Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xin.exe

Overview

General Information

Sample name:xin.exe
Analysis ID:1524235
MD5:6cd2bc8e57214a9143084b8cad228c75
SHA1:b71d3c77d96604c904702b45904b72b889808125
SHA256:fd1da56c56e1143d0b08fe9e139075d8c2d9d5ba70117c9ef6a2f9e715198e37
Tags:exeuser-aachum
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Reads the System eventlog
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables security privileges
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • xin.exe (PID: 7568 cmdline: "C:\Users\user\Desktop\xin.exe" MD5: 6CD2BC8E57214A9143084B8CAD228C75)
    • conhost.exe (PID: 7576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 7728 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: xin.exeReversingLabs: Detection: 55%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: xin.exeJoe Sandbox ML: detected
Source: xin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: xin.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: xin.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: xin.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: xin.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: xin.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: xin.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: xin.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: xin.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: xin.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: xin.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: xin.exeString found in binary or memory: http://ocsp.digicert.com0
Source: xin.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: xin.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: xin.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: xin.exeString found in binary or memory: http://www.digicert.com/CPS0

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

System Summary

barindex
Source: xin.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 450048
Source: 0.2.xin.exe.3e35570.0.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0515D6083_2_0515D608
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0515DF113_2_0515DF11
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: SecurityJump to behavior
Source: xin.exeStatic PE information: invalid certificate
Source: xin.exe, 00000000.00000002.1439477835.0000000003E35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHederal.exe" vs xin.exe
Source: xin.exe, 00000000.00000002.1437001628.0000000000F1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs xin.exe
Source: xin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: xin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 0.2.xin.exe.3e35570.0.raw.unpack, PBE.csCryptographic APIs: 'TransformFinalBlock'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, PBE.csCryptographic APIs: 'CreateDecryptor'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, TripleDes.csCryptographic APIs: 'CreateDecryptor'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, Strings.csBase64 encoded string: 'Gg0hLjoEMyo4eS8eAzEzEzwmGi0UCz8aLiolAC9GBSc6DD9CGiU+GCQuWCshIVgjO1ozGTgmDi8hNVlU'
Source: classification engineClassification label: mal84.evad.winEXE@4/2@0/0
Source: C:\Users\user\Desktop\xin.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xin.exe.logJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7576:120:WilError_03
Source: xin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: xin.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\xin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: xin.exeReversingLabs: Detection: 55%
Source: unknownProcess created: C:\Users\user\Desktop\xin.exe "C:\Users\user\Desktop\xin.exe"
Source: C:\Users\user\Desktop\xin.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\xin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Desktop\xin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
Source: C:\Users\user\Desktop\xin.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\xin.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\xin.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\xin.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\xin.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\xin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\xin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: textshaping.dllJump to behavior
Source: xin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: xin.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: xin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: xin.exeStatic PE information: real checksum: 0x78249 should be: 0x760f2
Source: C:\Users\user\Desktop\xin.exeCode function: 0_2_02E32C09 pushad ; retn 0071h0_2_02E32C0A
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0515BE49 push C00508E7h; iretd 3_2_0515BE55
Source: xin.exeStatic PE information: section name: .text entropy: 7.996829369194556
Source: 0.2.xin.exe.3e35570.0.raw.unpack, AesFastEngine.csHigh entropy of concatenated method names: 'Shift', 'FFmulX', 'Inv_Mcol', 'SubWord', 'GenerateWorkingKey', 'Init', 'GetBlockSize', 'ProcessBlock', 'Reset', 'UnPackBlock'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, UserExt.csHigh entropy of concatenated method names: '_003CDomainExists_003Eb__2', 'GAInXb1qTgvQOvf8KJ4', 'LKEH8R1pMCS1a4IQ0dd', 'SZ2y2I1ZfeGKq7mXdOB', 'avIhFc1kGEBjtqdoevi', 'DomainExists', 'PreCheck', 'f1ZkOtF1Uy5DHm2EtRf', 'p7Ig5vF5JcTglN3OtHO', 'DrJymHFnAUFto8kDf38'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, Tables8kGcmMultiplier.csHigh entropy of concatenated method names: 'Init', 'MultiplyH', 'LpmMGPiUXOMjht9aASa', 'iw0rwDiaiaHjyQ9ZQ4Z', 'Y3BN5DiLo28roh6cXwo', 'do8s0SiZnxJK7WVjmhK', 'ahvks6ikhVTptv8Rexb', 'v0n1agiCGjEiyswvwuC', 'bLZCF7irKcG06cvTDCw', 'X5QcSiiqGxGThEJmNu4'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, StringDecrypt.csHigh entropy of concatenated method names: 'Xor', 'FromBase64', 'BytesToStringConverted', 'Read', 'FHwCvVP4DxkintHJqdc', 'jEpDBlPRXXbQ59tSVh4', 'Wmp4ewPJ4SdFRPF9r9j', 'eNDMMoPSgrtheMynHN6', 'g6LDtRPEIy6t9hG9Usx', 'mW5XHrPOA6iqsYhCrGG'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, Form1.csHigh entropy of concatenated method names: '_003CReadLine_003Eb__2_0', 'TEy5og170yM3gmDDaXM', 