Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe

Overview

General Information

Sample name:172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
Analysis ID:1522870
MD5:c515cb9490a76b18731e0ddeb339b00f
SHA1:ccea963a43550069a16877ee2f4ef802137415b0
SHA256:3fc957b37cf0b4e0ecfcde1dfad0bd220434e32545b5e16ebf0ef35e9c858762
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
Yara detected DcRat
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Sigma detected: Potentially Suspicious Malware Callback Communication
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Server": ")8\"zc", "Ports": "$A<IlE,84,7;&gV", "Version": "*wacp!]6l[e", "BDOS": "U^2", "AES_key": "R4OsSR16j3MjPEBlkfzyOGTLnlxVVuwW", "Mutex": "n#QO", "Certificate": "UDq5O^", "ServerSignature": "1", "Group": "Oy\\iql0S13XbS4sp1@PsWg:PGIw'~?Q;ifHa#3ef8L\"SpWzk,&&}s;$/?J9UH3>j3={V'nCn.PI*|e>4&k2[2Y\"w$T+^X_j9HSG[?b*'54eS5e_~(e#Z\"n,TX*T->_qfnrv]TM^:Sm1uBPI9|\\4a^^?R|av{V =9J2E|^{wS7Zq,=)a;uL uRaE\"K5bW ycl@NpcoGBww~DzGBkD+U1vws!$\"Awn}G}9cJ6;M^g4xsh'`s^(KX%.#m`^wc.Syd?~c\"Lsj>]?`qx7a!]~a7*CV\\/w6F+j0{&]M*&[7-]2Y</uTKz[gT&GM", "AntiProcess": "HB!<i[>IoEHueVuN1#fc!@?Z#TsdM.i5RX/xjjmOH +NC,v <85~NN!Z.)uebFY`", "PasteBin": "FLVl;"}
SourceRuleDescriptionAuthorStrings
172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x65fb:$a1: havecamera
    • 0x9aec:$a2: timeout 3 > NUL
    • 0x9b0c:$a3: START "" "
    • 0x9997:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
    • 0x9a4c:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
    172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
    • 0x9a4c:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
    • 0x9997:$s2: L2Mgc2NodGFza3MgL2
    • 0x9916:$s3: QW1zaVNjYW5CdWZmZXI
    • 0x9964:$s4: VmlydHVhbFByb3RlY3Q
    172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
    • 0x9cce:$q1: Select * from Win32_CacheMemory
    • 0x9d0e:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
    • 0x9d5c:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
    • 0x9daa:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
    172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
    • 0xa146:$s1: DcRatBy
    SourceRuleDescriptionAuthorStrings
    dump.pcapWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x4e9:$b2: DcRat By qwqdanchun1
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2935177450.000000001BB22000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x108c:$b2: DcRat By qwqdanchun1
    00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x63fb:$a1: havecamera
      • 0x98ec:$a2: timeout 3 > NUL
      • 0x990c:$a3: START "" "
      • 0x9797:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
      • 0x984c:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
      00000000.00000002.2935177450.000000001BA70000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0xaa9a0:$b2: DcRat By qwqdanchun1
      00000000.00000002.2933228059.00000000011CE000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x5438c:$b2: DcRat By qwqdanchun1
      • 0x6e288:$b2: DcRat By qwqdanchun1
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpackWindows_Trojan_DCRat_1aeea1acunknownunknown
        • 0x65fb:$a1: havecamera
        • 0x9aec:$a2: timeout 3 > NUL
        • 0x9b0c:$a3: START "" "
        • 0x9997:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
        • 0x9a4c:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
        0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpackINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
        • 0x9a4c:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
        • 0x9997:$s2: L2Mgc2NodGFza3MgL2
        • 0x9916:$s3: QW1zaVNjYW5CdWZmZXI
        • 0x9964:$s4: VmlydHVhbFByb3RlY3Q
        0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
        • 0x9cce:$q1: Select * from Win32_CacheMemory
        • 0x9d0e:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
        • 0x9d5c:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
        • 0x9daa:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
        0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
        • 0xa146:$s1: DcRatBy

        System Summary

        barindex
        Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 89.117.23.22, DestinationIsIpv6: false, DestinationPort: 4455, EventID: 3, Image: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, Initiated: true, ProcessId: 6456, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-30T19:26:03.592103+020020348471Domain Observed Used for C2 Detected89.117.23.224455192.168.2.449731TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-30T19:26:03.592103+020028424781Malware Command and Control Activity Detected89.117.23.224455192.168.2.449731TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-30T19:26:03.592103+020028480481Domain Observed Used for C2 Detected89.117.23.224455192.168.2.449731TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeAvira: detected
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeMalware Configuration Extractor: AsyncRAT {"Server": ")8\"zc", "Ports": "$A<IlE,84,7;&gV", "Version": "*wacp!]6l[e", "BDOS": "U^2", "AES_key": "R4OsSR16j3MjPEBlkfzyOGTLnlxVVuwW", "Mutex": "n#QO", "Certificate": "UDq5O^", "ServerSignature": "1", "Group": "Oy\\iql0S13XbS4sp1@PsWg:PGIw'~?Q;ifHa#3ef8L\"SpWzk,&&}s;$/?J9UH3>j3={V'nCn.PI*|e>4&k2[2Y\"w$T+^X_j9HSG[?b*'54eS5e_~(e#Z\"n,TX*T->_qfnrv]TM^:Sm1uBPI9|\\4a^^?R|av{V =9J2E|^{wS7Zq,=)a;uL uRaE\"K5bW ycl@NpcoGBww~DzGBkD+U1vws!$\"Awn}G}9cJ6;M^g4xsh'`s^(KX%.#m`^wc.Syd?~c\"Lsj>]?`qx7a!]~a7*CV\\/w6F+j0{&]M*&[7-]2Y</uTKz[gT&GM", "AntiProcess": "HB!<i[>IoEHueVuN1#fc!@?Z#TsdM.i5RX/xjjmOH +NC,v <85~NN!Z.)uebFY`", "PasteBin": "FLVl;"}
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeJoe Sandbox ML: detected
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 89.117.23.22:4455 -> 192.168.2.4:49731
        Source: Network trafficSuricata IDS: 2034847 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT) : 89.117.23.22:4455 -> 192.168.2.4:49731
        Source: Network trafficSuricata IDS: 2848048 - Severity 1 - ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT) : 89.117.23.22:4455 -> 192.168.2.4:49731
        Source: Malware configuration extractorURLs: )8"zc
        Source: unknownDNS query: name: dczas.duckdns.org
        Source: global trafficTCP traffic: 192.168.2.4:49731 -> 89.117.23.22:4455
        Source: Joe Sandbox ViewIP Address: 89.117.23.22 89.117.23.22
        Source: Joe Sandbox ViewASN Name: LRTC-ASLT LRTC-ASLT
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: dczas.duckdns.org
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2935177450.000000001BB4D000.00000004.00000020.00020000.00000000.sdmp, 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933228059.0000000001175000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933228059.00000000011CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en8f
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933845781.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933845781.0000000003156000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: Yara matchFile source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe PID: 6456, type: MEMORYSTR

