Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
antispam.exe

Overview

General Information

Sample name:antispam.exe
Analysis ID:1533402
MD5:e5ad838952e63778a5708d2efc4cda86
SHA1:1a3f14465460a61e012d11cccf301424f2c0f11d
SHA256:e3f10c90a0614e13074f69193a9bd3310332392d17c52fbe6596fd6596327811
Tags:exeuser-Racco42
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses ipconfig to lookup or modify the Windows network settings
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to execute programs as a different user
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • antispam.exe (PID: 6120 cmdline: "C:\Users\user\Desktop\antispam.exe" MD5: E5AD838952E63778A5708D2EFC4CDA86)
    • conhost.exe (PID: 3844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2672 cmdline: cmd.exe /c systeminfo MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 3740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • systeminfo.exe (PID: 6024 cmdline: systeminfo MD5: EE309A9C61511E907D87B10EF226FDCD)
        • WmiPrvSE.exe (PID: 1420 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • cmd.exe (PID: 5576 cmdline: cmd.exe /c route print MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ROUTE.EXE (PID: 5628 cmdline: route print MD5: 3C97E63423E527BA8381E81CBA00B8CD)
    • cmd.exe (PID: 1704 cmdline: cmd.exe /c ipconfig /all MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ipconfig.exe (PID: 928 cmdline: ipconfig /all MD5: 62F170FB07FDBB79CEB7147101406EB8)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io': Data: Command: cmd.exe /c route print, CommandLine: cmd.exe /c route print, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\antispam.exe", ParentImage: C:\Users\user\Desktop\antispam.exe, ParentProcessId: 6120, ParentProcessName: antispam.exe, ProcessCommandLine: cmd.exe /c route print, ProcessId: 5576, ProcessName: cmd.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: antispam.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\lfkmf\source\repos\AuthFormCpp\x64\Release\AuthFormCpp.pdb%% source: antispam.exe
Source: Binary string: C:\Users\lfkmf\source\repos\AuthFormCpp\x64\Release\AuthFormCpp.pdb source: antispam.exe
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F715B00_2_00007FF6A1F715B0
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F71FC00_2_00007FF6A1F71FC0
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F712300_2_00007FF6A1F71230
Source: qwertyuio.txt.0.drBinary string: Boot Device: \Device\HarddiskVolume1
Source: classification engineClassification label: mal48.evad.winEXE@18/2@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6024:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3740:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6780:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3844:120:WilError_03
Source: C:\Users\user\Desktop\antispam.exeFile created: C:\Users\user\AppData\Local\Temp\qwertyuio.txtJump to behavior
Source: antispam.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\antispam.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\antispam.exe "C:\Users\user\Desktop\antispam.exe"
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c systeminfo
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
Source: C:\Windows\System32\systeminfo.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c route print
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ROUTE.EXE route print
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c ipconfig /all
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /all
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c systeminfoJump to behavior
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c route printJump to behavior
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c ipconfig /allJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfoJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ROUTE.EXE route printJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /allJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\antispam.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: esscli.dllJump to behavior
Source: C:\Windows\System32\ROUTE.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\ROUTE.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\ROUTE.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\ROUTE.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\systeminfo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: C:\Users\user\Desktop\antispam.exeAutomated click: OK
Source: antispam.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: antispam.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: antispam.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: antispam.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: antispam.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: antispam.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: antispam.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: antispam.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: antispam.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\lfkmf\source\repos\AuthFormCpp\x64\Release\AuthFormCpp.pdb%% source: antispam.exe