'zBrNyX1orS97yY5fGW5', 'b2ca251JSMtOgW2sWLx', 'GcrWd31S29oktkDp7fL', 'Form1_Load', 'ReadLine', 'Dispose', 'InitializeComponent', 'UdEF99FtYYTbhTTheLB'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, FieldRoot13.csHigh entropy of concatenated method names: '_003C_002Ecctor_003Eb__0', '_003C_002Ecctor_003Eb__1', 'ixF2do12oqmIg7jAddT', 'nEK3b51ckeHKSCYHf5f', 'whrBfI1vxQPCqg8x8gO', '_003CField23_003Eb__0', 'SrPOGf1P10iyfvNL3Jq', 'VeO4Rg1xHxheqhKdHsU', '_003CGetText_003Eb__0', 'oneMeR1K2QrZCsDY9JZ'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, AesGcm256.csHigh entropy of concatenated method names: 'Decrypt', 'Decrypt', 'cum62dPtu91Y0FF2taj', 'SyIwA6PWTEGq89mnepj', 'TYxaZwPGtaou3lId2SK', 'MdBBThPlxa65Ng1RpqU', 'yJuTwhPCAkEMPVlDm8Q', 'vIaUJlPrq2B97QmoBBv', 'yKNZHIPUQiAJYK4IeHb', 'FQcN2HPaPD5kHcM6e4A'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, PBKDF2.csHigh entropy of concatenated method names: 'GetBytes', 'Func', 'GetBytesFromInt', 'PAVIqwn0R7u5ClGPIj6', 'zYeEVfnHDgHkc2OaTWe', 'EQOiHVnwhCrt0O8Iy3l', 'adRXIinTyMXbKxUaoNB', 'GwEcTWny8rBW2ViwGOP', 's7FuGcnNGag66dj6t0J', 'I23sHNnYAffnE56Ms0r'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, Asn1Der.csHigh entropy of concatenated method names: 'Parse', 'rKQdSQnUcWUwfLyRpLt', 'fmtcTSnaET38j2W0UXY', 'NRWJtSnLonJWn3EBcyZ', 'nHwS4JnZBsL51bnXuSA', 'iaJ39qnkq9y2HYjsr1C', 'LDVPYenq21VeH9373Bs', 'dLo8CXnC5K8Zw3VSpju', 'iXNEBknryPsl0gmccG1'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, FieldRoot25.csHigh entropy of concatenated method names: 'Field2', 'Field3', 'sPBGU3v0GHQxbPZbG6p', 'EbGcMbvHihImJQVNVkn', 'Qq9qSFvyP604TgYldu9', 'mJvwUqvNr6o3TR0R8oY', 'FJJc4LvYnQdCL88ZPP9', 'IZdvDQv9qjMTBOaYP2e', 'ToKrjovD4V3GhgIXOcE', 'yh31Tov3nqFVEfBCKL0'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, FieldRoot20.csHigh entropy of concatenated method names: 'Field1', 'Field5', 'Field2', 'Field3', 'Field4', 'Key4Database', 'Key3Database', 'aRyZexcVQZI3JbYoBK3', 'y03y7ecWFKREB905SPO', 'mYuOjscGoBE9TWhPw5S'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, BCRYPT_AUTHENTICATED_CIPHER_MODE_INFO.csHigh entropy of concatenated method names: 'Dispose', 'Ot7kSbnFcl5ebkWV7OD', 'oR3ub1nhZwcoK97Sdrb', 'SRXiUGnilrDy1g5hMRG', 'm4MHqqnPDfkeMPgcqAv', 'uJ9JTrn2mQy08CKH1sA', 'zn8H3rnM3UHBDjFYPrU', 'd2ykmAnxgCYA9wo4QUu', 'a8A3SIndc80ZVGH7sYB'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, FieldRootReaderSql.csHigh entropy of concatenated method names: '_003C_002Ector_003Eb__9_0', 'dMyv5O1arIGQRsu18mx', 'q2cbFd1r5AUWvLmMX5w', 'kKnHi61UZ5nW5Jgk9LE', 'GatherValue', 'ReadMasterOfContext', 'ReadContextTable', 'GetOffset', 'ReadContextValue', 'ConvertToULong'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, Extembus.csHigh entropy of concatenated method names: 'ExpandEnvironmentVariable', 'RF', 'RFAT', 't64agdMJweLt6NEKvTw', 'qUsqHlMS7whMl7n9e8P', 'mFSuRYM7N1BoHpEuET4', 't4jHngMoZx3pAHYKwTf', 'xnPBWMMu19OuGDuTdbs', 'QprdIwMm1irLO61gVIO', 'AUHwO4MskFeGERBK8xr'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, GcmBlockCipher.csHigh entropy of concatenated method names: 'GetBlockSize', 'Init', 'GetMac', 'GetOutputSize', 'GetUpdateOutputSize', 'ProcessByte', 'ProcessBytes', 'Process', 'DoFinal', 'Reset'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, Strings.csHigh entropy of concatenated method names: 'Init', 'Decrypt', 'Get', 'jUiOmTdGb0DiEdHq2J8', 'A1c5lXdtZc3wYJmhX5R', 'iXxrn3dlc0ZRLVjZjX3', 'IHcZoFdVEqHS1ZtYBji', 'Si3OOudWk86RdLVhaV7', 'Qn8ayydC6R6itq10A4i', 'yIcnOSdr342yV4MPlpZ'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, ComInvoker.csHigh entropy of concatenated method names: 'Failed', 'g3yWUc1mxK92aLsy0K8', 'VCjRhh1sVymJrS0V7AN', 'RunRecoveryCRXElevated', 'EncryptData', 'DecryptData', 'DecryptData', 'ByteArrayToBSTR', 'BSTRToByteArray', 'SysAllocStringByteLen'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, SystemInfoHelper.csHigh entropy of concatenated method names: '_003CCloseBrowser_003Eb__1', 'JvPPjn59wLg68wJxUIl', 'P6ckLo5NNqfOI9gqmL3', 'gvCIKi5Yvafq7Nj9tjp', '_003CCloseBrowser_003Eb__1_0', '_003CFindProc_003Eb__9_0', '_003CListOfPrograms_003Eb__10_0', '_003CAvailableLanguages_003Eb__11_0', 'RlRtaO584BFatgNEbc3', 'egOQii5BgYehFDVI8C1'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, FieldRoot27.csHigh entropy of concatenated method names: '_003CField4_003Eb__0', 'WNASsS6BKWnk0ElrakQ', 'U4QtWC6zyA0CJbE6gcs', 'LIJvaE6bdL39J80O3Tu', 'ns9VeG683qLiiBtSAeh', 'Field2', 'Field3', 'Field4', 'G5M06t229LsMWPZXrJY', 'YAZLU52MMHD89GQwyuc'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, FieldRoot23.csHigh entropy of concatenated method names: 'Field2', 'Field3', 'IdY8AIvpUskxRW3xf8l', 'lSrghJvEMqIQ3BbYDo0', 'tdpZksvOiSOiB5QF2Xl', 'q891niv4WTkN6YldDF5', 'o5OGoKvR7Le93njGkS4', 'JsZJY4vkUt4ESh6KOWM', 'c4aCjRvqrmj8uGXS9Ja'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, DeviceMonitor.csHigh entropy of concatenated method names: 'CaptureScreen', 'CaptureWindow', 'MonitorSize', 'GetImageBase', 'ConvertToBytes', 'dPL4rex2KOUa09N230h', 'OCGhmNxMPCmWsnFuBRX', 'AGh8VHxFFBZhHfGVpH6', 'JF6WGwxhMHC2J46Fej5', 'mAj84YxivgH6X2XpW4R'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, Auhi.csHigh entropy of concatenated method names: 'I\u04341', 'I\u04342', 'I\u04343', 'I\u04344', 'fu81OQc0OZNbGrjnpSD', 'CXxCWJcw2vwreErUldI', 'niP0NCcTejbSCxyQLTs', 'UtTfVBcH83pLiLPTqUW', 'aqXwiXcyal7J2LsIsJr', 'jA5NoCcNWbAhLNBlY3l'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, API.csHigh entropy of concatenated method names: 'Func', 'm1', 'm2', 'm3', 'm4', 'm7', 'm8', 'm9', 'm10', 'm11'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, WinApiFile.csHigh entropy of concatenated method names: 'Open', 'Open', 'Open', 'Close', 'MoveFilePointer', 'MoveFilePointer', 'Read', 'Dispose', 'Dispose', 'ThrowLastWin32Err'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, FileHelper.csHigh entropy of concatenated method names: 'Search', 'ChromeGetName', 'ChrRm', 'ChrLm', 'Y5wFwgdxvVxewA9i9UN', 'HDRIEFddsFCrMnxLMMm', 'JsygwidiPaagmIVwHhh', 'wpfux4dPfXiEPxuybYN', 'o8SYcTdQBHdFtCybK70', 'c5jKKqdnUyv2hAESfAF'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, ContextSwitcher.csHigh entropy of concatenated method names: 'EnableAllTokenPrivileges', 'EnableAllTokenPrivileges', 'EnableTokenPrivileges', 