        System Summary

        barindex
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
        Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
        Source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
        Source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
        Source: 00000000.00000002.2935177450.000000001BB22000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 00000000.00000002.2935177450.000000001BA70000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 00000000.00000002.2933228059.00000000011CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 00000000.00000002.2933845781.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: 00000000.00000002.2933845781.0000000003156000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: Process Memory Space: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe PID: 6456, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeCode function: 0_2_00007FFD9B8983460_2_00007FFD9B898346
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeCode function: 0_2_00007FFD9B89C56F0_2_00007FFD9B89C56F
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeCode function: 0_2_00007FFD9B8990F20_2_00007FFD9B8990F2
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeCode function: 0_2_00007FFD9B8930E20_2_00007FFD9B8930E2
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000000.1671267055.0000000000DDE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeBinary or memory string: OriginalFilenameClient.exe" vs 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
        Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
        Source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
        Source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
        Source: 00000000.00000002.2935177450.000000001BB22000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 00000000.00000002.2935177450.000000001BA70000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 00000000.00000002.2933228059.00000000011CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 00000000.00000002.2933845781.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 00000000.00000002.2933845781.0000000003156000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: Process Memory Space: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe PID: 6456, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, Settings.csBase64 encoded string: 'm1SVmzq41bUtAgiVmChGud35fX/aUNtosr8PYStFYOAnPrN+XR+IkjYiqiUpGtB3iVUC/dwECsCyuNfy8XiQAX4f4BhMF5n5tkjlBy9/rl0=', 'iL4iV3kbq9Wc0eHBghluHFSJGvtmXcYzxD3f8ndQ9uTnqLo5XWL/Ob2NJszbQS9lzFt1jtk75UQxLxfydXIBbg==', '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', 'UB9UzwA9tGakGgTcozLufAUFQxQCuoOi+9ktVsBWG9zFIaU239Gos24AjhaHGQraIeSRRMO3GubTGWn/PCwrNYDzeS4gR3UOWKRrfG9785AWj+/K1SLSEQEyKczGXXNvpC+Yxv5Iymd50ZYpBzwc9x1ME3yP5inYKo5PAUjVoKBlbQlnkfav1AqoOrhH7ohpYYwiXO65nsLpVF8JreGq/VlAHr1JQ9fopC032bYNkBljQf6l83C+UrfxPGpwixgV84GrrDa4efbY4mhD/tCoGnoWO4dgjbGj+FO0qjoyq3E=', 'MIlzi1B7PthTHEHMqprZFE7qh2CwotWNt1bDN2lDdtoVWtDWHS/TzpIcw4Wbme2XtTl/hfh6Cu0vUdf8k+aIhQ==', 'K37OLhwW8YSNgPJaT0/aIK6XT8xXXyJ8hP5zAzYNpppfpBxw4RuVM3WlDbJs4ti69CCz6JpT8wlSjr3femWfpw==', 'j59e0As5uh5mS607NeJD0+mZaKrTbSvccTOP1iThRoCdeFwO1hE/wQ4vuh1aDrUI68wwcvmfYRuWnrMNT8SRhg=='
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, NormalStartup.csBase64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA=='
        Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@2/1
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeMutant created: NULL
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: cryptnet.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: devenum.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: devobj.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeSection loaded: msdmo.dllJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeCode function: 0_2_00007FFD9B8900BD pushad ; iretd 0_2_00007FFD9B8900C1