Source: Binary string: C:\Users\lfkmf\source\repos\AuthFormCpp\x64\Release\AuthFormCpp.pdb source: antispam.exe
Source: antispam.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: antispam.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: antispam.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: antispam.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: antispam.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /all
Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: qwertyuio.txt.0.drBinary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No
Source: ROUTE.EXE, 00000008.00000002.1859464175.0000022AFC069000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F746E4 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6A1F746E4
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F748C4 SetUnhandledExceptionFilter,0_2_00007FF6A1F748C4
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F73DC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6A1F73DC0
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F746E4 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6A1F746E4
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F71FC0 CreatePipe,SetHandleInformation,memcpy,CreateProcessW,CloseHandle,CloseHandle,CloseHandle,ReadFile,memcpy,ReadFile,CloseHandle,CloseHandle,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,Concurrency::cancel_current_task,DefWindowProcW,PostQuitMessage,SendMessageW,GetWindowTextW,GetWindowTextLengthW,GetWindowTextW,wcschr,wcscpy_s,wcscpy_s,memset,GetComputerNameExW,lstrcmpiW,LogonUserW,FlushFileBuffers,SetFilePointer,WriteFile,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SetFilePointer,WriteFile,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SetFilePointer,WriteFile,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,memcpy,memcpy,SetFilePointer,WriteFile,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,FlushFileBuffers,MessageBoxW,PostQuitMessage,CloseHandle,memcpy,memcpy,SetFilePointer,WriteFile,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,FlushFileBuffers,MessageBoxW,Concurrency::cancel_current_task,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,0_2_00007FF6A1F71FC0
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c systeminfoJump to behavior
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c route printJump to behavior
Source: C:\Users\user\Desktop\antispam.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c ipconfig /allJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfoJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ROUTE.EXE route printJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /allJump to behavior
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F745C4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6A1F745C4
Source: C:\Users\user\Desktop\antispam.exeCode function: 0_2_00007FF6A1F715B0 InitCommonControlsEx,LoadIconW,LoadCursorW,LoadIconW,GetTempPathW,memcpy,_invalid_parameter_noinfo_noreturn,CreateFileW,AllocConsole,GetConsoleWindow,GetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,SetConsoleTitleW,__acrt_iob_func,freopen_s,__acrt_iob_func,freopen_s,__acrt_iob_func,freopen_s,GetStdHandle,SetStdHandle,GetStdHandle,SetStdHandle,GetStdHandle,SetStdHandle,printf,SleepEx,printf,RegisterClassExW,CreateWindowExW,GetWindowLongW,SetWindowLongW,CreateWindowExW,LoadBitmapW,SendMessageW,SendMessageW,SendMessageW,CreateWindowExW,CreateFontW,SendMessageW,CreateWindowExW,SendMessageW,NetGetJoinInformation,SetFilePointer,WriteFile,_invalid_parameter_noinfo_noreturn,SetFilePointer,WriteFile,_invalid_parameter_noinfo_noreturn,GetUserNameExW,SendMessageW,SendMessageW,CreateWindowExW,SendMessageW,CreateWindowExW,CreateWindowExW,SendMessageW,CreateWindowExW,SendMessageW,ShowWindow,UpdateWindow,GetMessageW,TranslateMessage,DispatchMessageW,GetMessageW,_invalid_parameter_noinfo_noreturn,0_2_00007FF6A1F715B0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
121
Windows Management Instrumentation
1
Valid Accounts
1
Valid Accounts
1
Valid Accounts
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Access Token Manipulation
11
Virtualization/Sandbox Evasion
LSASS Memory121
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
Process Injection
1
Access Token Manipulation
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
11
Process Injection
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync14