'EnableTokenPrivileges', 'GetSystemProcessHandle', 'Lgp3M310uqcfcmQhlGQ', 'YSZC6Z1wE84x1mDL0Mx', 'GlZwYn1TG8k2Mdt6Vbn', 'CompareIgnoreCase', 'GetTokenPrivileges'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, FieldRootRoot.csHigh entropy of concatenated method names: 'Field1', 'GR17OtvKdbtcEmLoCKr', 'FWL4NEvgXRcZHw7mkrU', 'WcPLyNvefxorrEpUU1D', 'hcLvsfvV1lEX2dkL3Ei', 'cYwVBlvW983O0vHRrIZ', 'HlaTlSvGcLrq0brJ03S', 'wVjCqOvtROeva0BLBnc', 'U43NwAv1W6L7eA1v9C7', 'SKg1VJv5u9SWpVkraBk'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, FieldRoot19.csHigh entropy of concatenated method names: 'Field1', 'Field2', 'Field3', 'b1VMnpbjUuu288qkNK', 'cNpy0a8M8qjL7sGhVN', 'DwTZDKB0WwTa5wSgAZ', 'umFMDCzleup0Jxm0SV', 'x0V5VNcj3q9HcunemBu', 'NWYh75ccX5wlKPgwUv6', 'arTOYgcvm5IZFXK5IlF'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, CryptoHelper.csHigh entropy of concatenated method names: 'GetDecoded', 'DecryptBlob', 'Encrypt', 'cryptUnprotectData', 'GetMd5Hash', 'GetHexString', 'kSkNVQhkNKIUdsZ6Ts6', 'wwW9PBhq1jxHJI9Mb92', 'dPDDINhpg5OLCEkUQKV', 'ksW4YXhEHHiBpl4nTTk'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, EnvCheck.csHigh entropy of concatenated method names: 'IsTimeFastForwarded', 'IsFirstEventLogLessThanDayOld', 'H1u14txBnNG9n7ZcLUw', 'KQZ32gxzD2V2fGyQbkX', 'vr1njIdjA6JHlu1NImF', 'QUN3YqdcnQ5tG07WXey', 'X5VC4QdvXV7yN2xudWY', 'hxBXT7d2A61ba4TVCcp', 'W9UDhBdM3AbfCpy4UPO', 'ddEd7ldFXgK8H1nuNEs'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, BerkeleyDB.csHigh entropy of concatenated method names: 'Extract', 'Hs6mhFh6JM0B0iMl9X5', 'hBEQ41h1NNCFrb3qddY', 'yuJ9Ieh5EZbSL1C33Zr', 'KUmGXRhKaELRUGJAF2i', 'ae3qTShgHxCY166nuNg', 'xCAIFbheCoSNxLLYxaL', 'JtwR3ihVFkCS5cYFIa1', 'FUqbFBhWWTsTT3le8xo', 'yqJV9hhGrKEpDD9GRuc'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, StringExt.csHigh entropy of concatenated method names: 'ChangeType', 'StripQuotes', 'HexToBytes', 'hgEjetFiO4AqwDI0VZw', 'aIf5fTFFaIaB1wvM4y2', 'JhoZBEFhxKGNOaDYwnk', 'LTaxu9FPRJHIFdX0o98', 'oEUb0lFxa6cnao1y1bg', 'SBtsKEFdpuosxR6Xsii'
Source: 0.2.xin.exe.3e35570.0.raw.unpack, TripleDes.csHigh entropy of concatenated method names: 'ComputeVoid', 'Compute', 'DecryptStringDesCbc', 'DecryptByteDesCbc', 'becuyGPAKITmgVVvOYT', 'y4YMaxPfuZxhY94kcej', 'gjsuVePw3EYP0eAJE0U', 'LqAQ32PT67mYas8OyTN', 'sxX8AvP0QBWk07yQp8c', 'qwJivkPHuwmZum3mKo4'
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\xin.exeMemory allocated: 1490000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\xin.exeMemory allocated: 2E30000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\xin.exeMemory allocated: 4E30000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: FD0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2AD0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4AD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\xin.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\xin.exe TID: 7708Thread sleep count: 294 > 30Jump to behavior
Source: C:\Users\user\Desktop\xin.exe TID: 7708Thread sleep count: 197 > 30Jump to behavior
Source: C:\Users\user\Desktop\xin.exe TID: 7656Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7748Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\xin.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\xin.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: xin.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
Source: xin.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
Source: xin.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
Source: 0.2.xin.exe.3e35570.0.raw.unpack, ContextSwitcher.csReference to suspicious API methods: NativeMethods.OpenProcess(processAccessMask, bInheritHandle: false, process.Id)
Source: C:\Users\user\Desktop\xin.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\xin.exeCode function: 0_2_02E32125 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_02E32125
Source: C:\Users\user\Desktop\xin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\xin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
Source: C:\Users\user\Desktop\xin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
Source: C:\Users\user\Desktop\xin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000Jump to behavior
Source: C:\Users\user\Desktop\xin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 472000Jump to behavior
Source: C:\Users\user\Desktop\xin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 9D3008Jump to behavior
Source: C:\Users\user\Desktop\xin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
Source: C:\Users\user\Desktop\xin.exeQueries volume information: C:\Users\user\Desktop\xin.exe VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
411
Process Injection
1
Masquerading
OS Credential Dumping31
Virtualization/Sandbox Evasion
Remote Services11
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Software Packing
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script411
Process Injection
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Obfuscated Files or Information
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
xin.exe55%ReversingLabsByteCode-MSIL.Trojan.RedlineStealer
xin.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1524235
Start date and time:2024-10-02 17:18:21 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:xin.exe
Detection:MAL
Classification:mal84.evad.winEXE@4/2@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 31
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: xin.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):1119
Entropy (8bit):5.345080863654519
Encrypted:false
SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
MD5:88593431AEF401417595E7A00FE86E5F
SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
Malicious:false
Reputation:moderate, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
Process:C:\Users\user\Desktop\xin.exe
File Type:CSV text
Category:dropped
Size (bytes):425
Entropy (8bit):5.353683843266035
Encrypted:false
SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
MD5:859802284B12C59DDBB85B0AC64C08F0
SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
Malicious:true
Reputation:high, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.992368290949023
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