        Boot Survival

        barindex
        Source: Yara matchFile source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe PID: 6456, type: MEMORYSTR
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe PID: 6456, type: MEMORYSTR
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeMemory allocated: 1720000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeMemory allocated: 1B0D0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeWindow / User API: threadDelayed 7297Jump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeWindow / User API: threadDelayed 2558Jump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe TID: 6748Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe TID: 6744Thread sleep time: -4611686018427385s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe TID: 6768Thread sleep count: 7297 > 30Jump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe TID: 6768Thread sleep count: 2558 > 30Jump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2935735781.000000001BC05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWIU
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2935735781.000000001BC05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933228059.0000000001244000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, AntiProcess.csReference to suspicious API methods: OpenProcess(1u, bInheritHandle: false, processId)
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, Amsi.csReference to suspicious API methods: Win32.VirtualAllocEx(procAddress, (UIntPtr)(ulong)patch.Length, 64u, out var _)
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933845781.000000000340C000.00000004.00000800.00020000.00000000.sdmp, 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933845781.0000000003156000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933845781.000000000340C000.00000004.00000800.00020000.00000000.sdmp, 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933845781.000000000313E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: Yara matchFile source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe.dd0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe PID: 6456, type: MEMORYSTR
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2935595084.000000001BBD1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
        Source: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe
        Source: C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000000.00000002.2933845781.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2933845781.0000000003156000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe PID: 6456, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000002.2933845781.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2933845781.0000000003156000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe PID: 6456, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        Scheduled Task/Job
        1
        Process Injection
        1
        Disable or Modify Tools
        OS Credential Dumping1
        Query Registry
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Scheduled Task/Job
        1
        DLL Side-Loading
        1
        Scheduled Task/Job
        31
        Virtualization/Sandbox Evasion
        LSASS Memory121
        Security Software Discovery
        Remote Desktop ProtocolData from Removable Media1
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        Native API
        Logon Script (Windows)1
        DLL Side-Loading
        1
        Process Injection
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
        Obfuscated Files or Information
        NTDS31
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput Capture21
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials13
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe100%AviraHEUR/AGEN.1307404
        172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        dczas.duckdns.org
        89.117.23.22
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          )8"zctrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933845781.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe, 00000000.00000002.2933845781.0000000003156000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            89.117.23.22
            dczas.duckdns.orgLithuania
            15419LRTC-ASLTtrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1522870
            Start date and time:2024-09-30 19:25:06 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 9s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@1/2@2/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 6
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 88.221.110.91, 2.16.100.168
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • VT rate limit hit for: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
            TimeTypeDescription
            13:26:03API Interceptor2x Sleep call for process: 172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            89.117.23.22sostener.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
              1726981024eaba256966e5d64020ad74d345ce2969fae5805b304862945360330900888386844.dat-decoded.exeGet hashmaliciousRemcosBrowse
                decode_ba297ca42bf569929d6fafd20a8ed9212b3012291d38a6ec2be3376d5488c4a5.exeGet hashmaliciousRemcosBrowse
                  decode_43048329e6cd6df3e144e8592c1194cf0da5e9113653ea155e664cbcc08b4b27.exeGet hashmaliciousAsyncRATBrowse
                    1712325245721159bca57d1b66796bd3ddc0e68293cb290af6bbd263878d0bd09c0ee48caa758.dat-decoded.exeGet hashmaliciousNjratBrowse
                      1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.dat-decoded.exeGet hashmaliciousRemcosBrowse
                        1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.dat-decoded.exeGet hashmaliciousRemcosBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          dczas.duckdns.orgsostener.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                          • 89.117.23.22
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          LRTC-ASLTsostener.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                          • 89.117.23.22
                          mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 89.117.23.69
                          shelld.x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 89.117.23.69
                          ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 89.117.23.69
                          arm61.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 89.117.23.69
                          sh4.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 89.117.23.69
                          586.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 89.117.23.69
                          dss.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 89.117.23.69
                          mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 89.117.23.69
                          co.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 89.117.23.69
                          No context
                          No context
                          Process:C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                          Category:dropped
                          Size (bytes):71954
                          Entropy (8bit):7.996617769952133
                          Encrypted:true
                          SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                          MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                          SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                          SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                          SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                          Process:C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):328
                          Entropy (8bit):3.1226493792132195
                          Encrypted:false
                          SSDEEP:6:kKFo9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:VDnLNkPlE99SNxAhUe/3
                          MD5:9F6F9C45E4AFD16124569BE3C575C958
                          SHA1:B2D2EEA9AB4B74FD5C55692833262E3D8F3C9EF2
                          SHA-256:5857F846F084BD66199A467EA48EA2D6A4F7BE73812BAE5FF28702CA55AEB022
                          SHA-512:D9B78EF6D026A11A75CBE84F32EF978B9F1D5DA23C7DA52186E234BECE10B830084225AFCB72A90F6464B7C45EC7AF6A5240404D4AB300B849B3EA46A47989DD
                          Malicious:false
                          Reputation:low
                          Preview:p...... ........-.N.]...(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):5.619485173826498
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                          • Win32 Executable (generic) a (10002005/4) 49.75%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Windows Screen Saver (13104/52) 0.07%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
                          File size:48'640 bytes
                          MD5:c515cb9490a76b18731e0ddeb339b00f
                          SHA1:ccea963a43550069a16877ee2f4ef802137415b0
                          SHA256:3fc957b37cf0b4e0ecfcde1dfad0bd220434e32545b5e16ebf0ef35e9c858762
                          SHA512:120aa8b5c4fed3ea6a6393a5dd449e57b135b541352e01e7592da284aca75e57a1549a7236eb5db6ca6bfe6221b3d6d708b19b8e09e3bb361ee40bbbf62c1f53
                          SSDEEP:768:xGq+s3pUtDILNCCa+DiugjAWksLqR2k8A0Pip8YbggemWuNp7RvEgK/JLZVc6KN:8q+AGtQOuLWnLAHzbHpWunkJLZVclN
                          TLSH:E9237D0037D8C136E2FD4BB8A9F2A1458279D6676903CB596CC811EA2F13BC597036FE
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................
                          Icon Hash:90cececece8e8eb0
                          Entrypoint:0x40cbbe
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x60930A0B [Wed May 5 21:11:39 2021 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xcb680x53.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000xdf7.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xabc40xac0093cad8408fde35203b2ba080b2c497abFalse0.502452761627907data5.64510050454448IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xe0000xdf70xe002083376922615c09cdda9acfd9305376False0.4017857142857143data5.110607648061562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x100000xc0x20082148d01c3935cf90ef81a3dd1fad607False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_VERSION0xe0a00x2d4data0.4350828729281768
                          RT_MANIFEST0xe3740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-09-30T19:26:03.592103+02002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)189.117.23.224455192.168.2.449731TCP
                          2024-09-30T19:26:03.592103+02002034847ET MALWARE Observed Malicious SSL Cert (AsyncRAT)189.117.23.224455192.168.2.449731TCP
                          2024-09-30T19:26:03.592103+02002848048ETPRO MALWARE Observed Malicious SSL Cert (AsyncRAT)189.117.23.224455192.168.2.449731TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Sep 30, 2024 19:26:02.975022078 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:02.979851007 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:02.979943991 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:03.103795052 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:03.108633995 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:03.578365088 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:03.585633039 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:03.592103004 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:03.772414923 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:03.825778961 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:04.925486088 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:04.930356979 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:04.930428028 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:04.935242891 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:15.659555912 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:15.664908886 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:15.667177916 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:15.672121048 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:15.951904058 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:15.997849941 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:16.073275089 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:16.092294931 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:16.097054958 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:16.097150087 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:16.101977110 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:26.389312029 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:26.396758080 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:26.396826982 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:26.401953936 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:26.685760021 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:26.732101917 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:26.818392038 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:26.838044882 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:26.842869043 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:26.842948914 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:26.848830938 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:31.691037893 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:31.732058048 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:31.821161032 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:31.872698069 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:37.124174118 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:37.129187107 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:37.129262924 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:37.134598017 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:37.419847965 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:37.466486931 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:37.542428970 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:37.544387102 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:37.549180984 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:37.549254894 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:37.554059029 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:47.857639074 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:47.865606070 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:47.865659952 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:47.875864029 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:48.209296942 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:48.263344049 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:48.376854897 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:48.379714966 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:48.384752989 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:48.384838104 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:48.389976025 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:58.592633963 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:58.598229885 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:58.598315954 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:58.605026007 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:58.784645081 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:58.825896978 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:58.918900013 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:58.921278954 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:58.926074028 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:26:58.926157951 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:26:58.931011915 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:00.307725906 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:00.357090950 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:00.443069935 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:00.497797966 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:09.326359987 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:09.331218004 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:09.331343889 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:09.336482048 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:09.628664970 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:09.669598103 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:09.746120930 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:09.749620914 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:09.754393101 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:09.754477978 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:09.759352922 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:20.061691046 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:20.066637039 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:20.066728115 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:20.072573900 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:21.572782993 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:21.622729063 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:21.703440905 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:21.705737114 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:21.711597919 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:21.711678028 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:21.716454983 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:30.302850008 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:30.357136011 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:30.435988903 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:30.482150078 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:30.795116901 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:30.800188065 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:30.800270081 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:30.805187941 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:31.090950966 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:31.138463974 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:31.216512918 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:31.218383074 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:31.224740028 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:31.224795103 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:31.231228113 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:41.529463053 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:41.534537077 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:41.534689903 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:41.541759968 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:41.824270010 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:41.872756004 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:41.954829931 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:41.956759930 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:41.961584091 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:41.961685896 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:41.966578007 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:52.266056061 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:52.271003962 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:52.271054983 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:52.275813103 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:52.559330940 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:52.607326984 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:52.688034058 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:52.692657948 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:52.697501898 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:27:52.697571993 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:27:52.702464104 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:00.309998035 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:00.357167959 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:00.443717003 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:00.497776031 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:02.998327971 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:03.003072023 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:03.003165960 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:03.007951021 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:03.293884993 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:03.341581106 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:03.435340881 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:03.469825029 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:03.475316048 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:03.475496054 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:03.481698036 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:04.547863007 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:04.553597927 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:04.555990934 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:04.560781002 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:04.840620041 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:04.888474941 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:04.967617989 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:04.968406916 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:04.973551989 CEST44554973189.117.23.22192.168.2.4
                          Sep 30, 2024 19:28:04.973620892 CEST497314455192.168.2.489.117.23.22
                          Sep 30, 2024 19:28:04.978511095 CEST44554973189.117.23.22192.168.2.4
                          TimestampSource PortDest PortSource IPDest IP
                          Sep 30, 2024 19:26:01.294095993 CEST5930353192.168.2.41.1.1.1
                          Sep 30, 2024 19:26:02.294790983 CEST5930353192.168.2.41.1.1.1
                          Sep 30, 2024 19:26:02.955117941 CEST53593031.1.1.1192.168.2.4
                          Sep 30, 2024 19:26:02.955159903 CEST53593031.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Sep 30, 2024 19:26:01.294095993 CEST192.168.2.41.1.1.10x2cdcStandard query (0)dczas.duckdns.orgA (IP address)IN (0x0001)false
                          Sep 30, 2024 19:26:02.294790983 CEST192.168.2.41.1.1.10x2cdcStandard query (0)dczas.duckdns.orgA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Sep 30, 2024 19:26:02.955117941 CEST1.1.1.1192.168.2.40x2cdcNo error (0)dczas.duckdns.org89.117.23.22A (IP address)IN (0x0001)false
                          Sep 30, 2024 19:26:02.955159903 CEST1.1.1.1192.168.2.40x2cdcNo error (0)dczas.duckdns.org89.117.23.22A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:13:25:56
                          Start date:30/09/2024
                          Path:C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe"
                          Imagebase:0xdd0000
                          File size:48'640 bytes
                          MD5 hash:C515CB9490A76B18731E0DDEB339B00F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2935177450.000000001BB22000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000000.1671251346.0000000000DD2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2935177450.000000001BA70000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2933228059.00000000011CE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.2933845781.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2933845781.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.2933845781.0000000003156000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2933845781.0000000003156000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:21.6%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:6
                            Total number of Limit Nodes:0
                            execution_graph 5309 7ffd9b892d3d 5310 7ffd9b892d4b VirtualProtect 5309->5310 5312 7ffd9b892e2b 5310->5312 5305 7ffd9b8929e1 5306 7ffd9b8929eb LoadLibraryA 5305->5306 5308 7ffd9b892ad2 5306->5308

