Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1522723
MD5:436b11d1ed92bf9d6abf46d8bdf9951e
SHA1:54d8fcda2b9fe4d89668759011f83cbcfcdb18eb
SHA256:521357a0f9669de4a9233feeef7a3c5299c51de4a2531c56aacc807c0fd25a6a
Tags:NETexeMSILuser-jstrosch
Infos:

Detection

NoCry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected NoCry Ransomware
AI detected suspicious sample
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files

Classification

  • System is w10x64
  • file.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 436B11D1ED92BF9D6ABF46D8BDF9951E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7624JoeSecurity_NoCryYara detected NoCry RansomwareJoe Security
    Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\file.exe, ProcessId: 7624, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeAvira: detected
    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exeAvira: detection malicious, Label: TR/Dropper.Gen
    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exeReversingLabs: Detection: 86%
    Source: file.exeReversingLabs: Detection: 86%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 81.4% probability
    Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exeJoe Sandbox ML: detected
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
    Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\. source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\. source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\. source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\. source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp+10h], 00000057h0_2_00007FF8879C09E2
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp+10h], 00000070h0_2_00007FF8879C09E2
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp+10h], 0000008Dh0_2_00007FF8879C09E2
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp+10h], 0000002Ch0_2_00007FF8879C0F46
    Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then mov dword ptr [ebp+10h], 0000007Fh0_2_00007FF8879C20BE
    Source: file.exe, 00000000.00000002.2683285299.0000000000D57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
    Source: file.exe, 00000000.00000002.2683285299.0000000000D0C000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
    Source: file.exe, Windows.exe.0.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
    Source: file.exe, Windows.exe.0.drString found in binary or memory: http://www.site.com/log.php
    Source: file.exe, Windows.exe.0.drString found in binary or memory: https://www.google.com/search?q=how

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7624, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF8879C09E20_2_00007FF8879C09E2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF8879C413E0_2_00007FF8879C413E
    Source: file.exeStatic PE information: invalid certificate
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Windows.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: file.exe, check.csCryptographic APIs: 'TransformFinalBlock'
    Source: file.exe, check.csCryptographic APIs: 'TransformFinalBlock'
    Source: file.exe, check.csCryptographic APIs: 'TransformFinalBlock'
    Source: Windows.exe.0.dr, check.csCryptographic APIs: 'TransformFinalBlock'
    Source: Windows.exe.0.dr, check.csCryptographic APIs: 'TransformFinalBlock'
    Source: Windows.exe.0.dr, check.csCryptographic APIs: 'TransformFinalBlock'
    Source: classification engineClassification label: mal100.rans.adwa.evad.winEXE@1/4@0/0
    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exeJump to behavior
    Source: C:\Users\user\Desktop\file.exeMutant created: NULL
    Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\Windows
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeReversingLabs: Detection: 86%
    Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptnet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_88e266cb2fac7c0d\MSVCR80.dllJump to behavior
    Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\. source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\. source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\. source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\. source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
    Source: file.exeStatic PE information: section name: .text entropy: 7.353780498511655
    Source: Windows.exe.0.drStatic PE information: section name: .text entropy: 7.353780498511655
    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exeJump to dropped file
    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exeJump to behavior
    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exeJump to behavior
    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
    Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: file.exe, Windows.exe.0.drBinary or memory string: SBIEDLL.DLLMHTTP://IP-API.COM/LINE/?FIELDS=HOSTING