  • Win32 Executable (generic) a (10002005/4) 49.97%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:xin.exe
File size:470'904 bytes
MD5:6cd2bc8e57214a9143084b8cad228c75
SHA1:b71d3c77d96604c904702b45904b72b889808125
SHA256:fd1da56c56e1143d0b08fe9e139075d8c2d9d5ba70117c9ef6a2f9e715198e37
SHA512:1caa477c8535b145f00b6e05fa523692aae65ba7d5fe5c646a53024312cf922562ffef7394ce385876d2a297f71bc022a8135aaa0d2e949d0e5e2c1622752db6
SSDEEP:6144:FRc5LRY9bXsJtSWtTcfgzwOl1YzzDeqiGOXs1fknwgBxwtZ4Z/AHqF8sfmqilXXn:Di2CrfNcaYrwOcVxwtydF0X4xidZ
TLSH:67A42353494869F9F27E4A7632B0C869EF21E3532495F704A31FD60796A33D0372A6F4
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f................................. ... ....@.. .......................`......I.....`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x471cee
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x66FCD984 [Wed Oct 2 05:26:28 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Signature Valid:false
Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
Signature Validation Error:The digital signature of the object did not verify
Error Number:-2146869232
Not Before, Not After
  • 22/09/2022 01:00:00 20/10/2023 00:59:59
Subject Chain
  • CN=Spotify AB, O=Spotify AB, L=Stockholm, C=SE, SERIALNUMBER=5567037485, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=SE
Version:3
Thumbprint MD5:EF8873EED657F2DFE432077ADBAB8AFB
Thumbprint SHA-1:3F76C6CC576963831FF44303BFCB98113C51C95E
Thumbprint SHA-256:890C79F427B0C07DEF096FF66A402E9337F0F2D80DACA1256A7F572F7720DBAA
Serial:04C530703A210EC1D6F83CB4FE1118C5
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x71c980x53.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x720000x242.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x706000x2978
IMAGE_DIRECTORY_ENTRY_BASERELOC0x740000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x71b600x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x6fcf40x6fe00ed0aea1baa5e24643eb7cf509f3e40efFalse0.9948891410614525data7.996829369194556IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x720000x2420x400b52e89138cd238a327e786702e47c81aFalse0.3017578125data3.519498852464578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x740000xc0x2004a72eef8b41e304299dc764c7e1d1082False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x720580x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
DLLImport
mscoree.dll_CorExeMain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:11:19:22
Start date:02/10/2024
Path:C:\Users\user\Desktop\xin.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\xin.exe"
Imagebase:0xaa0000
File size:470'904 bytes
MD5 hash:6CD2BC8E57214A9143084B8CAD228C75
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:11:19:22
Start date:02/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff70f010000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:11:19:24
Start date:02/10/2024
Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Imagebase:0x7c0000
File size:65'440 bytes
MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:19.8%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:30%
    Total number of Nodes:20
    Total number of Limit Nodes:0

    Control-flow Graph

    APIs
    • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02E32097,02E32087), ref: 02E32294
    • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02E322A7
    • Wow64GetThreadContext.KERNEL32(000003A4,00000000), ref: 02E322C5
    • ReadProcessMemory.KERNELBASE(000003A8,?,02E320DB,00000004,00000000), ref: 02E322E9
    • VirtualAllocEx.KERNELBASE(000003A8,?,?,00003000,00000040), ref: 02E32314
    • WriteProcessMemory.KERNELBASE(000003A8,00000000,?,?,00000000,?), ref: 02E3236C
    • WriteProcessMemory.KERNELBASE(000003A8,00400000,?,?,00000000,?,00000028), ref: 02E323B7
    • WriteProcessMemory.KERNELBASE(000003A8,?,?,00000004,00000000), ref: 02E323F5
    • Wow64SetThreadContext.KERNEL32(000003A4,02DF0000), ref: 02E32431
    • ResumeThread.KERNELBASE(000003A4), ref: 02E32440
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1438320076.0000000002E31000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E31000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2e31000_xin.jbxd
    Similarity
    • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
    • API String ID: 2687962208-1257834847
    • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
    • Instruction ID: 24094bb1c95811ecc82e57a2620303fa5def09e70e034d0ca77f847ca85b1c34
    • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
    • Instruction Fuzzy Hash: 37B1E67264024AAFDB60CF68CC80BDA77A5FF88714F158124EA0CAB341D774FA41CB94

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 134 14d14e1-14d1575 VirtualProtectEx 137 14d157c-14d159d 134->137 138 14d1577 134->138 138->137
    APIs
    • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 014D1568
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1438095957.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_14d0000_xin.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID: >Y]@
    • API String ID: 544645111-722741048
    • Opcode ID: d3595b677c4efca7f9678f1b4dfc100c847583dd51e6034b6e5b4520eebefc3d
    • Instruction ID: 9e9a0f13a4cbe5de503949309482ecc52237b2542f14d75c62f1446bae248135
    • Opcode Fuzzy Hash: d3595b677c4efca7f9678f1b4dfc100c847583dd51e6034b6e5b4520eebefc3d
    • Instruction Fuzzy Hash: 2021FEB5C00249DFDB10DFAAD881AEEBBF0FF48310F54842AE959A7250C7799901CFA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 141 14d14e8-14d1575 VirtualProtectEx 144 14d157c-14d159d 141->144 145 14d1577 141->145 145->144
    APIs
    • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 014D1568
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1438095957.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_14d0000_xin.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID: >Y]@
    • API String ID: 544645111-722741048
    • Opcode ID: 9874edce13e0514cc0f476c5eb8da7c5e278f1ee01235b8d066cb5b25043ef3b
    • Instruction ID: 46013786c6f2d9b9af81f9e7d4b2cc4889fa53dbad9765b3181d7ead6135a209
    • Opcode Fuzzy Hash: 9874edce13e0514cc0f476c5eb8da7c5e278f1ee01235b8d066cb5b25043ef3b