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 22 7ffd9b89c56f-7ffd9b89c588 24 7ffd9b89c5b7-7ffd9b89c5bd 22->24 25 7ffd9b89c58a-7ffd9b89c5b2 22->25 26 7ffd9b89c6b4-7ffd9b89c6ba 24->26 27 7ffd9b89c5c3-7ffd9b89c5c9 24->27 37 7ffd9b89d4b2-7ffd9b89d4be 25->37 29 7ffd9b89c6c0-7ffd9b89c6c6 26->29 30 7ffd9b89c75f-7ffd9b89c765 26->30 27->26 31 7ffd9b89c5cf-7ffd9b89c5e6 call 7ffd9b894a50 27->31 29->30 33 7ffd9b89c6cc-7ffd9b89c6e6 call 7ffd9b894a50 29->33 35 7ffd9b89c767-7ffd9b89c76d 30->35 36 7ffd9b89c7cc-7ffd9b89c7d2 30->36 31->37 45 7ffd9b89c5ec-7ffd9b89c65a call 7ffd9b89abf8 31->45 33->37 50 7ffd9b89c6ec-7ffd9b89c758 call 7ffd9b890ac8 33->50 35->36 42 7ffd9b89c76f-7ffd9b89c7c7 35->42 38 7ffd9b89c80e-7ffd9b89c814 36->38 39 7ffd9b89c7d4-7ffd9b89c7da 36->39 46 7ffd9b89c816-7ffd9b89c82b call 7ffd9b894a50 38->46 47 7ffd9b89c830-7ffd9b89c836 38->47 39->38 43 7ffd9b89c7dc-7ffd9b89c809 39->43 42->37 43->37 131 7ffd9b89c65f-7ffd9b89c6a9 call 7ffd9b890ac8 45->131 46->37 53 7ffd9b89c83c-7ffd9b89c842 47->53 54 7ffd9b89d4bf-7ffd9b89d4fa 47->54 130 7ffd9b89c75a 50->130 60 7ffd9b89c86f-7ffd9b89c875 53->60 61 7ffd9b89c844-7ffd9b89c86a 53->61 86 7ffd9b89d501-7ffd9b89d586 54->86 62 7ffd9b89c877-7ffd9b89c89d 60->62 63 7ffd9b89c8a2-7ffd9b89c8a8 60->63 61->37 62->37 68 7ffd9b89c8aa-7ffd9b89c8f6 63->68 69 7ffd9b89c8fb-7ffd9b89c901 63->69 68->37 73 7ffd9b89c907-7ffd9b89c98c call 7ffd9b89a9e8 69->73 74 7ffd9b89c991-7ffd9b89c997 69->74 73->37 78 7ffd9b89ca26-7ffd9b89ca2c 74->78 79 7ffd9b89c99d-7ffd9b89ca21 call 7ffd9b89a9e8 74->79 85 7ffd9b89ca32-7ffd9b89ca38 78->85 78->86 79->37 85->86 92 7ffd9b89ca3e-7ffd9b89ca44 85->92 155 7ffd9b89d588-7ffd9b89d58e 86->155 156 7ffd9b89d59b-7ffd9b89d5a1 86->156 92->86 96 7ffd9b89ca4a-7ffd9b89ca50 92->96 102 7ffd9b89cad6-7ffd9b89cadc 96->102 103 7ffd9b89ca56-7ffd9b89ca9d call 7ffd9b89a9e8 96->103 110 7ffd9b89cb62-7ffd9b89cb68 102->110 111 7ffd9b89cae2-7ffd9b89cb0c 102->111 190 7ffd9b89cab0-7ffd9b89cab4 103->190 191 7ffd9b89ca9f-7ffd9b89caaf 103->191 118 7ffd9b89cba7-7ffd9b89cbad 110->118 119 7ffd9b89cb6a-7ffd9b89cba2 110->119 149 7ffd9b89cb10-7ffd9b89cb1b call 7ffd9b89a9e8 111->149 123 7ffd9b89cbaf-7ffd9b89cc1f call 7ffd9b89a9e8 118->123 124 7ffd9b89cc24-7ffd9b89cc2a 118->124 119->37 123->37 128 7ffd9b89cc2c-7ffd9b89cc99 call 7ffd9b89a9e8 124->128 129 7ffd9b89cc9e-7ffd9b89cca4 124->129 128->37 136 7ffd9b89cca6-7ffd9b89cd14 call 7ffd9b89a9e8 129->136 137 7ffd9b89cd19-7ffd9b89cd1f 129->137 130->37 131->45 283 7ffd9b89c6af 131->283 136->37 150 7ffd9b89cd25-7ffd9b89cd82 call 7ffd9b89a9e8 call 7ffd9b894a50 137->150 151 7ffd9b89cdfb-7ffd9b89ce01 137->151 173 7ffd9b89cb1d-7ffd9b89cb29 149->173 150->37 298 7ffd9b89cd88-7ffd9b89cdf4 call 7ffd9b890ac8 150->298 158 7ffd9b89ce07-7ffd9b89ce64 call 7ffd9b89a9e8 call 7ffd9b894a50 151->158 159 7ffd9b89cedd-7ffd9b89cee3 151->159 155->156 168 7ffd9b89d590-7ffd9b89d596 155->168 171 7ffd9b89d5b7-7ffd9b89d5bd 156->171 172 7ffd9b89d5a3-7ffd9b89d5b2 156->172 158->37 302 7ffd9b89ce6a-7ffd9b89ced6 call 7ffd9b890ac8 158->302 164 7ffd9b89cee5-7ffd9b89cf02 call 7ffd9b89abf8 159->164 165 7ffd9b89cf07-7ffd9b89cf0d 159->165 164->37 181 7ffd9b89d03e-7ffd9b89d044 165->181 182 7ffd9b89cf13-7ffd9b89cf70 call 7ffd9b89a9e8 call 7ffd9b894a50 165->182 184 7ffd9b89d658-7ffd9b89d6a0 168->184 174 7ffd9b89d609-7ffd9b89d60f 171->174 175 7ffd9b89d5bf-7ffd9b89d607 call 7ffd9b89a9e8 171->175 172->184 210 7ffd9b89cb3c-7ffd9b89cb46 173->210 211 7ffd9b89cb2b-7ffd9b89cb3b 173->211 174->184 189 7ffd9b89d611-7ffd9b89d656 call 7ffd9b89a9e8 174->189 175->184 186 7ffd9b89d175-7ffd9b89d17b 181->186 187 7ffd9b89d04a-7ffd9b89d0a7 call 7ffd9b89a9e8 call 7ffd9b894a50 181->187 182->37 315 7ffd9b89cf76-7ffd9b89d033 call 7ffd9b89abf8 call 7ffd9b890ac8 182->315 206 7ffd9b89d2aa-7ffd9b89d2b0 186->206 207 7ffd9b89d181-7ffd9b89d1dc call 7ffd9b89a9e8 call 7ffd9b894a50 186->207 187->37 324 7ffd9b89d0ad-7ffd9b89d0b8 187->324 189->184 190->149 215 7ffd9b89cab6-7ffd9b89caba 190->215 191->190 216 7ffd9b89d2b2-7ffd9b89d2cf call 7ffd9b89abf8 206->216 217 7ffd9b89d2d4-7ffd9b89d2da 206->217 207->37 333 7ffd9b89d1e2-7ffd9b89d29f call 7ffd9b89abf8 call 7ffd9b890ac8 207->333 242 7ffd9b89cb58-7ffd9b89cb5d 210->242 243 7ffd9b89cb48-7ffd9b89cb4d 210->243 211->210 231 7ffd9b89cacc-7ffd9b89cace 215->231 232 7ffd9b89cabc-7ffd9b89cac1 215->232 216->37 234 7ffd9b89d2dc-7ffd9b89d2f9 call 7ffd9b89abf8 217->234 235 7ffd9b89d2fe-7ffd9b89d304 217->235 231->173 279 7ffd9b89cad0-7ffd9b89cad1 231->279 246 7ffd9b89cad4 232->246 247 7ffd9b89cac3-7ffd9b89cacb 232->247 234->37 239 7ffd9b89d306-7ffd9b89d340 235->239 240 7ffd9b89d345-7ffd9b89d34b 235->240 239->37 261 7ffd9b89d34d-7ffd9b89d3bf call 7ffd9b89a9e8 240->261 262 7ffd9b89d3c4-7ffd9b89d3ca 240->262 242->37 257 7ffd9b89cb60 243->257 258 7ffd9b89cb4f-7ffd9b89cb57 243->258 246->102 247->231 257->110 258->242 261->37 280 7ffd9b89d43c-7ffd9b89d442 262->280 281 7ffd9b89d3cc-7ffd9b89d43a call 7ffd9b89a9e8 262->281 279->37 280->37 287 7ffd9b89d444-7ffd9b89d4ab call 7ffd9b89a9e8 280->287 281->37 283->37 287->37 372 7ffd9b89cdf6 298->372 375 7ffd9b89ced8 302->375 402 7ffd9b89d039 315->402 336 7ffd9b89d0ba-7ffd9b89d10c 324->336 337 7ffd9b89d10e-7ffd9b89d16a call 7ffd9b89abf8 call 7ffd9b890ac8 324->337 405 7ffd9b89d2a5 333->405 336->337 337->324 392 7ffd9b89d170 337->392 372->37 375->37 392->37 402->37 405->37
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2936732828.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b890000_172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12.jbxd
                            Similarity
                            • API ID:
                            • String ID: L
                            • API String ID: 0-2909332022
                            • Opcode ID: a9a387641d25a216e7394be14e9d818cef5c6ccad01af29a394931a68e7aa220
                            • Instruction ID: 6d015024ae8b8a7a2ea56e75d5fb65c1b0f691839348944f01179225593fe6cf
                            • Opcode Fuzzy Hash: a9a387641d25a216e7394be14e9d818cef5c6ccad01af29a394931a68e7aa220
                            • Instruction Fuzzy Hash: 85B22821B1DD0D4FEB6CEB6C94A5A7977D2EFA8300F1541BAD01EC31E7DE28A8428741

