.~...d_K.{...suN.{...Richz...................PE..L...Y2.d...........
Icon Hash:498a80a2a2808241
Entrypoint:0x401b51
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x64B63259 [Tue Jul 18 06:34:01 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:f85297283baf098bf5fa8be9bc88cd5b
Instruction
call 00007F464906CBF7h
jmp 00007F464906C4ABh
mov edi, edi
push ebp
mov ebp, esp
sub esp, 00000328h
mov dword ptr [00404470h], eax
mov dword ptr [0040446Ch], ecx
mov dword ptr [00404468h], edx
mov dword ptr [00404464h], ebx
mov dword ptr [00404460h], esi
mov dword ptr [0040445Ch], edi
mov word ptr [00404488h], ss
mov word ptr [0040447Ch], cs
mov word ptr [00404458h], ds
mov word ptr [00404454h], es
mov word ptr [00404450h], fs
mov word ptr [0040444Ch], gs
pushfd
pop dword ptr [00404480h]
mov eax, dword ptr [ebp+00h]
mov dword ptr [00404474h], eax
mov eax, dword ptr [ebp+04h]
mov dword ptr [00404478h], eax
lea eax, dword ptr [ebp+08h]
mov dword ptr [00404484h], eax
mov eax, dword ptr [ebp-00000320h]
mov dword ptr [004043C0h], 00010001h
mov eax, dword ptr [00404478h]
mov dword ptr [00404374h], eax
mov dword ptr [00404368h], C0000409h
mov dword ptr [0040436Ch], 00000001h
mov eax, dword ptr [0040410Ch]
mov dword ptr [ebp-00000328h], eax
mov eax, dword ptr [00404110h]
mov dword ptr [ebp-00000324h], eax
call dword ptr [00000074h]
Programming Language:
  • [IMP] VS2008 SP1 build 30729
  • [ASM] VS2008 SP1 build 30729
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2005 build 50727
  • [C++] VS2008 SP1 build 30729
  • [RES] VS2008 build 21022
  • [LNK] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x330c0x50.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x50000x221a8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x32400x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x134.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x109e0x1200a323d1870bf955f6e83fd80636efeb6fFalse0.5785590277777778data5.873972334424002IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x9980xa002e7815fccb03737f51647a97e4a041a2False0.4890625data5.09436216768118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x40000x6b80x2002c40a5d907f5823b371fac7ff96cef07False0.12109375data0.866880996983977IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x50000x221a80x2220064cede2f11823ce74fa297697e08e32cFalse0.06317965888278389data1.1215357378185524IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
IDR_BINARY0x51c00x21800PE32 executable (console) Intel 80386, for MS WindowsKoreanNorth Korea0.06217204990671642
IDR_BINARY0x51c00x21800PE32 executable (console) Intel 80386, for MS WindowsKoreanSouth Korea0.06217204990671642
RT_ICON0x269c00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640KoreanNorth Korea0.15994623655913978
RT_ICON0x269c00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640KoreanSouth Korea0.15994623655913978
RT_ICON0x26ca80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192KoreanNorth Korea0.3344594594594595
RT_ICON0x26ca80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192KoreanSouth Korea0.3344594594594595
RT_GROUP_ICON0x26dd00x22dataKoreanNorth Korea1.0
RT_GROUP_ICON0x26dd00x22dataKoreanSouth Korea1.0
RT_VERSION0x26df40x150dataKoreanNorth Korea0.5357142857142857
RT_VERSION0x26df40x150dataKoreanSouth Korea0.5357142857142857
RT_MANIFEST0x26f440x261ASCII text, with CRLF line terminatorsEnglishUnited States0.5139573070607554
DLLImport
KERNEL32.dllGetCurrentProcess, Sleep, GetLastError, LockResource, LoadResource, SizeofResource, FindResourceA, GetModuleHandleA, GetSystemDirectoryA, GetWindowsDirectoryA, CreateFileA, SystemTimeToFileTime, LocalFileTimeToFileTime, SetFileTime, CloseHandle, FreeResource, SetFileAttributesA, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoA, InterlockedCompareExchange, InterlockedExchange, GetSystemTimeAsFileTime
ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA
MSVCR90.dllfclose, fwrite, remove, ??3@YAXPAX@Z, memcpy, ??2@YAPAXI@Z, _amsg_exit, __getmainargs, _cexit, _exit, _XcptFilter, _ismbblead, exit, _acmdln, _initterm, _initterm_e, _configthreadlocale, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, _encode_pointer, __set_app_type, _crt_debugger_hook, ?terminate@@YAXXZ, _unlock, __dllonexit, _lock, _onexit, _decode_pointer, _except_handler4_common, _invoke_watson, _controlfp_s, strlen, memset, strcpy, strcat, fopen
Language of compilation systemCountry where language is spokenMap