    • Instruction Fuzzy Hash: 2B21E3B5900249DFDB10DFAAD881ADEFBF4FF48310F54842AE959A7250C779A904CFA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 276 12dd01d-12dd03d 277 12dd08d-12dd095 276->277 278 12dd03f-12dd04a 276->278 277->278 279 12dd04c-12dd05a 278->279 280 12dd082-12dd089 278->280 283 12dd060 279->283 280->279 284 12dd08b 280->284 285 12dd063-12dd06b 283->285 284->285 286 12dd06d-12dd075 285->286 287 12dd07b-12dd080 285->287 287->286
    Memory Dump Source
    • Source File: 00000000.00000002.1437776787.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_12dd000_xin.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 710016e9a5054149fd0e3672609aaa4a17e716e0285451a2fe8faa4e19af704f
    • Instruction ID: 71837d7bb8698c6ac4aede7d0fbc7f9e5ee1e0707000be6726dbd99f19da86c6
    • Opcode Fuzzy Hash: 710016e9a5054149fd0e3672609aaa4a17e716e0285451a2fe8faa4e19af704f
    • Instruction Fuzzy Hash: 1901F731414B489BF7105E59CC80B67BF98DF813A1F08C01AEE484A2C2C6799801C6B2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 289 12dd006-12dd03d 290 12dd08d-12dd095 289->290 291 12dd03f-12dd04a 289->291 290->291 292 12dd04c-12dd05a 291->292 293 12dd082-12dd089 291->293 296 12dd060 292->296 293->292 297 12dd08b 293->297 298 12dd063-12dd06b 296->298 297->298 299 12dd06d-12dd075 298->299 300 12dd07b-12dd080 298->300 300->299
    Memory Dump Source
    • Source File: 00000000.00000002.1437776787.00000000012DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_12dd000_xin.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 41f7dff293231c8331c8c77dc6e38b3cf2abf73a316c3062e84003515e49ce1c
    • Instruction ID: f387f81e74590dae03707381ebbc0dbf7d5b6313f7ca813045a97aad52e270a6
    • Opcode Fuzzy Hash: 41f7dff293231c8331c8c77dc6e38b3cf2abf73a316c3062e84003515e49ce1c
    • Instruction Fuzzy Hash: F6015E7240E7C49FE7128B258994B52BFA4DF42225F19C1DBD9888F2E3C2699844C772

    Execution Graph

    Execution Coverage:8.8%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:0%
    Total number of Nodes:155
    Total number of Limit Nodes:15
    execution_graph 29178 515f4c0 29179 515f505 GetClassInfoW 29178->29179 29181 515f54b 29179->29181 29186 515a570 29187 515a5a9 29186->29187 29195 5153d34 29187->29195 29189 515a7dd 29190 515a6bd 29190->29189 29208 5153d64 29190->29208 29192 515a7cf 29193 5153d64 SendMessageW 29192->29193 29213 515e9e0 29192->29213 29193->29189 29196 5153d3f 29195->29196 29197 5154b76 29196->29197 29202 5154b66 29196->29202 29203 5154ae6 29196->29203 29218 515d1fb 29197->29218 29222 515d208 29197->29222 29198 5154b4c 29200 5153d64 SendMessageW 29198->29200 29199 5154b87 29199->29202 29206 515d208 PostMessageW 29199->29206 29207 515d1fb PostMessageW 29199->29207 29200->29202 29201 5153d64 SendMessageW 29201->29198 29202->29190 29203->29198 29203->29201 29206->29202 29207->29202 29210 5153d6f 29208->29210 29209 515e9fe 29209->29192 29210->29209 29211 515ea33 SendMessageW 29210->29211 29212 515eab4 29211->29212 29212->29192 29215 515e9f0 29213->29215 29214 515e9fe 29214->29189 29215->29214 29216 515ea33 SendMessageW 29215->29216 29217 515eab4 29216->29217 29217->29189 29219 515d208 29218->29219 29226 5159794 29219->29226 29223 515d218 29222->29223 29224 5159794 PostMessageW 29223->29224 29225 515d229 29224->29225 29225->29199 29227 515d240 PostMessageW 29226->29227 29228 515d229 29227->29228 29228->29199 29229 ffe218 29230 ffe25e 29229->29230 29233 ffe3f8 29230->29233 29236 ffdb20 29233->29236 29237 ffe460 DuplicateHandle 29236->29237 29238 ffe34b 29237->29238 29239 ff5587 29243 ff550a 29239->29243 29240 ff5559 29243->29240 29247 ff50cc 29243->29247 29251 51597c8 29243->29251 29255 51597b8 29243->29255 29259 ff5344 29243->29259 29263 ff5750 29243->29263 29248 ff50d7 29247->29248 29268 ff6a5c 29248->29268 29250 ff7f85 29250->29243 29252 51597da 29251->29252 29318 5156594 29252->29318 29256 5159793 29255->29256 29256->29255 29257 5156594 3 API calls 29256->29257 29258 51597fa 29257->29258 29258->29243 29260 ff55e8 CoInitializeSecurity 29259->29260 29262 ff566e 29260->29262 29262->29243 29264 ff5755 29263->29264 29357 ff5860 29264->29357 29361 ff5850 29264->29361 29269 ff6a67 29268->29269 29272 ff6a7c 29269->29272 29271 ff8065 29271->29250 29273 ff6a87 29272->29273 29276 ff6aac 29273->29276 29275 ff8142 29275->29271 29277 ff6ab7 29276->29277 29280 ff6adc 29277->29280 29279 ff8245 29279->29275 29281 ff6ae7 29280->29281 29283 ff97ab 29281->29283 29286 ffbe61 29281->29286 29282 ff97e9 29282->29279 29283->29282 29290 ffdf50 29283->29290 29294 ffbe98 29286->29294 29297 ffbe88 29286->29297 29287 ffbe76 29287->29283 29291 ffdf71 29290->29291 29292 ffdf95 29291->29292 29306 ffe100 29291->29306 29292->29282 29301 ffbf80 29294->29301 29295 ffbea7 29295->29287 29298 ffbe98 29297->29298 29300 ffbf80 GetModuleHandleW 29298->29300 29299 ffbea7 29299->29287 29300->29299 29302 ffbfc4 29301->29302 29303 ffbfa1 29301->29303 29302->29295 29303->29302 29304 ffc1c8 GetModuleHandleW 29303->29304 29305 ffc1f5 29304->29305 29305->29295 29307 ffe10d 29306->29307 29309 ffe147 29307->29309 29310 ffda58 29307->29310 29309->29292 29311 ffda63 29310->29311 29312 ffea58 29311->29312 29314 ffdb84 29311->29314 29315 ffdb8f 29314->29315 29316 ff6adc GetModuleHandleW 29315->29316 29317 ffeec7 29316->29317 29317->29312 29320 515659f 29318->29320 29322 5159434 29320->29322 29321 515990c 29321->29321 29323 515943f 29322->29323 29326 5159a1e 29323->29326 29327 5159b79 29323->29327 29328 515967c 29323->29328 29324 515967c 3 API calls 29324->29327 29326->29324 29326->29327 29327->29321 29329 5159687 29328->29329 29333 515a1d0 29329->29333 29343 515a1c0 29329->29343 29330 5159db4 29330->29326 29336 515a1f6 29333->29336 29334 515a20a 29334->29330 29335 515a2e7 29353 ffef40 29335->29353 29336->29334 29336->29335 29339 515a34a 29336->29339 29337 515a2f5 29338 5159794 PostMessageW 29337->29338 29340 515a345 29337->29340 29338->29340 29339->29340 29341 5153d34 2 API calls 29339->29341 29340->29330 29341->29340 29346 515a1f6 29343->29346 29344 515a20a 29344->29330 29345 515a2e7 29352 ffef40 KiUserCallbackDispatcher 29345->29352 29346->29344 29346->29345 29350 515a34a 29346->29350 29347 515a2f5 29348 5159794 PostMessageW 29347->29348 29349 515a345 29347->29349 29348->29349 29349->29330 29350->29349 29351 5153d34 2 API calls 29350->29351 29351->29349 29352->29347 29355 ffef6e 29353->29355 29354 fff03f 29355->29354 29356 fff03a KiUserCallbackDispatcher 29355->29356 29356->29354 29358 ff5887 29357->29358 29360 ff5964 29358->29360 29365 ff54a8 29358->29365 29363 ff585f 29361->29363 29362 ff5964 29363->29362 29364 ff54a8 CreateActCtxA 29363->29364 29364->29362 29366 ff6cf0 CreateActCtxA 29365->29366 29368 ff6db3 29366->29368 29171 515bb18 29172 515bb4d 29171->29172 29175 5153cb8 SendMessageW PostMessageW 29172->29175 29174 515bba9 29175->29174 29176 5156fd8 CloseHandle 29177 515703f 29176->29177 29182 515bbc8 29183 515bc10 SetWindowTextW 29182->29183 29184 515bc0a 29182->29184 29185 515bc41 29183->29185 29184->29183