    Source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
    Source: C:\Users\user\Desktop\file.exeMemory allocated: 1090000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory allocated: 2EC0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory allocated: 1AEC0000 memory commit | memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\file.exe TID: 7712Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: LKD:\sources\replacementmanifests\microsoft-hyper-v-migration-replacement.man
    Source: Windows.exe.0.drBinary or memory string: vmware
    Source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %DetectVirtualMachine%
    Source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: TSD:\sources\replacementmanifests\microsoft-hyper-v-drivers-migration-replacement.man
    Source: file.exe, 00000000.00000002.2683285299.0000000000D57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
    Source: file.exe, 00000000.00000002.2689210405.000000001BB03000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWq1u
    Source: file.exe, Windows.exe.0.drBinary or memory string: %Emulator%-%DetectVirtualMachine%
    Source: file.exe, 00000000.00000002.2689210405.000000001BB03000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: file.exe, Windows.exe.0.drBinary or memory string: DetectVirtualMachine
    Source: file.exe, 00000000.00000002.2683873012.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SRD:\sources\replacementmanifests\microsoft-hyper-v-client-migration-replacement.man
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
    Windows Management Instrumentation
    12
    Registry Run Keys / Startup Folder
    12
    Registry Run Keys / Startup Folder
    1
    Masquerading
    OS Credential Dumping1
    Query Registry
    Remote Services11
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    DLL Side-Loading
    4
    Virtualization/Sandbox Evasion
    LSASS Memory221
    Security Software Discovery
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Disable or Modify Tools
    Security Account Manager4
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDS13
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
    Software Packing
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe87%ReversingLabsByteCode-MSIL.Ransomware.NoCry
    file.exe100%AviraTR/Dropper.Gen
    file.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe100%AviraTR/Dropper.Gen
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe87%ReversingLabsByteCode-MSIL.Ransomware.NoCry
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    bg.microsoft.map.fastly.net
    199.232.214.172
    truefalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.google.com/search?q=howfile.exe, Windows.exe.0.drfalse
        unknown
        http://www.site.com/log.phpfile.exe, Windows.exe.0.drfalse
          unknown
          http://ip-api.com/line/?fields=hostingfile.exe, Windows.exe.0.drfalse
          • URL Reputation: safe
          unknown
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1522723
          Start date and time:2024-09-30 16:00:10 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 43s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:file.exe
          Detection:MAL
          Classification:mal100.rans.adwa.evad.winEXE@1/4@0/0
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 92%
          • Number of executed functions: 25
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 199.232.214.172
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target file.exe, PID 7624 because it is empty
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenFile calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: file.exe
          TimeTypeDescription
          10:01:09API Interceptor1x Sleep call for process: file.exe modified
          15:01:11AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          bg.microsoft.map.fastly.net140AEcuVy7.lnkGet hashmaliciousLonePageBrowse
          • 199.232.214.172
          Purchase Order IBT LPO-2320.emlGet hashmaliciousUnknownBrowse
          • 199.232.210.172
          https://timetraveltv.com/actions/cart_update.php?currency=GBP&return_url=https://blog.acelyaokcu.com/m/?c3Y9bzM2NV8xX29uZSZyYW5kPVdrcFNRMHM9JnVpZD1VU0VSMDkwOTIwMjRVMTIwOTA5MDE=N0123N%5BEMAILGet hashmaliciousUnknownBrowse
          • 199.232.214.172
          SCAN_Client_No_XP9739270128398468932393.pdfGet hashmaliciousHTMLPhisherBrowse
          • 199.232.214.172
          https://cganet.com/Get hashmaliciousUnknownBrowse
          • 199.232.214.172
          UhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
          • 199.232.214.172
          7LC2izrr9u.exeGet hashmaliciousScreenConnect ToolBrowse
          • 199.232.214.172
          UhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
          • 199.232.214.172
          7LC2izrr9u.exeGet hashmaliciousScreenConnect ToolBrowse
          • 199.232.214.172
          https://ck.storematch.jp/bc?d=11044D9580EY4W1C2FD019VB3VD27BCW862C0351F9E0EA8-cdlaq4&B=a4f71fd1c235a114f94297e8a0a36c6e&sc_i=shp_pc_promo_mdRMBP_disp_mcad&rd=//interglobalcargoexpress.com/yuuuii#aW5mb0B2b3NzbG9oLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
          • 199.232.214.172
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\file.exe
          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
          Category:dropped
          Size (bytes):71954
          Entropy (8bit):7.996617769952133
          Encrypted:true
          SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
          MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
          SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
          SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
          SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
          Malicious:false
          Reputation:high, very likely benign file
          Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
          Process:C:\Users\user\Desktop\file.exe
          File Type:data
          Category:dropped
          Size (bytes):328
          Entropy (8bit):3.247897867253901
          Encrypted:false
          SSDEEP:6:kK/9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:mDImsLNkPlE99SNxAhUe/3
          MD5:8F17121561E467BCB734E10CDDB6C43F
          SHA1:627DD3EB73FD14358AE3C69E6A5F27328E7DB3A9
          SHA-256:2B35664273C4D5107713DADAA4681B8C9BA9A22C92A40DC58F96B01B241151BF
          SHA-512:3F8574DAF062EC58E0E6841191F36261B5CCD9C33AAAEC002FA50E6D12CAC5772D672445487D86BE95CCD3C89A64405157ED135D90616034FE73486552893E54
          Malicious:false
          Reputation:low
          Preview:p...... ..........R3A...(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
          Process:C:\Users\user\Desktop\file.exe
          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Category:dropped
          Size (bytes):185952
          Entropy (8bit):7.333388863773737
          Encrypted:false
          SSDEEP:3072:bwv4gbyMbNlGDxbjjqnSIMAHFwmo7XqwvX0VQ2fSIrsfyb50E3QBSfUqK1K3cal/:E8SMGFwrn0VQ6Cyd0E3QMfhqK3calkq
          MD5:436B11D1ED92BF9D6ABF46D8BDF9951E
          SHA1:54D8FCDA2B9FE4D89668759011F83CBCFCDB18EB
          SHA-256:521357A0F9669DE4A9233FEEEF7A3C5299C51DE4A2531C56AACC807C0FD25A6A
          SHA-512:439F027749EE53FEE3C1743409DFD73058E9195266F8034417EC0563379E519547934C34C4C4C3264B82CC40F94AB753B299DE5A618AD8ABC330EBE441D34AE0
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 87%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...T,.b.........."...P.................. ........@.. .......................@............@.....................................K.......B...............`.... ....................................................... ............... ..H............text........ ...................... ..`.rsrc...B...........................@..@.reloc....... ......................@..B........................H........t...l..........d...3.............................................(....*&..(.....*.s.........s.........s ........s!........s"........*Z........o5...........*&..(6....*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*j..{....(...+}.....{....+.*...{......,.+.....,.rq..ps;...z..|....(...+*...{......,.+.....,.rq..ps;...z..|....(...+*...{......,.+.....,.rq..ps;...z..|....(...+*...{......,.+.....,.rq..ps;...z..|....(...+*&........*".......*Vs
          Process:C:\Users\user\Desktop\file.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:true
          Reputation:high, very likely benign file
          Preview:[ZoneTransfer]....ZoneId=0
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):7.333388863773737
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
          • Win32 Executable (generic) a (10002005/4) 49.93%
          • Windows Screen Saver (13104/52) 0.07%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:file.exe
          File size:185'952 bytes
          MD5:436b11d1ed92bf9d6abf46d8bdf9951e
          SHA1:54d8fcda2b9fe4d89668759011f83cbcfcdb18eb
          SHA256:521357a0f9669de4a9233feeef7a3c5299c51de4a2531c56aacc807c0fd25a6a
          SHA512:439f027749ee53fee3c1743409dfd73058e9195266f8034417ec0563379e519547934c34c4c4c3264b82cc40f94ab753b299de5a618ad8abc330ebe441d34ae0
          SSDEEP:3072:bwv4gbyMbNlGDxbjjqnSIMAHFwmo7XqwvX0VQ2fSIrsfyb50E3QBSfUqK1K3cal/:E8SMGFwrn0VQ6Cyd0E3QMfhqK3calkq
          TLSH:3F04BF252381EF52C46D46B514719A4023F96D93C356DA7E7FE8B0AD6BF2B808701FE2
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...T,.b.........."...P.................. ........@.. .......................@............@................................