KoreanNorth Korea
KoreanSouth Korea
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:09:48:26
Start date:30/09/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x400000
File size:148'480 bytes
MD5 hash:30B8E89D006911AEDD4DDD9F199CEA4B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:15.5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:15%
    Total number of Nodes:120
    Total number of Limit Nodes:2
    execution_graph 384 401c61 385 401c9d 384->385 387 401c73 384->387 386 401c98 ?terminate@ 386->385 387->385 387->386 388 401ca3 SetUnhandledExceptionFilter 389 4016c5 390 4016f3 389->390 391 401717 390->391 392 4016fc ??3@YAXPAX 390->392 393 401740 7 API calls 391->393 392->391 394 401724 393->394 395 401f85 _except_handler4_common 396 401846 401 401d5d 396->401 399 401890 400 401888 _amsg_exit 400->399 404 401cb8 401->404 403 401850 __getmainargs 403->399 403->400 411 401f2c 404->411 406 401cc4 _decode_pointer 407 401ce7 7 API calls 406->407 408 401cdb _onexit 406->408 412 401d54 _unlock 407->412 409 401d4b __onexit 408->409 409->403 411->406 412->409 419 401a0b _XcptFilter 420 40128c 421 4013c1 420->421 422 4013d1 421->422 423 4013c7 RegCloseKey 421->423 423->422 424 401a70 425 401a7e __set_app_type _encode_pointer __p__fmode __p__commode 424->425 427 401b1d _pre_c_init __RTC_Initialize 425->427 428 401b37 427->428 429 401b2b __setusermatherr 427->429 434 401faa _controlfp_s 428->434 429->428 432 401b45 _configthreadlocale 433 401b4e 432->433 435 401b3c 434->435 436 401fc6 _invoke_watson 434->436 435->432 435->433 436->435 299 401891 320 401f2c 299->320 301 40189d GetStartupInfoA 302 4018cb InterlockedCompareExchange 301->302 303 4018dd 302->303 304 4018d9 302->304 306 401907 303->306 307 4018fd _amsg_exit 303->307 304->303 305 4018e4 Sleep 304->305 305->302 308 401930 306->308 309 401910 _initterm_e 306->309 307->308 310 40195a 308->310 311 40193f _initterm 308->311 309->308 313 40192b __onexit 309->313 312 40195e InterlockedExchange 310->312 315 401966 __IsNonwritableInCurrentImage 310->315 311->310 312->315 314 4019f5 _ismbblead 314->315 315->314 317 401a3a 315->317 318 4019df exit 315->318 321 401400 315->321 317->313 319 401a43 _cexit 317->319 318->315 319->313 320->301 328 4013e0 321->328 329 4013f1 Sleep 328->329 330 4013f9 328->330 329->330 331 401170 GetCurrentProcess OpenProcessToken 330->331 332 401191 LookupPrivilegeValueA 331->332 336 40118d 331->336 333 4011a9 AdjustTokenPrivileges 332->333 332->336 335 4011f0 GetLastError 333->335 333->336 335->336 337 401210 RegOpenKeyExA 336->337 338 401291 RegQueryValueExA 337->338 345 401287 337->345 339 4012b9 RegQueryValueExA 338->339 338->345 342 401351 RegSetValueExA 339->342 343 4012d7 339->343 340 4013d1 340->315 341 4013c7 RegCloseKey 341->340 344 4010d0 40 API calls 342->344 343->345 346 4012df RegSetValueExA 343->346 347 40136e strlen RegSetValueExA strlen RegSetValueExA 344->347 345->340 345->341 350 4010d0 6 API calls 346->350 347->345 355 4015c0 memset memset 350->355 353 401161 strlen RegSetValueExA strlen RegSetValueExA 353->345 356 401624 GetSystemDirectoryA strcpy strcat strcat 355->356 357 401675 strcpy 355->357 358 401688 356->358 357->358 370 4014c0 GetModuleHandleA FindResourceA 358->370 362 4016c3 363 401717 362->363 364 4016fc ??3@YAXPAX 362->364 378 401740 363->378 364->363 366 401150 366->353 367 401000 CreateFileA 366->367 368 401032 SystemTimeToFileTime LocalFileTimeToFileTime SetFileTime CloseHandle SetFileAttributesA 367->368 369 40102b 367->369 368->369 369->353 371 401502 370->371 372 40150c 7 API calls 370->372 371->362 373 401430 remove fopen 371->373 372->371 374 401473 373->374 375 401477 fwrite 373->375 376 4014b7 374->376 377 4014aa fclose 374->377 375->374 376->362 377->376 379 401748 378->379 380 40174a IsDebuggerPresent _crt_debugger_hook SetUnhandledExceptionFilter UnhandledExceptionFilter 378->380 379->366 382 401c45 _crt_debugger_hook 380->382 383 401c4d GetCurrentProcess TerminateProcess 380->383 382->383 383->366 437 401b51 440 401fd8 437->440 439 401b56 439->439 441 40200a GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 440->441 442 401ffd 440->442 443 402001 441->443 442->441 442->443 443->439 448 401475 449 4014a4 448->449 450 4014b7 449->450 451 4014aa fclose 449->451 451->450 456 401a1f 457 401a33 _exit 456->457 458 401a3a 456->458 457->458 459 401a43 _cexit 458->459 460 401a49 __onexit 458->460 459->460