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 47b4160cd8fcff235597f66202fbd7e1478310c75141c4a178cbe0538cec0d89
    • Instruction ID: 769ee72a2b02bc1b3275f2614214c74d2972d8766cf65b87f8fac440592d129e
    • Opcode Fuzzy Hash: 47b4160cd8fcff235597f66202fbd7e1478310c75141c4a178cbe0538cec0d89
    • Instruction Fuzzy Hash: C3428F30E00218CFDB54DFA9C8547AEBBB6FF88310F1481A9D819AB345DB749E85CB95
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 85f8fe1502956faf8ceac3b8f7350882b9168cee8bac39cffb61d580c4258a68
    • Instruction ID: c7ed5438d2669f528578ade5c4b15fe12390febe96356077c0dd0d5494272b37
    • Opcode Fuzzy Hash: 85f8fe1502956faf8ceac3b8f7350882b9168cee8bac39cffb61d580c4258a68
    • Instruction Fuzzy Hash: 7BC17F31E00214DFDF15DFA5C880B9DBBB6BF88320F14C2A9D859AB255DB749A85CF50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 ffbf80-ffbf9f 1 ffbfcb-ffbfcf 0->1 2 ffbfa1-ffbfae call ffa994 0->2 4 ffbfe3-ffc024 1->4 5 ffbfd1-ffbfdb 1->5 8 ffbfc4 2->8 9 ffbfb0 2->9 11 ffc026-ffc02e 4->11 12 ffc031-ffc03f 4->12 5->4 8->1 55 ffbfb6 call ffc228 9->55 56 ffbfb6 call ffc218 9->56 11->12 13 ffc063-ffc065 12->13 14 ffc041-ffc046 12->14 19 ffc068-ffc06f 13->19 16 ffc048-ffc04f call ffb994 14->16 17 ffc051 14->17 15 ffbfbc-ffbfbe 15->8 18 ffc100-ffc1c0 15->18 21 ffc053-ffc061 16->21 17->21 50 ffc1c8-ffc1f3 GetModuleHandleW 18->50 51 ffc1c2-ffc1c5 18->51 22 ffc07c-ffc083 19->22 23 ffc071-ffc079 19->23 21->19 26 ffc085-ffc08d 22->26 27 ffc090-ffc099 call ffb9a4 22->27 23->22 26->27 31 ffc09b-ffc0a3 27->31 32 ffc0a6-ffc0ab 27->32 31->32 33 ffc0ad-ffc0b4 32->33 34 ffc0c9-ffc0d6 32->34 33->34 36 ffc0b6-ffc0c6 call ffb9b4 call ffb9c4 33->36 41 ffc0f9-ffc0ff 34->41 42 ffc0d8-ffc0f6 34->42 36->34 42->41 52 ffc1fc-ffc210 50->52 53 ffc1f5-ffc1fb 50->53 51->50 53->52 55->15 56->15
    APIs
    • GetModuleHandleW.KERNELBASE(00000000), ref: 00FFC1E6
    Memory Dump Source
    • Source File: 00000003.00000002.1442719425.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_ff0000_RegAsm.jbxd
    Similarity
    • API ID: HandleModule
    • String ID:
    • API String ID: 4139908857-0
    • Opcode ID: 3b1aecdb3220c1bfde7dbbf91da4f4fb1b0075fb59c2188aa578af5b7c83c87f
    • Instruction ID: 9b8c2e98ceecd54c372b3137d90e662d8d2afe42f7e1884377f744fe21e58c68
    • Opcode Fuzzy Hash: 3b1aecdb3220c1bfde7dbbf91da4f4fb1b0075fb59c2188aa578af5b7c83c87f
    • Instruction Fuzzy Hash: 838165B0A00B098FD724DF29D54576ABBF1BF88310F00892DD186D7A60DB79E946DB90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 57 ff6ce4-ff6db1 CreateActCtxA 59 ff6dba-ff6e14 57->59 60 ff6db3-ff6db9 57->60 67 ff6e16-ff6e19 59->67 68 ff6e23-ff6e27 59->68 60->59 67->68 69 ff6e29-ff6e35 68->69 70 ff6e38 68->70 69->70 72 ff6e39 70->72 72->72
    APIs
    • CreateActCtxA.KERNEL32(?), ref: 00FF6DA1
    Memory Dump Source
    • Source File: 00000003.00000002.1442719425.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_ff0000_RegAsm.jbxd
    Similarity
    • API ID: Create
    • String ID:
    • API String ID: 2289755597-0
    • Opcode ID: 6ffe395a9879675494c996975b0664d7df8a7e6c8f6666d2e2ad8447e2135c7d
    • Instruction ID: df9de30efa9ba1067d40ac72d154506b9912743648794e1a12a0e60c923cc9e1
    • Opcode Fuzzy Hash: 6ffe395a9879675494c996975b0664d7df8a7e6c8f6666d2e2ad8447e2135c7d
    • Instruction Fuzzy Hash: D841CFB1C00719CFEB24CFA9C84479EFBB2BF49304F20846AD408AB265DB756946CF50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 73 ff54a8-ff6db1 CreateActCtxA 76 ff6dba-ff6e14 73->76 77 ff6db3-ff6db9 73->77 84 ff6e16-ff6e19 76->84 85 ff6e23-ff6e27 76->85 77->76 84->85 86 ff6e29-ff6e35 85->86 87 ff6e38 85->87 86->87 89 ff6e39 87->89 89->89
    APIs
    • CreateActCtxA.KERNEL32(?), ref: 00FF6DA1
    Memory Dump Source
    • Source File: 00000003.00000002.1442719425.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_ff0000_RegAsm.jbxd
    Similarity
    • API ID: Create
    • String ID:
    • API String ID: 2289755597-0
    • Opcode ID: dcf6ac5e6a203f25e9cef0d9332982883b40079bc262a89cb9ab7cc84252e008
    • Instruction ID: 49915e415891b0c7b17641c9341ae4dcf2ce126ad97d19d1a3f7caab406a1454
    • Opcode Fuzzy Hash: dcf6ac5e6a203f25e9cef0d9332982883b40079bc262a89cb9ab7cc84252e008
    • Instruction Fuzzy Hash: 3B41CFB1C0071DCBEB24CFA9C844B9EFBB5BF49704F20806AD508AB255DB756945CF94

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 90 5153d64-515e9fc 93 515ea02-515eab2 SendMessageW 90->93 94 515e9fe-515ea01 90->94 100 515eab4-515eaba 93->100 101 515eabb-515eacf 93->101 100->101
    APIs
    • SendMessageW.USER32(?,?,?,?), ref: 0515EAA5
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: aba56344187d81d7fd2f13899cfd43b7a854144499c2e6344f9e8ff5ec7a406a
    • Instruction ID: d07dfbd82dad4847ec44e76e0c714d1e9a14ca2a07d0dd5a54cf977783954790
    • Opcode Fuzzy Hash: aba56344187d81d7fd2f13899cfd43b7a854144499c2e6344f9e8ff5ec7a406a
    • Instruction Fuzzy Hash: 1C317CB1904349DFDB10DFAAD884B9EBBF8FF48320F148859E419A7350D774A984CBA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 103 ffdb20-ffe4f4 DuplicateHandle 105 ffe4fd-ffe51a 103->105 106 ffe4f6-ffe4fc 103->106 106->105
    APIs
    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00FFE426,?,?,?,?,?), ref: 00FFE4E7
    Memory Dump Source
    • Source File: 00000003.00000002.1442719425.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_ff0000_RegAsm.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: 9ce79a6e18fd8cd75f5ea40217a97982499543f834d6335b7d7c015980d631f2
    • Instruction ID: 2e757c3e75c70c14b4f2c45db44306eb2ff8751490566180aeb2829d9f94668a
    • Opcode Fuzzy Hash: 9ce79a6e18fd8cd75f5ea40217a97982499543f834d6335b7d7c015980d631f2