          Icon Hash:00928e8e8686b000
          Entrypoint:0x42e0ee
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x62D02C54 [Thu Jul 14 14:46:44 2022 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Signature Valid:false
          Signature Issuer:CN=KoraySec Root CA, OU=Certificate Authority, O=KoraySec
          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
          Error Number:-2146762487
          Not Before, Not After
          • 01/02/2023 10:29:58 01/02/2024 10:29:58
          Subject Chain
          • CN=Google, O=Google, OU=Google, L=Los Angeles, S=California, C=US, E=chjgchnv@gmail.com
          Version:3
          Thumbprint MD5:7ABCA51F8A27906AA3D4A2DDEE97DF41
          Thumbprint SHA-1:7189DCB8855F6C684B460C8E1ECE01373FB4E1D3
          Thumbprint SHA-256:6576D0FBDC2CFFBB94AFC6CC91FA24124C929668C97BBA18A424ECDB53691126
          Serial:01040503
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x2e0a00x4b.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x300000x242.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x2ca000xc60.text
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x320000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x2c0f40x2c200913c99aafc192126a25f13d9dba59c3bFalse0.7212232206090652data7.353780498511655IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0x300000x2420x400fb2231d0976326e53757928c09fbb9dcFalse0.3037109375data3.5160679793070893IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x320000xc0x2007af298d090bd9d31846c0a42af422136False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x300580x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
          DLLImport
          mscoree.dll_CorExeMain
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Sep 30, 2024 16:01:09.183738947 CEST1.1.1.1192.168.2.90x49baNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
          Sep 30, 2024 16:01:09.183738947 CEST1.1.1.1192.168.2.90x49baNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:10:01:08
          Start date:30/09/2024
          Path:C:\Users\user\Desktop\file.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\file.exe"
          Imagebase:0x810000
          File size:185'952 bytes
          MD5 hash:436B11D1ED92BF9D6ABF46D8BDF9951E
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Reset < >
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID: 8I $8I $8I $8I $8I $8I $8I $8I $8I $8I $8I $8I $8I $8I $8I $8I $y$w#
            • API String ID: 0-1082080199
            • Opcode ID: e82bd491cc5230f66b0b854af222210738fce2c3aef426cccf29e5fb63767c88
            • Instruction ID: 9caaa7f10c89d53804c3c4f5a49b2a71e5cebf84bbb190305e6b6aeac3c6a71d
            • Opcode Fuzzy Hash: e82bd491cc5230f66b0b854af222210738fce2c3aef426cccf29e5fb63767c88
            • Instruction Fuzzy Hash: C4633E709596CE8FEBA1DF288C557E93BE1FF5A340F4440A6D84CCB292DB389A44CB51
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID: ,$8I $8I
            • API String ID: 0-4143522558
            • Opcode ID: 605d7d3ae7823a24f55c5ea20c4c72a106eccedd8ab338a7b6e15f236bdc4ab0
            • Instruction ID: 3a206fdab9f41b55d2cee8f0971d3a3be52e36b46d3c1286b08b6bc17f9633e7
            • Opcode Fuzzy Hash: 605d7d3ae7823a24f55c5ea20c4c72a106eccedd8ab338a7b6e15f236bdc4ab0
            • Instruction Fuzzy Hash: 5A024B709096C98FEBA6DF6888557E93BE1FF56340F4440AAD84DCB292CF389A44CB51
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID: 8I $8I $w#