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 406 7ffd9b8930e2-7ffd9b893142 413 7ffd9b893148-7ffd9b8931ed 406->413 414 7ffd9b893381-7ffd9b8933c2 call 7ffd9b891998 406->414 442 7ffd9b8932b3 413->442 443 7ffd9b8931f3-7ffd9b8932a0 413->443 422 7ffd9b8933d7-7ffd9b8933e0 414->422 423 7ffd9b8933c4-7ffd9b8933d5 414->423 426 7ffd9b8933e8-7ffd9b893404 422->426 423->426 432 7ffd9b893406-7ffd9b893417 426->432 433 7ffd9b893419-7ffd9b89341e 426->433 436 7ffd9b893425-7ffd9b89348b call 7ffd9b8919a8 call 7ffd9b8919b8 432->436 433->436 456 7ffd9b893491-7ffd9b8934dd 436->456 457 7ffd9b893512 436->457 447 7ffd9b8932b8-7ffd9b8932df 442->447 443->442 483 7ffd9b8932a2-7ffd9b8932ad 443->483 464 7ffd9b8932e1-7ffd9b8932ef 447->464 456->457 485 7ffd9b8934df-7ffd9b89350b 456->485 461 7ffd9b893517-7ffd9b89353f 457->461 489 7ffd9b893541-7ffd9b893558 call 7ffd9b8938d5 461->489 471 7ffd9b893365-7ffd9b89337c 464->471 472 7ffd9b8932f1-7ffd9b89330b 464->472 479 7ffd9b893559-7ffd9b89356a 471->479 472->479 481 7ffd9b893311-7ffd9b89332c 472->481 490 7ffd9b893570-7ffd9b89365e call 7ffd9b8919c8 call 7ffd9b8919d8 479->490 491 7ffd9b893891 479->491 488 7ffd9b893334-7ffd9b893345 481->488 483->447 487 7ffd9b8932af-7ffd9b8932b1 483->487 485->461 493 7ffd9b89350d-7ffd9b893510 485->493 487->464 498 7ffd9b893347 488->498 499 7ffd9b89334c-7ffd9b89335e 488->499 489->479 490->442 518 7ffd9b893664-7ffd9b893690 490->518 495 7ffd9b893898-7ffd9b8938a4 491->495 493->489 498->479 499->481 503 7ffd9b893360 499->503 503->479 520 7ffd9b893692-7ffd9b893698 518->520 521 7ffd9b89369a-7ffd9b8936a1 520->521 522 7ffd9b8936d0-7ffd9b8937a6 call 7ffd9b892418 520->522 521->520 528 7ffd9b8936a3-7ffd9b8936c5 call 7ffd9b891988 call 7ffd9b890628 521->528 545 7ffd9b8937a7-7ffd9b8937b8 522->545 537 7ffd9b8936ca 528->537 537->522 548 7ffd9b8937ba-7ffd9b893889 call 7ffd9b892418 545->548 558 7ffd9b89388f 548->558 558->495
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2936732828.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b890000_172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12.jbxd
                            Similarity
                            • API ID:
                            • String ID: ,
                            • API String ID: 0-3772416878
                            • Opcode ID: 2516206c63268a754b9f4899f22b684e5b525072ffbdb54ce3bf5c2b8e18d7be
                            • Instruction ID: 472366098087e8278bf4b1f5c146940781b71ac91543763e90b4bf6296be4358
                            • Opcode Fuzzy Hash: 2516206c63268a754b9f4899f22b684e5b525072ffbdb54ce3bf5c2b8e18d7be
                            • Instruction Fuzzy Hash: 8332E431B1994A8FEBA8EB6C847567977D2FF9C314F500179E41EC32DADE28AC428741