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1533402 Sample: antispam.exe Startdate: 14/10/2024 Architecture: WINDOWS Score: 48 7 antispam.exe 2 2->7         started        process3 9 cmd.exe 1 7->9         started        12 conhost.exe 7->12         started        14 cmd.exe 1 7->14         started        16 cmd.exe 1 7->16         started        signatures4 35 Uses ipconfig to lookup or modify the Windows network settings 9->35 18 systeminfo.exe 2 1 9->18         started        21 conhost.exe 9->21         started        37 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->37 23 ROUTE.EXE 1 14->23         started        25 conhost.exe 14->25         started        27 ipconfig.exe 1 16->27         started        29 conhost.exe 16->29         started        process5 signatures6 33 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 18->33 31 WmiPrvSE.exe 18->31         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
antispam.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1533402
Start date and time:2024-10-14 17:21:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:16
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:antispam.exe
Detection:MAL
Classification:mal48.evad.winEXE@18/2@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 8
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: antispam.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\antispam.exe
File Type:data
Category:modified
Size (bytes):11408
Entropy (8bit):3.312724115767823
Encrypted:false
SSDEEP:96:7Uq/xI/fLgKK8w6hyBi31/Q4o4h4l4LN4eb2ETdSqkhtn3G0Bca5tau6NEB/fLtU:lxqfLGyVihiv
MD5:48ACFCF866859AFFA708E2F94FD7FAF4
SHA1:79270EE8B83D4AAB79133421314C0C2C3C7CB546
SHA-256:24D9E7A052DCEA137F5657EC1CFF173675305B8208BBC34A2DEBB49952006B63
SHA-512:714D13CD2985B1B61EC107D2B14016DE1BBE4C3AE48F5B2C7E0CC74CCF526A3137CACB4C2E018F12E442F71CD0FECE8401C2884EA48ADE1A8D0375499455708C
Malicious:false
Reputation:low
Preview:C.o.m.p.u.t.e.r. .n.o.t. .i.n. .d.o.m.a.i.n.........H.o.s.t. .N.a.m.e.:. . . . . . . . . . . . . . . . . .J.O.N.E.S.-.P.C.....O.S. .N.a.m.e.:. . . . . . . . . . . . . . . . . . . .M.i.c.r.o.s.o.f.t. .W.i.n.d.o.w.s. .1.0. .P.r.o.....O.S. .V.e.r.s.i.o.n.:. . . . . . . . . . . . . . . . .1.0...0...1.9.0.4.5. .N./.A. .B.u.i.l.d. .1.9.0.4.5.....O.S. .M.a.n.u.f.a.c.t.u.r.e.r.:. . . . . . . . . . . .M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n.....O.S. .C.o.n.f.i.g.u.r.a.t.i.o.n.:. . . . . . . . . . .S.t.a.n.d.a.l.o.n.e. .W.o.r.k.s.t.a.t.i.o.n.....O.S. .B.u.i.l.d. .T.y.p.e.:. . . . . . . . . . . . . .M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.....R.e.g.i.s.t.e.r.e.d. .O.w.n.e.r.:. . . . . . . . . . .h.a.r.d.z.....R.e.g.i.s.t.e.r.e.d. .O.r.g.a.n.i.z.a.t.i.o.n.:. . . .....P.r.o.d.u.c.t. .I.D.:. . . . . . . . . . . . . . . . .0.0.3.3.0.-.7.1.3.8.8.-.7.7.1.0.4.-.A.A.O.E.M.....O.r.i.g.i.n.a.l. .I.n.s.t.a.l.l. .D.a.t.e.:. . . . . .0.3./.1.0./.2.0.2.3.,. .0.9.:.5.7.:.1.8.....S.y.s.t.e.m. .B.o.o.t. .T.i.m.e.
Process:C:\Users\user\Desktop\antispam.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):3663
Entropy (8bit):4.450638024403666
Encrypted:false
SSDEEP:24:XtwtIviRcd9lyXR7FGx9ApO77v09+ONoPmvx8P7WV4+MBSf4q+erUsDyN7Y/Y99/:hryBkF3U4FCdjUl2vAhikwO
MD5:C065A7561AFAAB35F48A821C07680BAE
SHA1:1F5B23DD06D18144B139793502D069CECDCA819A
SHA-256:AFD5A11441866981E1843BA51188AC712F57611178ABAB7FBC80A68C182E9AF2
SHA-512:19DF30E6CEAD663C35E9EB10BD57FA7F230A1C136DBBA1BD952757C83FF3BEECDADF66B7FC542BCF6627F0F8C3216CB60D7A4E253A55675420D0C47B60B210EA
Malicious:false
Preview:Downloading filter kb_outlook_sf_0..Downloading filter kb_outlook_sf_1..Downloading filter kb_outlook_sf_2..Downloading filter kb_outlook_sf_3..Downloading filter kb_outlook_sf_4..Downloading filter kb_outlook_sf_5..Downloading filter kb_outlook_sf_6..Downloading filter kb_outlook_sf_7..Downloading filter kb_outlook_sf_8..Downloading filter kb_outlook_sf_9..Downloading filter kb_outlook_sf_10..Downloading filter kb_outlook_sf_11..Downloading filter kb_outlook_sf_12..Downloading filter kb_outlook_sf_13..Downloading filter kb_outlook_sf_14..Downloading filter kb_outlook_sf_15..Downloading filter kb_outlook_sf_16..Downloading filter kb_outlook_sf_17..Downloading filter kb_outlook_sf_18..Downloading filter kb_outlook_sf_19..Downloading filter kb_outlook_sf_20..Downloading filter kb_outlook_sf_21..Downloading filter kb_outlook_sf_22..Downloading filter kb_outlook_sf_23..Downloading filter kb_outlook_sf_24..Downloading filter kb_outlook_sf_25..Downloading filter kb_outlook_sf_26..Downloading
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.463866558170516
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:antispam.exe
File size:50'688 bytes
MD5:e5ad838952e63778a5708d2efc4cda86
SHA1:1a3f14465460a61e012d11cccf301424f2c0f11d
SHA256:e3f10c90a0614e13074f69193a9bd3310332392d17c52fbe6596fd6596327811
SHA512:767ff630d87accf56e4fdb0d7960965df24dd1dd58d69ba49ec46a210e9ee92e30fd983cea3b74bd843a6ce16a66357b0c64996a066f17059c0b7f81e15217a5
SSDEEP:384:AGzr3q+r7bHNgQMIVVheHRzfl/FG5G9Nt3X9IMha/zA3unQE5NAQlWa8tWyEeSy3:fHSFX9VvQlotWSlcpzJLtOfR3
TLSH:CA33F927B52790AACE769135112A2613D0F97D53F730ECDB1E80F52EA23A1E039A1F0D
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........O].l!..l!..l!......l!..."..l!...%..l!...$..l!...%..l!... ..l!... ..l!..l ..l!...(..l!......l!..l...l!...#..l!.Rich.l!........