    Callgraph

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 16 401170-40118b GetCurrentProcess OpenProcessToken 17 401191-4011a3 LookupPrivilegeValueA 16->17 18 40118d-40118f 16->18 20 4011a5-4011a7 17->20 21 4011a9-4011c0 17->21 19 401206-401209 18->19 20->19 22 4011c2-4011c9 21->22 23 4011cb 21->23 24 4011d2-4011ea AdjustTokenPrivileges 22->24 23->24 25 4011f0-4011fb GetLastError 24->25 26 4011ec-4011ee 24->26 27 401201 25->27 28 4011fd-4011ff 25->28 26->19 27->19 28->19
    APIs
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 0040117C
    • OpenProcessToken.ADVAPI32(00000000), ref: 00401183
    • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 0040119B
    Memory Dump Source
    • Source File: 00000000.00000002.1416261030.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1416247807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416274285.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_file.jbxd
    Similarity
    • API ID: Process$CurrentLookupOpenPrivilegeTokenValue
    • String ID:
    • API String ID: 3639550587-0
    • Opcode ID: 30c9963ba618fa52c3a8f775123ca6cb3761b665c3ea739b1d66e81ebafda1ad
    • Instruction ID: 998d7c9e2814b39a41d7b37a21ee775764381e945c35df4ca51bea2cf094bd05
    • Opcode Fuzzy Hash: 30c9963ba618fa52c3a8f775123ca6cb3761b665c3ea739b1d66e81ebafda1ad
    • Instruction Fuzzy Hash: 66116970A04209EFEB14CFA4CD09BBF7B78EB48705F104579E611FA2D1E3789A409B69

    Control-flow Graph

    APIs
    • RegOpenKeyExA.ADVAPI32(80000002,00404008,00000000,000F003F,?), ref: 00401278
    • RegQueryValueExA.ADVAPI32(?,00403170,00000000,00000000,00000000,00000004), ref: 004012A5
    • RegCloseKey.ADVAPI32(00000000), ref: 004013CB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1416261030.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1416247807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416274285.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_file.jbxd
    Similarity
    • API ID: CloseOpenQueryValue
    • String ID: d1@$p1@$|1@
    • API String ID: 3677997916-378692078
    • Opcode ID: ec7549cc1f4e5f5e2f07d63bb0c984c19093e9b91ae5221d41fa6ef9fdbfecf9
    • Instruction ID: 893a0ac62731b324bd3a9d2f5ad13b95aaff6f4a6558c3fb8cb222fd0d76b42d
    • Opcode Fuzzy Hash: ec7549cc1f4e5f5e2f07d63bb0c984c19093e9b91ae5221d41fa6ef9fdbfecf9
    • Instruction Fuzzy Hash: F9510DB1A00208BBDB04DFD5DD85FAFBBB9AB48705F104129F701B7290D775AA44CBA9

    Control-flow Graph

    APIs
    • IsDebuggerPresent.KERNEL32 ref: 00401C16
    • _crt_debugger_hook.MSVCR90(00000001), ref: 00401C23
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00401C2B
    • UnhandledExceptionFilter.KERNEL32(hC@), ref: 00401C36
    • _crt_debugger_hook.MSVCR90(00000001), ref: 00401C47
    • GetCurrentProcess.KERNEL32(C0000409), ref: 00401C52
    • TerminateProcess.KERNEL32(00000000), ref: 00401C59
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1416261030.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1416247807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416274285.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_file.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled_crt_debugger_hook$CurrentDebuggerPresentTerminate
    • String ID: hC@
    • API String ID: 3369434319-336404188
    • Opcode ID: d2139c2bed3175849152e0283c94030944e0fbb0075a10b5a01347a936d41015
    • Instruction ID: 2aedcaec97bcce6a99d89d9630b336f12a62c9d0ada6259affbba3e18127f102
    • Opcode Fuzzy Hash: d2139c2bed3175849152e0283c94030944e0fbb0075a10b5a01347a936d41015
    • Instruction Fuzzy Hash: AC21EDF4901300DBD740EF65FB88B043BA8BB98305F11503AEA08B72A1E7B45985CF1D