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 789 7ffd9b898346-7ffd9b898353 790 7ffd9b898355-7ffd9b89835d 789->790 791 7ffd9b89835e-7ffd9b8983ad 789->791 790->791 793 7ffd9b8983b0-7ffd9b8983bd 791->793 793->793 794 7ffd9b8983bf-7ffd9b898427 793->794 797 7ffd9b898429-7ffd9b898432 794->797 798 7ffd9b898493 794->798 797->798 799 7ffd9b898434-7ffd9b898440 797->799 800 7ffd9b898495-7ffd9b8984ba 798->800 801 7ffd9b898479-7ffd9b898491 799->801 802 7ffd9b898442-7ffd9b898454 799->802 807 7ffd9b898526 800->807 808 7ffd9b8984bc-7ffd9b8984c5 800->808 801->800 803 7ffd9b898456 802->803 804 7ffd9b898458-7ffd9b89846b 802->804 803->804 804->804 806 7ffd9b89846d-7ffd9b898475 804->806 806->801 810 7ffd9b898528-7ffd9b8985d0 807->810 808->807 809 7ffd9b8984c7-7ffd9b8984d3 808->809 811 7ffd9b8984d5-7ffd9b8984e7 809->811 812 7ffd9b89850c-7ffd9b898524 809->812 821 7ffd9b89863e 810->821 822 7ffd9b8985d2-7ffd9b8985dc 810->822 813 7ffd9b8984e9 811->813 814 7ffd9b8984eb-7ffd9b8984fe 811->814 812->810 813->814 814->814 816 7ffd9b898500-7ffd9b898508 814->816 816->812 824 7ffd9b898640-7ffd9b898669 821->824 822->821 823 7ffd9b8985de-7ffd9b8985eb 822->823 825 7ffd9b8985ed-7ffd9b8985ff 823->825 826 7ffd9b898624-7ffd9b89863c 823->826 831 7ffd9b89866b-7ffd9b898676 824->831 832 7ffd9b8986d3 824->832 827 7ffd9b898601 825->827 828 7ffd9b898603-7ffd9b898616 825->828 826->824 827->828 828->828 830 7ffd9b898618-7ffd9b898620 828->830 830->826 831->832 834 7ffd9b898678-7ffd9b898686 831->834 833 7ffd9b8986d5-7ffd9b898766 832->833 842 7ffd9b89876c-7ffd9b89877b 833->842 835 7ffd9b898688-7ffd9b89869a 834->835 836 7ffd9b8986bf-7ffd9b8986d1 834->836 838 7ffd9b89869c 835->838 839 7ffd9b89869e-7ffd9b8986b1 835->839 836->833 838->839 839->839 840 7ffd9b8986b3-7ffd9b8986bb 839->840 840->836 843 7ffd9b89877d 842->843 844 7ffd9b898783-7ffd9b8987d2 call 7ffd9b898804 842->844 843->844 851 7ffd9b8987d3-7ffd9b8987e0 844->851 851->851 852 7ffd9b8987e2-7ffd9b8987e8 851->852 853 7ffd9b8987ea 852->853 854 7ffd9b8987ef-7ffd9b898803 852->854 853->854
                            Memory Dump Source
                            • Source File: 00000000.00000002.2936732828.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b890000_172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dd87c78959d3f97b12d4a8a5f581e96c6799e0df0301b197fcfb3e52dbf265dc
                            • Instruction ID: b895378eec34dd5a2e314bce24f30bc32cb3db46c2c944193ac4b200ae693d8f
                            • Opcode Fuzzy Hash: dd87c78959d3f97b12d4a8a5f581e96c6799e0df0301b197fcfb3e52dbf265dc
                            • Instruction Fuzzy Hash: 77F19630A09A4E8FEFA8DF28C8557E93BD1FF58350F04426EE84DC7295DB7499458B82