Icon Hash:90cececece8e8eb0
Entrypoint:0x140004328
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x670640E6 [Wed Oct 9 08:37:58 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:48f45504106095119561cb3fc0727154
Instruction
dec eax
sub esp, 28h
call 00007F1E44E7FB98h
dec eax
add esp, 28h
jmp 00007F1E44E7F77Fh
int3
int3
dec eax
and dword ptr [ecx+10h], 00000000h
dec eax
lea eax, dword ptr [00001148h]
dec eax
mov dword ptr [ecx+08h], eax
dec eax
lea eax, dword ptr [0000112Dh]
dec eax
mov dword ptr [ecx], eax
dec eax
mov eax, ecx
ret
int3
int3
dec eax
sub esp, 48h
dec eax
lea ecx, dword ptr [esp+20h]
call 00007F1E44E7F8D7h
dec eax
lea edx, dword ptr [000021BFh]
dec eax
lea ecx, dword ptr [esp+20h]
call 00007F1E44E80216h
int3
jmp 00007F1E44E8029Ah
int3
int3
int3
dec eax
sub esp, 28h
call 00007F1E44E801ECh
test eax, eax
je 00007F1E44E7F923h
dec eax
mov eax, dword ptr [00000030h]
dec eax
mov ecx, dword ptr [eax+08h]
jmp 00007F1E44E7F907h
dec eax
cmp ecx, eax
je 00007F1E44E7F916h
xor eax, eax
dec eax
cmpxchg dword ptr [000042E8h], ecx
jne 00007F1E44E7F8F0h
xor al, al
dec eax
add esp, 28h
ret
mov al, 01h
jmp 00007F1E44E7F8F9h
int3
int3
int3
dec eax
sub esp, 28h
test ecx, ecx
jne 00007F1E44E7F909h
mov byte ptr [000042D1h], 00000001h
call 00007F1E44E7FED9h
call 00007F1E44E7FBC0h
test al, al
jne 00007F1E44E7F906h
xor al, al
jmp 00007F1E44E7F916h
call 00007F1E44E7FBB3h
test al, al
jne 00007F1E44E7F90Bh
xor ecx, ecx
call 00007F1E44E7FBA8h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x661c0x154.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x5460.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x90000x348.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000x58.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x5aa00x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x59600x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x50000x3a8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x3fe20x4000210b610511a9c9c055ebcfe2b8b769d3False0.5301513671875data6.13184044525345IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x50000x23f00x24004d00644e2381d0f5c0ed48f248fb10e9False0.3986545138888889data4.2187157506719295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x80000x7400x200f98042e4a06d0d5124744c3c0baff64eFalse0.228515625data2.0735734567561375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x90000x3480x400a96c0ff6ee6812ca7616a2a03862e69aFalse0.4384765625PEX Binary Archive3.5550923239964085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xa0000x54600x560013a0fc772de4e3141d5c224fb93edb68False0.30496002906976744data6.886942552680524IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x100000x580x2002ccba98db04f63998672fb4994f6223eFalse0.1953125data1.1854049465858691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_BITMAP0xa3600x4f2aDevice independent bitmap graphic, 320 x 60 x 8, image size 0, resolution 2834 x 2834 px/mEnglishUnited States0.2999111812888582
RT_MENU0xa1c00x4adataEnglishUnited States0.8648648648648649
RT_DIALOG0xa2200x140dataEnglishUnited States0.58125
RT_STRING0xf2900x4cdataEnglishUnited States0.7105263157894737
RT_ACCELERATOR0xa2100x10dataEnglishUnited States1.25
RT_MANIFEST0xf2e00x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllGetTempPathW, CreateFileW, GetComputerNameExW, Sleep, CloseHandle, SetStdHandle, CreateProcessW, GetConsoleWindow, lstrcmpiW, AllocConsole, SetConsoleTitleW, FlushFileBuffers, RtlLookupFunctionEntry, CreatePipe, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, WriteFile, GetStdHandle, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, ReadFile, SetHandleInformation, SetFilePointer, RtlVirtualUnwind, RtlCaptureContext