    • Instruction Fuzzy Hash: 0821E3B590424DDFDB10CF9AD984AEEBBF4EB48320F14845AE954A3360D378A954CFA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 109 515f4c0-515f503 110 515f505-515f508 109->110 111 515f50b-515f514 109->111 110->111 112 515f516 111->112 113 515f519-515f549 GetClassInfoW 111->113 112->113 114 515f552-515f573 113->114 115 515f54b-515f551 113->115 115->114
    APIs
    • GetClassInfoW.USER32(?,00000000), ref: 0515F53C
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID: ClassInfo
    • String ID:
    • API String ID: 3534257612-0
    • Opcode ID: 5a972a83a12d39da3f3c209bc978e954d337b8bcb2632f04782755a09ed8fd93
    • Instruction ID: 3a8b8a18b2e7ae68828174079c36432f35090102aad5ccdbb3d807ce20ff065c
    • Opcode Fuzzy Hash: 5a972a83a12d39da3f3c209bc978e954d337b8bcb2632f04782755a09ed8fd93
    • Instruction Fuzzy Hash: 5421F0B2901649DFDB10CF9AD884B9EFBF4BB48220F14842AE859A3340D378A945CB64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 117 515f4b8-515f503 118 515f505-515f508 117->118 119 515f50b-515f514 117->119 118->119 120 515f516 119->120 121 515f519-515f549 GetClassInfoW 119->121 120->121 122 515f552-515f573 121->122 123 515f54b-515f551 121->123 123->122
    APIs
    • GetClassInfoW.USER32(?,00000000), ref: 0515F53C
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID: ClassInfo
    • String ID:
    • API String ID: 3534257612-0
    • Opcode ID: 1a699c0f687a0409ae8fde62e84370583731cbaea2cafc62386e0901697d0137
    • Instruction ID: 9d81db1f99bd33a819d09f237c241a186c27f1fa40a5e2d6eef4635fde6c5972
    • Opcode Fuzzy Hash: 1a699c0f687a0409ae8fde62e84370583731cbaea2cafc62386e0901697d0137
    • Instruction Fuzzy Hash: 692125B5D01609CFDB10CF9AD984B9EBBB4BB48220F14842AE859A3240D3389945CB64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 131 515bbc0-515bc08 133 515bc10-515bc3f SetWindowTextW 131->133 134 515bc0a-515bc0d 131->134 135 515bc41-515bc47 133->135 136 515bc48-515bc69 133->136 134->133 135->136
    APIs
    • SetWindowTextW.USER32(?,00000000), ref: 0515BC32
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID: TextWindow
    • String ID:
    • API String ID: 530164218-0
    • Opcode ID: 4ed054b045d93233babe57a148fc3402d390225243abde95bdcbe7580a939152
    • Instruction ID: f1eaaf8614fc1877bbe5ef9467e4d3b512996f4f788f2166ff56183d5addb485
    • Opcode Fuzzy Hash: 4ed054b045d93233babe57a148fc3402d390225243abde95bdcbe7580a939152
    • Instruction Fuzzy Hash: 741147B6804249CFDB14CF9AD544BDEFBF4EB48320F14842AD869A3340D738A545CFA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 125 ff5344-ff566c CoInitializeSecurity 128 ff566e-ff5674 125->128 129 ff5675-ff5689 125->129 128->129
    APIs
    • CoInitializeSecurity.COMBASE(00000000,-00000001,00000006,00000000,00000000,?,?,?,?), ref: 00FF565F
    Memory Dump Source
    • Source File: 00000003.00000002.1442719425.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_ff0000_RegAsm.jbxd
    Similarity
    • API ID: InitializeSecurity
    • String ID:
    • API String ID: 640775948-0
    • Opcode ID: 63798d0726dd345c1e7064f8d23ca4d67ed2538d48519842e02b6b1f874ae4e2
    • Instruction ID: bc8e88c7d66abef463b919a7ea074898fa9df752cb87cb117c450fa83d3c39d3
    • Opcode Fuzzy Hash: 63798d0726dd345c1e7064f8d23ca4d67ed2538d48519842e02b6b1f874ae4e2
    • Instruction Fuzzy Hash: 9D212272800649EFCB10CF8AD844AEEBBF4EF48310F148419EA18A7220C375A950CFA0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 144 515bbc8-515bc08 145 515bc10-515bc3f SetWindowTextW 144->145 146 515bc0a-515bc0d 144->146 147 515bc41-515bc47 145->147 148 515bc48-515bc69 145->148 146->145 147->148
    APIs
    • SetWindowTextW.USER32(?,00000000), ref: 0515BC32
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID: TextWindow
    • String ID:
    • API String ID: 530164218-0
    • Opcode ID: 382d67e21672457b81a2632bbe252315db13deac07aff1d05c629dbea4175a5c
    • Instruction ID: 5b4cbc97052b863bcc93c2e1f3e19f1878887618a26f60c565e205ee5ac29b3a
    • Opcode Fuzzy Hash: 382d67e21672457b81a2632bbe252315db13deac07aff1d05c629dbea4175a5c
    • Instruction Fuzzy Hash: D51114B6804649CFDB14CF9AC544BDEFBF4EB48320F14842AD869A3240D778A545CFA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 138 ff55e0-ff5623 140 ff562b-ff566c CoInitializeSecurity 138->140 141 ff566e-ff5674 140->141 142 ff5675-ff5689 140->142 141->142
    APIs
    • CoInitializeSecurity.COMBASE(00000000,-00000001,00000006,00000000,00000000,?,?,?,?), ref: 00FF565F
    Memory Dump Source
    • Source File: 00000003.00000002.1442719425.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_ff0000_RegAsm.jbxd
    Similarity
    • API ID: InitializeSecurity
    • String ID:
    • API String ID: 640775948-0
    • Opcode ID: 82233e3ec970a01d400680464e1310b04f43f9082d69fcc5fef13542576a23de
    • Instruction ID: 70989186a54f160adfbc408f3bd86bced5a9329c5bc09b49bfd9ca00f302f02f
    • Opcode Fuzzy Hash: 82233e3ec970a01d400680464e1310b04f43f9082d69fcc5fef13542576a23de
    • Instruction Fuzzy Hash: 6E2103B6800649DFCB11CF99D944BEEBBF4FF48314F24841AEA68A7220C335A554DFA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 156 5159794-515d2aa PostMessageW 158 515d2b3-515d2c7 156->158 159 515d2ac-515d2b2 156->159 159->158
    APIs
    • PostMessageW.USER32(?,00000018,00000001,?), ref: 0515D29D
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID: MessagePost
    • String ID:
    • API String ID: 410705778-0
    • Opcode ID: 0e93adc787857257eb1bc7fecfa26ffd6ac54f3454201d60c9a326afdd7c1876
    • Instruction ID: 1384532b831ba2d564f9297a6bf9a2517d7bc266630032e7c0755ddcbbdbbd2b
    • Opcode Fuzzy Hash: 0e93adc787857257eb1bc7fecfa26ffd6ac54f3454201d60c9a326afdd7c1876
    • Instruction Fuzzy Hash: 6111F5B5804749DFDB10CF9AD984BDEBBF4EB48320F10841AE958A7340D374A984CFA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 161 515d238-515d2aa PostMessageW 163 515d2b3-515d2c7 161->163 164 515d2ac-515d2b2 161->164 164->163
    APIs
    • PostMessageW.USER32(?,00000018,00000001,?), ref: 0515D29D
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID: MessagePost
    • String ID:
    • API String ID: 410705778-0
    • Opcode ID: 3a4d9389394a40d46c831bd8f045e2d6e10d03a41fe34575c9b7dee7e671d2d4
    • Instruction ID: 117e3df64c7f7f6f99a86bb31f6396b7eb70a8887aa7b12e88cee0e111243fa9
    • Opcode Fuzzy Hash: 3a4d9389394a40d46c831bd8f045e2d6e10d03a41fe34575c9b7dee7e671d2d4