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 855 7ffd9b8990f2-7ffd9b8990ff 856 7ffd9b89910a-7ffd9b89915d 855->856 857 7ffd9b899101-7ffd9b899109 855->857 859 7ffd9b899160-7ffd9b89916d 856->859 857->856 859->859 860 7ffd9b89916f-7ffd9b8991d7 859->860 863 7ffd9b8991d9-7ffd9b8991e2 860->863 864 7ffd9b899243 860->864 863->864 865 7ffd9b8991e4-7ffd9b8991f0 863->865 866 7ffd9b899245-7ffd9b89926a 864->866 867 7ffd9b899229-7ffd9b899241 865->867 868 7ffd9b8991f2-7ffd9b899204 865->868 873 7ffd9b8992d6 866->873 874 7ffd9b89926c-7ffd9b899275 866->874 867->866 869 7ffd9b899206 868->869 870 7ffd9b899208-7ffd9b89921b 868->870 869->870 870->870 872 7ffd9b89921d-7ffd9b899225 870->872 872->867 876 7ffd9b8992d8-7ffd9b8992fd 873->876 874->873 875 7ffd9b899277-7ffd9b899283 874->875 877 7ffd9b899285-7ffd9b899297 875->877 878 7ffd9b8992bc-7ffd9b8992d4 875->878 883 7ffd9b89936b 876->883 884 7ffd9b8992ff-7ffd9b899309 876->884 879 7ffd9b899299 877->879 880 7ffd9b89929b-7ffd9b8992ae 877->880 878->876 879->880 880->880 882 7ffd9b8992b0-7ffd9b8992b8 880->882 882->878 885 7ffd9b89936d-7ffd9b89939b 883->885 884->883 886 7ffd9b89930b-7ffd9b899318 884->886 892 7ffd9b89940b 885->892 893 7ffd9b89939d-7ffd9b8993a8 885->893 887 7ffd9b89931a-7ffd9b89932c 886->887 888 7ffd9b899351-7ffd9b899369 886->888 890 7ffd9b89932e 887->890 891 7ffd9b899330-7ffd9b899343 887->891 888->885 890->891 891->891 894 7ffd9b899345-7ffd9b89934d 891->894 896 7ffd9b89940d-7ffd9b8994e5 892->896 893->892 895 7ffd9b8993aa-7ffd9b8993b8 893->895 894->888 897 7ffd9b8993ba-7ffd9b8993cc 895->897 898 7ffd9b8993f1-7ffd9b899409 895->898 906 7ffd9b8994eb-7ffd9b8994fa 896->906 899 7ffd9b8993ce 897->899 900 7ffd9b8993d0-7ffd9b8993e3 897->900 898->896 899->900 900->900 903 7ffd9b8993e5-7ffd9b8993ed 900->903 903->898 907 7ffd9b8994fc 906->907 908 7ffd9b899502-7ffd9b89954e call 7ffd9b899580 906->908 907->908 915 7ffd9b89954f-7ffd9b89955c 908->915 915->915 916 7ffd9b89955e-7ffd9b899564 915->916 917 7ffd9b899566 916->917 918 7ffd9b89956b-7ffd9b89957f 916->918 917->918
                            Memory Dump Source
                            • Source File: 00000000.00000002.2936732828.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b890000_172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 265f110b437ed40d359089fc3b32f69c33d142b136c1b92b3e3b0ae3f5e31be6
                            • Instruction ID: 9d6e83e19b794fafc1d94b00f659d88362a6af7d285556763e36f9c803f57844
                            • Opcode Fuzzy Hash: 265f110b437ed40d359089fc3b32f69c33d142b136c1b92b3e3b0ae3f5e31be6
                            • Instruction Fuzzy Hash: 84E1D530A09A4E4FEFA8DF68C8697E97BD1FF58310F04426EE81DC7295DA7499418781