USER32.dllSendMessageW, CreateWindowExW, MessageBoxW, DefWindowProcW, GetMessageW, GetWindowTextLengthW, GetWindowLongW, RegisterClassExW, DispatchMessageW, GetWindowTextW, UpdateWindow, PostQuitMessage, SetWindowLongW, LoadCursorW, LoadIconW, TranslateMessage, LoadBitmapW, ShowWindow
GDI32.dllCreateFontW
ADVAPI32.dllLogonUserW
MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z
COMCTL32.dllInitCommonControlsEx
Secur32.dllGetUserNameExW
NETAPI32.dllNetApiBufferFree, NetGetJoinInformation, NetLocalGroupGetMembers
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dllmemset, __current_exception_context, __current_exception, _CxxThrowException, __C_specific_handler, wcschr, __std_exception_copy, memcpy, __std_exception_destroy, memmove
api-ms-win-crt-stdio-l1-1-0.dllfreopen_s, __stdio_common_vfprintf, __p__commode, __acrt_iob_func, __stdio_common_vswprintf_s, _set_fmode
api-ms-win-crt-string-l1-1-0.dllwcscpy_s
api-ms-win-crt-runtime-l1-1-0.dll_c_exit, _configure_narrow_argv, _cexit, _initialize_onexit_table, _register_onexit_function, _crt_atexit, terminate, _initialize_narrow_environment, _get_narrow_winmain_command_line, _invalid_parameter_noinfo_noreturn, _exit, _register_thread_local_exe_atexit_callback, exit, _set_app_type, _seh_filter_exe, _initterm_e, _initterm
api-ms-win-crt-heap-l1-1-0.dll_callnewh, malloc, _set_new_mode, free
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:11:22:08
Start date:14/10/2024
Path:C:\Users\user\Desktop\antispam.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\antispam.exe"
Imagebase:0x7ff6a1f70000
File size:50'688 bytes
MD5 hash:E5AD838952E63778A5708D2EFC4CDA86
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:11:22:08
Start date:14/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:2
Start time:11:22:13
Start date:14/10/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /c systeminfo
Imagebase:0x7ff709760000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:11:22:13
Start date:14/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:11:22:13
Start date:14/10/2024
Path:C:\Windows\System32\systeminfo.exe
Wow64 process (32bit):false
Commandline:systeminfo
Imagebase:0x7ff66bc60000
File size:110'080 bytes
MD5 hash:EE309A9C61511E907D87B10EF226FDCD
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:5
Start time:11:22:14
Start date:14/10/2024
Path:C:\Windows\System32\wbem\WmiPrvSE.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Imagebase:0x7ff693ab0000
File size:496'640 bytes
MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
Has elevated privileges:true
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:6
Start time:11:22:14
Start date:14/10/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /c route print
Imagebase:0x7ff709760000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:7
Start time:11:22:14
Start date:14/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:8
Start time:11:22:14
Start date:14/10/2024
Path:C:\Windows\System32\ROUTE.EXE
Wow64 process (32bit):false
Commandline:route print
Imagebase:0x7ff6f3d00000
File size:24'576 bytes
MD5 hash:3C97E63423E527BA8381E81CBA00B8CD
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:9
Start time:11:22:14