            • API String ID: 0-84765575
            • Opcode ID: 1a0fd3394d5be7b32e5a6a7b49e3bb5a5d3a66de78a676de4fc69ec9a8386ddd
            • Instruction ID: 47a0b31597e7b78fc3946c44272c99e6d4d147d438612a1015fe929059e1cbfe
            • Opcode Fuzzy Hash: 1a0fd3394d5be7b32e5a6a7b49e3bb5a5d3a66de78a676de4fc69ec9a8386ddd
            • Instruction Fuzzy Hash: B86143715496CA8FEBA1DF288C557E93BE0FF56340F0440AAD85DCB292DA389A48CB11
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 17d169bbf555328deeb69fd13d5285e1a8034c482f5f8ba2eb3253904d09b424
            • Instruction ID: d938afffd02b9bc3544559d9114122e34ccf0f179cfef85cb679601ec0bca148
            • Opcode Fuzzy Hash: 17d169bbf555328deeb69fd13d5285e1a8034c482f5f8ba2eb3253904d09b424
            • Instruction Fuzzy Hash: 19C18C9290E7C51FD783D7B48926659BFB1AF6B28075E40EBD089CF2E3D9185D09C322
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID: 8I $8I $w#$w#$w#
            • API String ID: 0-2759234975
            • Opcode ID: 2fd5cec61babc34f89ca683f0c9cebc28a4a22b217b23d5f369bd8e73ddf99b1
            • Instruction ID: 2e14dad8fc3b73075fb0369d79ea83ec2370c2db078cb7ac3774295742b4a6fd
            • Opcode Fuzzy Hash: 2fd5cec61babc34f89ca683f0c9cebc28a4a22b217b23d5f369bd8e73ddf99b1
            • Instruction Fuzzy Hash: 67123B709596CA8FEBB1DF288C557E93BE1FF56340F0440AAD88DCB292DB385A44CB51
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID: w#$w#
            • API String ID: 0-4018902906
            • Opcode ID: 97c08bf99cc2d7d42f2ac3ef91eb5fe44ed08214b89ff4fd853404eaea78c4df
            • Instruction ID: 257c5113280c506bc92e56d4255bf10299f0660c3abb94370ce275f460864867
            • Opcode Fuzzy Hash: 97c08bf99cc2d7d42f2ac3ef91eb5fe44ed08214b89ff4fd853404eaea78c4df
            • Instruction Fuzzy Hash: 07313C709097CA4FDBA69F2888557D93FF1FF56380F0801AAD488CF2A2CA385A95C711
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID: hV
            • API String ID: 0-3364352740
            • Opcode ID: 9af8cec6b4a4c043804058b8202c3fdd8110439c510e82780453ddd9ecbdbf9b
            • Instruction ID: f96f51ecb65a090f493ffc9d98c93d4055b471e3e862fb358734bb8a0f354b0f
            • Opcode Fuzzy Hash: 9af8cec6b4a4c043804058b8202c3fdd8110439c510e82780453ddd9ecbdbf9b
            • Instruction Fuzzy Hash: 9ED1C470518A8D8FEBB1EF58CC49BE93BE0FB58344F50456AE84DCB291DB789684CB41
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID: hV
            • API String ID: 0-3364352740
            • Opcode ID: 75f03db80089963eb6357604699f0658a8ce7090bce8cf17bee802978ab3ca76
            • Instruction ID: cb295053c71b5ec14c2c961840b0e37fcf66795612f2fe0e3bbd76cbc8d40c66
            • Opcode Fuzzy Hash: 75f03db80089963eb6357604699f0658a8ce7090bce8cf17bee802978ab3ca76
            • Instruction Fuzzy Hash: 90D1C470528A8D8FEBB0EF58CC49BE97BE0FB58344F50456AD84DCB291DB789684CB41
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID: )
            • API String ID: 0-2427484129
            • Opcode ID: e9d6859e09d3576bbf60c8726f7e622e4a4ab3de3aeb92be791b3fcf05a14e72
            • Instruction ID: 995acf0f23220af3614f6ad1bdab84d0d51a3b711f0276f31c454b4489b943f3
            • Opcode Fuzzy Hash: e9d6859e09d3576bbf60c8726f7e622e4a4ab3de3aeb92be791b3fcf05a14e72
            • Instruction Fuzzy Hash: 0521EB70919A8D8FDBB6EF18C895BD83BE5FF59740F400166E80CCB296DA34AB40CB41