    Control-flow Graph

    APIs
    • GetModuleHandleA.KERNEL32(00000000), ref: 004014DE
    • FindResourceA.KERNEL32(00000000,?,00000000), ref: 004014F3
    • SizeofResource.KERNEL32(00000000,00000000), ref: 00401514
    • LoadResource.KERNEL32(00000000,00000000), ref: 00401525
    • LockResource.KERNEL32(00000000), ref: 00401532
    • ??2@YAPAXI@Z.MSVCR90(00000000), ref: 00401567
    • memset.MSVCR90 ref: 00401582
    • memcpy.MSVCR90(00000000,?,?), ref: 00401596
    • FreeResource.KERNEL32(00000000), ref: 004015A2
    Memory Dump Source
    • Source File: 00000000.00000002.1416261030.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1416247807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416274285.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_file.jbxd
    Similarity
    • API ID: Resource$??2@FindFreeHandleLoadLockModuleSizeofmemcpymemset
    • String ID:
    • API String ID: 4215054063-0
    • Opcode ID: d6cb9ad8b6f2c82266df92b3db8533be16e97b5d77abb176b134746c45d7bd50
    • Instruction ID: df105d28d21e45a39e91148c8c33ceea9311091b1e7759c0afe5b158f5e0ef7c
    • Opcode Fuzzy Hash: d6cb9ad8b6f2c82266df92b3db8533be16e97b5d77abb176b134746c45d7bd50
    • Instruction Fuzzy Hash: 5C31E8B5D01209EFDB04DFE8D885BAEBBB9AB8C301F108569E615B7344D7389A41CF94
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00001C61), ref: 00401CA8
    Memory Dump Source
    • Source File: 00000000.00000002.1416261030.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1416247807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416274285.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_file.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 08ec4937f47bae8683846ebde575daac0604b6a6c75c2f286ef2326a66856219
    • Instruction ID: 7234e5cda294511fdcd36ee1e6d9db052cbb61cd1d76709f3e0e54ebb73451d1
    • Opcode Fuzzy Hash: 08ec4937f47bae8683846ebde575daac0604b6a6c75c2f286ef2326a66856219
    • Instruction Fuzzy Hash: BC9002A0A9610056E6001F706D4E90529945B8C71375544716005E40A9DA7481446559

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 85 4015c0-401622 memset * 2 86 401624-401673 GetSystemDirectoryA strcpy strcat * 2 85->86 87 401675-401685 strcpy 85->87 88 401688-4016ab 86->88 87->88 89 4016ac call 4014c0 88->89 90 4016b1-4016c1 89->90 91 4016c3 90->91 92 4016c7-4016db 90->92 93 4016f3-4016fa 91->93 94 4016dc call 401430 92->94 96 401717-40171d 93->96 97 4016fc-401714 ??3@YAXPAX@Z 93->97 95 4016e1-4016e6 94->95 98 4016e8 95->98 99 4016ec 95->99 100 40171f call 401740 96->100 97->96 98->93 99->93 101 401724-401727 100->101
    APIs
    • memset.MSVCR90 ref: 004015EF
    • memset.MSVCR90 ref: 0040160C
    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 00401630
    • strcpy.MSVCR90(00000000,00000000), ref: 00401644
    • strcat.MSVCR90(00000000,00403150), ref: 00401658
    • strcat.MSVCR90(00000000,g0A@), ref: 0040166B
    • strcpy.MSVCR90(00000000,g0A@), ref: 00401680
    • ??3@YAXPAX@Z.MSVCR90(?), ref: 0040170F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1416261030.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1416247807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416274285.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_file.jbxd
    Similarity
    • API ID: memsetstrcatstrcpy$??3@DirectorySystem
    • String ID: 0A@$IDR_BINARY$g0A@
    • API String ID: 2709240578-1321134200
    • Opcode ID: 47786f9c9c327f481da938822c778ba72ac1167ad344305fd3850c6c522fb54e
    • Instruction ID: bd709673f432895d96053e7a1890aeb009925225cf4082008606cb9e1c208365
    • Opcode Fuzzy Hash: 47786f9c9c327f481da938822c778ba72ac1167ad344305fd3850c6c522fb54e
    • Instruction Fuzzy Hash: 023136B5D0021CABCB14DB50DC46BDD77786B18304F1445E9E60977290EAB99B84CF95