Start date:14/10/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /c ipconfig /all
Imagebase:0x7ff709760000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:10
Start time:11:22:14
Start date:14/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:11
Start time:11:22:14
Start date:14/10/2024
Path:C:\Windows\System32\ipconfig.exe
Wow64 process (32bit):false
Commandline:ipconfig /all
Imagebase:0x7ff71d240000
File size:35'840 bytes
MD5 hash:62F170FB07FDBB79CEB7147101406EB8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:37.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:38.5%
    Total number of Nodes:200
    Total number of Limit Nodes:3
    execution_graph 1221 7ff6a1f742dc 1222 7ff6a1f74870 GetModuleHandleW 1221->1222 1223 7ff6a1f742e3 1222->1223 1224 7ff6a1f7431d _exit 1223->1224 1225 7ff6a1f742e7 1223->1225 1236 7ff6a1f74fac _seh_filter_exe 1226 7ff6a1f74198 1230 7ff6a1f748c4 SetUnhandledExceptionFilter 1226->1230 1237 7ff6a1f74328 1240 7ff6a1f745c4 1237->1240 1241 7ff6a1f74331 1240->1241 1242 7ff6a1f745e7 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1240->1242 1242->1241 1004 7ff6a1f741b4 1005 7ff6a1f741c8 1004->1005 1006 7ff6a1f74300 1005->1006 1007 7ff6a1f741d0 1005->1007 1077 7ff6a1f746e4 IsProcessorFeaturePresent 1006->1077 1009 7ff6a1f7430a 1007->1009 1016 7ff6a1f741ee __scrt_release_startup_lock 1007->1016 1010 7ff6a1f746e4 9 API calls 1009->1010 1011 7ff6a1f74315 1010->1011 1013 7ff6a1f7431d _exit 1011->1013 1012 7ff6a1f74213 1014 7ff6a1f74299 1026 7ff6a1f7482c memset GetStartupInfoW 1014->1026 1016->1012 1016->1014 1018 7ff6a1f74291 _register_thread_local_exe_atexit_callback 1016->1018 1017 7ff6a1f7429e _get_narrow_winmain_command_line 1027 7ff6a1f715b0 InitCommonControlsEx LoadIconW LoadCursorW LoadIconW GetTempPathW 1017->1027 1018->1014 1023 7ff6a1f742c5 1024 7ff6a1f742ca _cexit 1023->1024 1025 7ff6a1f742cf 1023->1025 1024->1025 1025->1012 1026->1017 1083 7ff6a1f73540 1027->1083 1030 7ff6a1f716ad memcpy 1032 7ff6a1f71706 1030->1032 1031 7ff6a1f716e7 1114 7ff6a1f73820 1031->1114 1034 7ff6a1f71778 CreateFileW AllocConsole GetConsoleWindow 1032->1034 1035 7ff6a1f71773 1032->1035 1038 7ff6a1f7176c _invalid_parameter_noinfo_noreturn 1032->1038 1036 7ff6a1f7180d 13 API calls 1034->1036 1037 7ff6a1f717d2 GetWindowLongW SetWindowLongW ShowWindow ShowWindow 1034->1037 1134 7ff6a1f7409c 1035->1134 1040 7ff6a1f718e0 1036->1040 1037->1036 1038->1035 1102 7ff6a1f71010 __acrt_iob_func 1040->1102 1042 7ff6a1f718ee SleepEx 1042->1040 1043 7ff6a1f718fd 1042->1043 1044 7ff6a1f71010 printf 2 API calls 1043->1044 1045 7ff6a1f71909 RegisterClassExW 1044->1045 1046 7ff6a1f7191c CreateWindowExW 1045->1046 1047 7ff6a1f71f4d 1045->1047 1046->1047 1048 7ff6a1f71971 13 API calls 1046->1048 1049 7ff6a1f71f93 1047->1049 1050 7ff6a1f71f8e 1047->1050 1054 7ff6a1f71f87 _invalid_parameter_noinfo_noreturn 1047->1054 1051 7ff6a1f71b7b 1048->1051 1052 7ff6a1f71d17 13 API calls 1048->1052 1164 7ff6a1f73da0 1049->1164 1055 7ff6a1f7409c free 1050->1055 1056 7ff6a1f71b83 1051->1056 1057 7ff6a1f71b91 1051->1057 1052->1047 1059 7ff6a1f71f23 TranslateMessage DispatchMessageW GetMessageW 1052->1059 1054->1050 1055->1049 1137 7ff6a1f71230 NetLocalGroupGetMembers 1056->1137 1061 7ff6a1f71c78 1057->1061 1105 7ff6a1f74060 1057->1105 1059->1047 1059->1059 1062 7ff6a1f73540 8 API calls 1061->1062 1065 7ff6a1f71c89 1062->1065 1067 7ff6a1f71c96 SetFilePointer WriteFile 1065->1067 1068 7ff6a1f71cd3 1065->1068 1067->1068 1068->1052 