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 559 7ffd9b8929e1-7ffd9b892ad0 LoadLibraryA 565 7ffd9b892ad8-7ffd9b892b31 call 7ffd9b892b32 559->565 566 7ffd9b892ad2 559->566 566->565
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2936732828.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b890000_172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: c325fb9d056198465e815d2219cb8e5b704c50bc771cfc771e1ff8363a037276
                            • Instruction ID: 57b78655a951a542f15d46adb4e87b86a7e769fe60d44605a8ee3806c6b180a4
                            • Opcode Fuzzy Hash: c325fb9d056198465e815d2219cb8e5b704c50bc771cfc771e1ff8363a037276
                            • Instruction Fuzzy Hash: 73417F30A08A1C8FDB98DF98D855BEDBBF1FF99310F1041AAD04DD7296DA74A841CB41

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 572 7ffd9b892d3d-7ffd9b892d49 573 7ffd9b892d4b-7ffd9b892d53 572->573 574 7ffd9b892d54-7ffd9b892d63 572->574 573->574 575 7ffd9b892d65-7ffd9b892d6d 574->575 576 7ffd9b892d6e-7ffd9b892e29 VirtualProtect 574->576 575->576 581 7ffd9b892e2b 576->581 582 7ffd9b892e31-7ffd9b892e59 576->582 581->582
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2936732828.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9b890000_172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID:
                            • API String ID: 544645111-0
                            • Opcode ID: b28e504b10ded42f1a787fe27f7aff71487f63150bbc91a461fbe5cf241abc4e
                            • Instruction ID: 66f9cbf645fe5ea404f88d8aacc63009c133d4c230520fa89b19569d5398cc82
                            • Opcode Fuzzy Hash: b28e504b10ded42f1a787fe27f7aff71487f63150bbc91a461fbe5cf241abc4e
                            • Instruction Fuzzy Hash: 4741063190D7884FDB1D9BA89C566AD7FE0EF56321F0442AFD099C31A3DA746406C782