    Control-flow Graph

    APIs
    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,02000000,00000000), ref: 0040101C
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00401083
    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00401091
    • SetFileTime.KERNEL32(000000FF,?,00000000,?), ref: 004010A5
    • CloseHandle.KERNEL32(000000FF), ref: 004010B2
    • SetFileAttributesA.KERNEL32(?,00000002), ref: 004010BE
    Memory Dump Source
    • Source File: 00000000.00000002.1416261030.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1416247807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416274285.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_file.jbxd
    Similarity
    • API ID: File$Time$AttributesCloseCreateHandleLocalSystem
    • String ID:
    • API String ID: 3576422975-0
    • Opcode ID: eeea8958ef993b91b99b324b84ae3f0e56cc996f67890e8a31cbe156c994c08a
    • Instruction ID: d063f94e3047cbbeed53c7bf3acd63c479d462aef834abbec3f88782aa0c5c9f
    • Opcode Fuzzy Hash: eeea8958ef993b91b99b324b84ae3f0e56cc996f67890e8a31cbe156c994c08a
    • Instruction Fuzzy Hash: 1C213B75A10209ABEB00DFE4DC45BDEBB79EF48301F008528E605FB294E77997448B99

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 116 4010d0-401155 memset GetWindowsDirectoryA memset strcpy strcat * 2 call 4015c0 119 401164-401165 116->119 120 401157 116->120 121 40115c call 401000 120->121 122 401161 121->122 122->119
    APIs
    • memset.MSVCR90 ref: 004010DF
    • GetWindowsDirectoryA.KERNEL32(00404238,00000104), ref: 004010F1
    • memset.MSVCR90 ref: 00401103
    • strcpy.MSVCR90(00404130,00404238), ref: 00401115
    • strcat.MSVCR90(00404130,00403150), ref: 00401127
    • strcat.MSVCR90(00404130,?), ref: 0040113A
      • Part of subcall function 004015C0: memset.MSVCR90 ref: 004015EF
      • Part of subcall function 004015C0: memset.MSVCR90 ref: 0040160C
      • Part of subcall function 004015C0: GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 00401630
      • Part of subcall function 004015C0: strcpy.MSVCR90(00000000,00000000), ref: 00401644
      • Part of subcall function 004015C0: strcat.MSVCR90(00000000,00403150), ref: 00401658
      • Part of subcall function 004015C0: strcat.MSVCR90(00000000,g0A@), ref: 0040166B
      • Part of subcall function 004015C0: ??3@YAXPAX@Z.MSVCR90(?), ref: 0040170F
      • Part of subcall function 00401000: CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,02000000,00000000), ref: 0040101C
    Memory Dump Source
    • Source File: 00000000.00000002.1416261030.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1416247807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416274285.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_file.jbxd
    Similarity
    • API ID: memsetstrcat$Directorystrcpy$??3@CreateFileSystemWindows
    • String ID:
    • API String ID: 183849647-0
    • Opcode ID: e933952b1df384473d573e8b326ce86ba299fe58b85d6d9e2cc82bf740734c5f
    • Instruction ID: 4063d0ca189c5dcc6b4344f68adf06086b410b5acec7dc23dcd36689976caf37
    • Opcode Fuzzy Hash: e933952b1df384473d573e8b326ce86ba299fe58b85d6d9e2cc82bf740734c5f
    • Instruction Fuzzy Hash: 9FF054F6BD130072E60076927C47F5A299407A8B9BF24003AFB897D2D6E8FA5594416F

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 123 401430-401471 remove fopen 124 401473 123->124 125 401477-401497 fwrite 123->125 126 4014a4-4014a8 124->126 127 401499 125->127 128 40149d 125->128 129 4014b7-4014bd 126->129 130 4014aa-4014b4 fclose 126->130 127->126 128->126 130->129
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1416261030.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1416247807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416274285.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1416287561.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_file.jbxd
    Similarity
    • API ID: fclosefopenfwriteremove
    • String ID:
    • API String ID: 2674753510-0
    • Opcode ID: 716c65d952b59f682d3413fc4760727344e3253912c4af3e73e5ab98a8c089cb
    • Instruction ID: e33c1b30cdd4ba52c7a59279bc17ac0183760188e702159388b78ae8196fbdbe
    • Opcode Fuzzy Hash: 716c65d952b59f682d3413fc4760727344e3253912c4af3e73e5ab98a8c089cb
    • Instruction Fuzzy Hash: 77112D70D00208FFDB00DF94D949B9E7BB8AF44309F1481A9E9156B290D3799B54CF99