1071 7ff6a1f71d12 1068->1071 1073 7ff6a1f71d0b _invalid_parameter_noinfo_noreturn 1068->1073 1069 7ff6a1f71c2d 1069->1052 1069->1071 1072 7ff6a1f71c71 _invalid_parameter_noinfo_noreturn 1069->1072 1070 7ff6a1f71bf0 SetFilePointer WriteFile 1070->1069 1074 7ff6a1f7409c free 1071->1074 1072->1061 1073->1071 1074->1052 1075 7ff6a1f74870 GetModuleHandleW 1076 7ff6a1f742c1 1075->1076 1076->1011 1076->1023 1078 7ff6a1f7470a 1077->1078 1079 7ff6a1f74718 memset RtlCaptureContext RtlLookupFunctionEntry 1078->1079 1080 7ff6a1f74752 RtlVirtualUnwind 1079->1080 1081 7ff6a1f7478e memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 1079->1081 1080->1081 1082 7ff6a1f7480e 1081->1082 1082->1009 1084 7ff6a1f73570 1083->1084 1084->1084 1085 7ff6a1f7358d 1084->1085 1086 7ff6a1f73674 1084->1086 1087 7ff6a1f73598 memcpy 1085->1087 1091 7ff6a1f735b9 1085->1091 1173 7ff6a1f71210 ?_Xlength_error@std@@YAXPEBD 1086->1173 1089 7ff6a1f71699 1087->1089 1089->1030 1089->1031 1090 7ff6a1f73679 1174 7ff6a1f71170 1090->1174 1091->1090 1092 7ff6a1f73637 1091->1092 1094 7ff6a1f735f6 memcpy 1091->1094 1097 7ff6a1f735e9 1091->1097 1096 7ff6a1f74060 4 API calls 1092->1096 1094->1089 1096->1094 1099 7ff6a1f74060 4 API calls 1097->1099 1098 7ff6a1f7367f 1100 7ff6a1f735f1 1099->1100 1100->1094 1101 7ff6a1f73630 _invalid_parameter_noinfo_noreturn 1100->1101 1101->1092 1177 7ff6a1f71000 1102->1177 1104 7ff6a1f71046 __stdio_common_vfprintf 1104->1042 1106 7ff6a1f7407a malloc 1105->1106 1107 7ff6a1f7406b 1106->1107 1108 7ff6a1f71ba9 1106->1108 1107->1106 1109 7ff6a1f7408a 1107->1109 1108->1069 1108->1070 1110 7ff6a1f74095 1109->1110 1178 7ff6a1f7435c 1109->1178 1112 7ff6a1f71170 Concurrency::cancel_current_task __std_exception_copy 1110->1112 1113 7ff6a1f7409b 1112->1113 1115 7ff6a1f739ca 1114->1115 1118 7ff6a1f7384e 1114->1118 1184 7ff6a1f71210 ?_Xlength_error@std@@YAXPEBD 1115->1184 1117 7ff6a1f739cf 1122 7ff6a1f71170 Concurrency::cancel_current_task __std_exception_copy 1117->1122 1118->1117 1119 7ff6a1f738fc 1118->1119 1120 7ff6a1f738d0 1118->1120 1124 7ff6a1f738b4 1118->1124 1123 7ff6a1f74060 4 API calls 1119->1123 1120->1117 1121 7ff6a1f738dd 1120->1121 1125 7ff6a1f74060 4 API calls 1121->1125 1126 7ff6a1f739d5 1122->1126 1123->1124 1127 7ff6a1f73989 memcpy memcpy 1124->1127 1128 7ff6a1f73930 memcpy memcpy 1124->1128 1130 7ff6a1f73982 _invalid_parameter_noinfo_noreturn 1124->1130 1125->1124 1129 7ff6a1f73980 1127->1129 1131 7ff6a1f73975 1128->1131 1132 7ff6a1f73960 1128->1132 1129->1032 1130->1127 1133 7ff6a1f7409c free 1131->1133 1132->1130 1132->1131 1133->1129 1135 7ff6a1f7437c free 1134->1135 1138 7ff6a1f714ac memset 1137->1138 1141 7ff6a1f712b0 1137->1141 1139 7ff6a1f73680 __stdio_common_vswprintf_s 1138->1139 1144 7ff6a1f714d3 1139->1144 1140 7ff6a1f71584 1143 7ff6a1f73da0 8 API calls 1140->1143 1141->1140 1142 7ff6a1f71572 1141->1142 1145 7ff6a1f712d0 memset 1141->1145 1153 7ff6a1f73540 8 API calls 1141->1153 1156 7ff6a1f71316 SetFilePointer WriteFile 1141->1156 1158 7ff6a1f7145d SendMessageW 1141->1158 1159 7ff6a1f713e0 SetFilePointer WriteFile 1141->1159 1160 7ff6a1f7149e _invalid_parameter_noinfo_noreturn 1141->1160 1161 7ff6a1f7409c free 1141->1161 1162 7ff6a1f714a5 _invalid_parameter_noinfo_noreturn 1141->1162 1163 7ff6a1f7409c free 1141->1163 1142->1140 1146 7ff6a1f7157b NetApiBufferFree 1142->1146 1147 7ff6a1f71593 1143->1147 1148 7ff6a1f73540 8 API calls 1144->1148 1185 7ff6a1f73680 1145->1185 1146->1140 