    • Instruction Fuzzy Hash: F31113B5804348DFDB10CF9AD985BDEBBF4EB48324F14881AE854A7200C378A544CFA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 150 ffc180-ffc1c0 151 ffc1c8-ffc1f3 GetModuleHandleW 150->151 152 ffc1c2-ffc1c5 150->152 153 ffc1fc-ffc210 151->153 154 ffc1f5-ffc1fb 151->154 152->151 154->153
    APIs
    • GetModuleHandleW.KERNELBASE(00000000), ref: 00FFC1E6
    Memory Dump Source
    • Source File: 00000003.00000002.1442719425.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_ff0000_RegAsm.jbxd
    Similarity
    • API ID: HandleModule
    • String ID:
    • API String ID: 4139908857-0
    • Opcode ID: 0e69d8bd746bdab69cac802b92805819644387353bdce54a33571c82d3aa52b6
    • Instruction ID: 2c999cf103bb797fd0f0ce8bb21587abc211773fd5c6a151dae5df4ab6951167
    • Opcode Fuzzy Hash: 0e69d8bd746bdab69cac802b92805819644387353bdce54a33571c82d3aa52b6
    • Instruction Fuzzy Hash: 5A110FB6C006498FDB10CF9AD944ADEFBF4AF88320F14842AD518B7211C378A545CFA1
    APIs
    • CloseHandle.KERNELBASE(?), ref: 05157030
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 95b898f4282a580efbcfc6e8dbbe9f034c4d988cbab1accedfd1d9e58f043320
    • Instruction ID: bc2a693cf668efa553379fabceff2323dfa98221f621b57a0266062634704702
    • Opcode Fuzzy Hash: 95b898f4282a580efbcfc6e8dbbe9f034c4d988cbab1accedfd1d9e58f043320
    • Instruction Fuzzy Hash: 5C1125B6800249CFDB10CF9AD545BDEBBF4EB48320F14841AD968B7340D778A944CFA5
    APIs
    • CloseHandle.KERNELBASE(?), ref: 05157030
    Memory Dump Source
    • Source File: 00000003.00000002.1444371421.0000000005150000.00000040.00000800.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_5150000_RegAsm.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: d8b3073a4751d5b97600f318aae078177a09ce6956671b8be81e354a30053849
    • Instruction ID: 622fd3da5678b1d25fa98f38bfa0d5780c436fcea064dc78429ee7e6644fcc9e
    • Opcode Fuzzy Hash: d8b3073a4751d5b97600f318aae078177a09ce6956671b8be81e354a30053849
    • Instruction Fuzzy Hash: 981145B5800349CFDB20CF9AD545BDEBBF4EB48320F24842AD968A7340D378A544CFA5
    Memory Dump Source
    • Source File: 00000003.00000002.1441701607.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_c8d000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 89f285299a905bbeb2d2c393738927f6c913ea45082c4e8afd5c74b5ca73f427
    • Instruction ID: 5132f7cc0614aa58996a3bb734f0530645958ab2a58e38b804902494592858d4
    • Opcode Fuzzy Hash: 89f285299a905bbeb2d2c393738927f6c913ea45082c4e8afd5c74b5ca73f427
    • Instruction Fuzzy Hash: B02125B1500240DFDB05EF10D9C0F26BF65FB8431CF24C56AE80A4B286C336D956CBA6
    Memory Dump Source
    • Source File: 00000003.00000002.1441701607.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_c8d000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 75b9da6758deff6da7bcf9126936bc247c9f664bfcd14e402d81713f54e79fc2
    • Instruction ID: 30a9f28595aa1ede6892751bbe80cf74dd43521be31a44808cc947fefbf5087a
    • Opcode Fuzzy Hash: 75b9da6758deff6da7bcf9126936bc247c9f664bfcd14e402d81713f54e79fc2
    • Instruction Fuzzy Hash: A121F571504344EFDB05EF10D9C0B26BB65FBD4328F24C569E90A4B296C336E856CBA6
    Memory Dump Source
    • Source File: 00000003.00000002.1441806091.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_cad000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: da3d22ab727a42a555fc3282cb4638a991635f8e5332d209429324b415e629ad
    • Instruction ID: 783b81f87851def5a56ffa8614bff590cd08860bc781b27facb30aecc18c2bdb
    • Opcode Fuzzy Hash: da3d22ab727a42a555fc3282cb4638a991635f8e5332d209429324b415e629ad
    • Instruction Fuzzy Hash: 8721F271604345DFDB14DF20D9C0B26BB65EB85318F24C5A9D80B4B686C736D847CA62
    Memory Dump Source
    • Source File: 00000003.00000002.1441806091.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_cad000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a2858cbab8860d84b8d6dc2c482e9e096e33081ae9807ea461a39bc7c9e34853
    • Instruction ID: 56927f135c21cd2fce61adaad5cb861fe9442067b594f8763734aedc43afd2ba
    • Opcode Fuzzy Hash: a2858cbab8860d84b8d6dc2c482e9e096e33081ae9807ea461a39bc7c9e34853
    • Instruction Fuzzy Hash: 8B210471504345EFDB05DF10D9C4B2ABBA5FB85318F24C6ADE80B4B692C736DC46CA61
    Memory Dump Source
    • Source File: 00000003.00000002.1441806091.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_cad000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4d4145234f28dc009532db47aae292444c425c728d20ffa67c5730407a73568c
    • Instruction ID: f6d4c97a1324c56869b02bda50106789c301b002451e78a81c212374a82ba336
    • Opcode Fuzzy Hash: 4d4145234f28dc009532db47aae292444c425c728d20ffa67c5730407a73568c
    • Instruction Fuzzy Hash: 432153755093C08FCB12CF24D994715BF71EB46318F28C5DAD84A8F6A7C33A994ACB62
    Memory Dump Source
    • Source File: 00000003.00000002.1441701607.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_c8d000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0c18b29bf45e1f8211f0d9b8393173274bc5291f3679a0d43233693b02d382c4
    • Instruction ID: e50447e6ce5808775503f302d2ee5d6744530b562ab2de235b5b3a33389ea626
    • Opcode Fuzzy Hash: 0c18b29bf45e1f8211f0d9b8393173274bc5291f3679a0d43233693b02d382c4
    • Instruction Fuzzy Hash: 941126B2404280CFCF01DF10D9C0B16BF71FB84318F28C6AAD8090B656C336D956CBA1
    Memory Dump Source
    • Source File: 00000003.00000002.1441701607.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_c8d000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0c18b29bf45e1f8211f0d9b8393173274bc5291f3679a0d43233693b02d382c4
    • Instruction ID: 7cd2fb31b88deac2b44468123aa0c102f1bdbd019f5a0b5f32695afb5e017242
    • Opcode Fuzzy Hash: 0c18b29bf45e1f8211f0d9b8393173274bc5291f3679a0d43233693b02d382c4
    • Instruction Fuzzy Hash: 11110372404280DFCB01DF00D9C0B16BF71FB94328F28C6A9D80A0B656C33AE95ACBA1
    Memory Dump Source
    • Source File: 00000003.00000002.1441806091.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_cad000_RegAsm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d7fc8320e9ffd4f8ec94d9e167b65ccdea872c3a8bd4eb18a3b2cc6050ea0561
    • Instruction ID: b3c4c897ed427b11120f30594a0a83ced7148ff429b92371f7b5ec782c8f140a
    • Opcode Fuzzy Hash: d7fc8320e9ffd4f8ec94d9e167b65ccdea872c3a8bd4eb18a3b2cc6050ea0561
    • Instruction Fuzzy Hash: A511DD75504284DFCB01CF10C5C4B15FBA1FB85318F28C6AED84A4BAA6C33AD84ACB61