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8452e194ebd86d25912869f9bf3f4d87bd15ff3343ef72434bedb59acbd3bc65
            • Instruction ID: 2c556bf0859726aa35bd070d9aa9b3a3da6d936a556ca007699e75cf9d2eb1a5
            • Opcode Fuzzy Hash: 8452e194ebd86d25912869f9bf3f4d87bd15ff3343ef72434bedb59acbd3bc65
            • Instruction Fuzzy Hash: 3E02B2705097CD8EEB76CF28C8697DA3FE0AF16308F584199D89C9F282C7B94648C756
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f0d7ddf20d073300f450331681337d0a19e027b0d682fb7935c6552fca40bc8e
            • Instruction ID: c95168b339489334ecc86c1f29f76396286d9fa7a28aa9b3504db2ae0903520e
            • Opcode Fuzzy Hash: f0d7ddf20d073300f450331681337d0a19e027b0d682fb7935c6552fca40bc8e
            • Instruction Fuzzy Hash: 77B1F8705186C98FDBA5DF28CC54BE93BE0FF1A340F0441AAE84DDB292DB78A944CB51
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 07527f487427fd0428c925788341275c441b550d538159a3360bb86cdfffc749
            • Instruction ID: 2c2cfb5f6c582deded2abed09dcb7663eb2c9dc31f1c135a1d82bc79c3ebf8b9
            • Opcode Fuzzy Hash: 07527f487427fd0428c925788341275c441b550d538159a3360bb86cdfffc749
            • Instruction Fuzzy Hash: 10B1C370518ACD8FEBB1DF18C889BE93BE0FB59304F50456AD84DCB251DB789689CB81
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ae1679f49a97e317ec5dc8183664540d8a9f941a20d672f4d1e87c0dbd852d21
            • Instruction ID: 821cb076b3049fe13e07f17fb7b65b0a5df6994939d62b70644b82bb2afea9ed
            • Opcode Fuzzy Hash: ae1679f49a97e317ec5dc8183664540d8a9f941a20d672f4d1e87c0dbd852d21
            • Instruction Fuzzy Hash: 3FA1D770518A8D8FEBB0EF58CC49BE97BE0FB58304F50456AD84DCB291DB789689CB41
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 14c009aca60c68efe5891346aa49c44f88b60d712bd4e1fe5167280943b9ff7e
            • Instruction ID: bc6a5d8106d1dd51fb74fe58cb8a18e29c41663e37ff483374088408ea6349a9
            • Opcode Fuzzy Hash: 14c009aca60c68efe5891346aa49c44f88b60d712bd4e1fe5167280943b9ff7e
            • Instruction Fuzzy Hash: D181F870518A8D9FEB91DF28C849BE93BE0FF59340F5501A5E84DC7292D738D984CB51
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 42c0b67118b63d3acbc2128df36db6dc7a01ed96c8ddcb9a9e772b02f00b3315
            • Instruction ID: 51758fd5c9a9db0d4cb088700c0154367ede0cc8815c94d98002bb86af220752
            • Opcode Fuzzy Hash: 42c0b67118b63d3acbc2128df36db6dc7a01ed96c8ddcb9a9e772b02f00b3315
            • Instruction Fuzzy Hash: 6371D970918A8D8FEF95DF28C849BE83BE1FF59384F514165E81DC7292DB38A844CB81
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 92f84eb94bdd2ac37303034b468e0135114ce002dbbaed57f1575798a9a548ba
            • Instruction ID: 93d4664c0a8d376a7b909e9597fb4f2edc1d0953287b118c2a43b35fab7df5a2
            • Opcode Fuzzy Hash: 92f84eb94bdd2ac37303034b468e0135114ce002dbbaed57f1575798a9a548ba
            • Instruction Fuzzy Hash: 6361CB71909A8D8FEF86EF28C855B983FF0FF5A380F554196E848CB2A2D634D944CB51
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bbde203534f582dec510985375c2e4a0cc5051a077f2c1c87f12f4a208ca5b98
            • Instruction ID: b6119657357ddff209e24319ef26943bb29e9a689f4bef1fcd8ad36a1f815f33
            • Opcode Fuzzy Hash: bbde203534f582dec510985375c2e4a0cc5051a077f2c1c87f12f4a208ca5b98
            • Instruction Fuzzy Hash: 5B518C71A186CE8FEB85DF68D8517AC3FB0FF59380F4501B6E84DC7292CA28A945C751
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8ab4d585e56b2de59ffd3befd660319ab32cccea1f66ec0634e259e19bbebf62
            • Instruction ID: 7325257290a3611366829546086d032430efb4a9c0eaa10b485f03ea39f9c9ed
            • Opcode Fuzzy Hash: 8ab4d585e56b2de59ffd3befd660319ab32cccea1f66ec0634e259e19bbebf62
            • Instruction Fuzzy Hash: F5410870518ACD8FEBA1DF18CC49BD93BA0FF19344F5041AAE84DCB292DB785648CB42
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 310f8bca23335e9fb1341d4fed66e11af7652bfdfdc3d9d14e09c05c6acc4fc9
            • Instruction ID: ee6d83d1c9b8405e4f52e21f9d34c9a8accc20b533c231b0f9b1f2a3ba662539
            • Opcode Fuzzy Hash: 310f8bca23335e9fb1341d4fed66e11af7652bfdfdc3d9d14e09c05c6acc4fc9
            • Instruction Fuzzy Hash: F141736294CBCA9FD781DB2C88557197FF0FF9A380F4505AAE08CC72A2D6289C44C712
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: af42e58979118aaeb33ede9a0a767c9e9ee3acb1542f44d652e2843a4d053bdc
            • Instruction ID: d03dbf0556bbfae6f18b0538fddf99af65414f9436e35ca830871eccc962c946
            • Opcode Fuzzy Hash: af42e58979118aaeb33ede9a0a767c9e9ee3acb1542f44d652e2843a4d053bdc
            • Instruction Fuzzy Hash: 9B413F71908AC98FEB95DF28C858BA83BF1FF59380F444166E85DC7293CB789945CB41
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5981f8d58c5fa15ed69f3d3eae941d0bdfe3d810eb10878c546335c3cdf52a4e
            • Instruction ID: ab63354c520cfa6fdc33d9b9cb39f128246b45c96c291a24a4f2f0a42537aa8b
            • Opcode Fuzzy Hash: 5981f8d58c5fa15ed69f3d3eae941d0bdfe3d810eb10878c546335c3cdf52a4e
            • Instruction Fuzzy Hash: 58413AB1918A8D8FEB95DF28C858BA83BE1FF59340F544166E84DC72A2CB789945CB40
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 466fd54332fca2719218d08aa27da715f97cb5af32d1087f58e392c0d8d0741d
            • Instruction ID: fe5b0654d169b1be023084cc75f3d4eeb23bd9128fc6aef0100dfcfade02173a
            • Opcode Fuzzy Hash: 466fd54332fca2719218d08aa27da715f97cb5af32d1087f58e392c0d8d0741d
            • Instruction Fuzzy Hash: 3F219F71958A8D9FEB81DF28C8557DC3FB0FF59380F5541A6E84CC7152C6389944C781
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8b0a017a1cfd0b7ff6604cfd74d7f7f8b719e850e034c89ca65c697569510f28
            • Instruction ID: f0878758215e9cf5926f27e587f7ca931ce4f86ce5540c13cd0fd429a8851ce7
            • Opcode Fuzzy Hash: 8b0a017a1cfd0b7ff6604cfd74d7f7f8b719e850e034c89ca65c697569510f28
            • Instruction Fuzzy Hash: 5911C66181CBC85FD795DB2C8855B597BF0FF99344F5445AEE08CC72A2D6388905C712
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 30a2a017cdb7561e5fdfaf20bbe4c96079e93151b3f9de745da604ad36c62ae0
            • Instruction ID: 5f7fb2167835abe2cfa2300a33f61264ad370dbd4eae2d2df5b671a694ca743c
            • Opcode Fuzzy Hash: 30a2a017cdb7561e5fdfaf20bbe4c96079e93151b3f9de745da604ad36c62ae0
            • Instruction Fuzzy Hash: 8F016D719986CD9FDB81AF1888597A83FF0FF55380F1985EAE44CCB152D738A544CB82
            Memory Dump Source
            • Source File: 00000000.00000002.2691590569.00007FF8879C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff8879c0000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 605d458cbb121251af558cabbebeb05651038f5c64626a688a99e8d19da8b8fa
            • Instruction ID: 391fb05163f05174930ca01c8e892fd602badc3410569ed0600f4a19b8c947de
            • Opcode Fuzzy Hash: 605d458cbb121251af558cabbebeb05651038f5c64626a688a99e8d19da8b8fa
            • Instruction Fuzzy Hash: 3E11705055C7C55FE3429768885476EBFE0BF9A244F480AEEE0CDDB2A3C62C9504C713