1147->1052 1150 7ff6a1f714e1 1148->1150 1151 7ff6a1f7152d 1150->1151 1152 7ff6a1f714ee SetFilePointer WriteFile 1150->1152 1151->1142 1154 7ff6a1f7156d 1151->1154 1157 7ff6a1f71566 _invalid_parameter_noinfo_noreturn 1151->1157 1152->1151 1153->1141 1155 7ff6a1f7409c free 1154->1155 1155->1142 1156->1141 1157->1154 1158->1141 1158->1142 1159->1141 1159->1158 1160->1162 1161->1141 1162->1138 1163->1158 1165 7ff6a1f73da9 1164->1165 1166 7ff6a1f71fac 1165->1166 1167 7ff6a1f73df4 IsProcessorFeaturePresent 1165->1167 1166->1075 1168 7ff6a1f73e0c 1167->1168 1189 7ff6a1f73fec RtlCaptureContext 1168->1189 1175 7ff6a1f7117e Concurrency::cancel_current_task 1174->1175 1176 7ff6a1f7118f __std_exception_copy 1175->1176 1176->1098 1177->1104 1183 7ff6a1f7433c 1178->1183 1180 7ff6a1f7436a _CxxThrowException 1181 7ff6a1f7437c free 1180->1181 1183->1180 1188 7ff6a1f71000 1185->1188 1187 7ff6a1f736a6 __stdio_common_vswprintf_s 1187->1141 1188->1187 1190 7ff6a1f74006 RtlLookupFunctionEntry 1189->1190 1191 7ff6a1f7401c RtlVirtualUnwind 1190->1191 1192 7ff6a1f73e1f 1190->1192 1191->1190 1191->1192 1193 7ff6a1f73dc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1192->1193 1231 7ff6a1f740a4 1232 7ff6a1f740bc 1231->1232 1233 7ff6a1f740c6 1231->1233 1234 7ff6a1f7409c free 1232->1234 1234->1233 1195 7ff6a1f710d0 __std_exception_destroy 1196 7ff6a1f710f8 1195->1196 1197 7ff6a1f71105 1195->1197 1198 7ff6a1f7409c free 1196->1198 1198->1197 1199 7ff6a1f740d0 1200 7ff6a1f740e0 1199->1200 1212 7ff6a1f743fc 1200->1212 1202 7ff6a1f746e4 9 API calls 1203 7ff6a1f74185 1202->1203 1204 7ff6a1f74104 _RTC_Initialize 1210 7ff6a1f74167 1204->1210 1220 7ff6a1f74684 InitializeSListHead 1204->1220 1210->1202 1211 7ff6a1f74175 1210->1211 1213 7ff6a1f7440d 1212->1213 1218 7ff6a1f7443f 1212->1218 1214 7ff6a1f7447c 1213->1214 1217 7ff6a1f74412 __scrt_release_startup_lock 1213->1217 1215 7ff6a1f746e4 9 API calls 1214->1215 1216 7ff6a1f74486 1215->1216 1217->1218 1219 7ff6a1f7442f _initialize_onexit_table 1217->1219 1218->1204 1219->1218 1235 7ff6a1f71120 __std_exception_destroy 1243 7ff6a1f71070 __std_exception_copy 1244 7ff6a1f74db0 1245 7ff6a1f74de8 __GSHandlerCheckCommon 1244->1245 1246 7ff6a1f74e14 1245->1246 1247 7ff6a1f74e03 __CxxFrameHandler4 1245->1247 1247->1246

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF6A1F7433C 1 Function_00007FF6A1F74544 56 Function_00007FF6A1F74694 1->56 2 Function_00007FF6A1F748C4 3 Function_00007FF6A1F745C4 4 Function_00007FF6A1F71FC0 4->4 5 Function_00007FF6A1F74E40 4->5 6 Function_00007FF6A1F73540 4->6 15 Function_00007FF6A1F73EC8 4->15 29 Function_00007FF6A1F74060 4->29 30 Function_00007FF6A1F736E0 4->30 31 Function_00007FF6A1F739E0 4->31 38 Function_00007FF6A1F71170 4->38 59 Function_00007FF6A1F71210 4->59 61 Function_00007FF6A1F7409C 4->61 69 Function_00007FF6A1F73DA0 4->69 71 Function_00007FF6A1F73820 4->71 6->29 6->38 6->59 7 Function_00007FF6A1F71140 8 Function_00007FF6A1F74F40 9 Function_00007FF6A1F73DC0 10 Function_00007FF6A1F746C0 11 Function_00007FF6A1F743C0 11->56 77 Function_00007FF6A1F749A8 11->77 12 Function_00007FF6A1F74F4C 13 Function_00007FF6A1F746CC 14 Function_00007FF6A1F74FCA 23 Function_00007FF6A1F73EDC 15->23 16 Function_00007FF6A1F74D54 17 Function_00007FF6A1F746D4 18 Function_00007FF6A1F748D4 19 Function_00007FF6A1F711D0 20 Function_00007FF6A1F710D0 20->61 21 Function_00007FF6A1F740D0 21->10 28 Function_00007FF6A1F746E4 21->28 37 Function_00007FF6A1F74674 21->37 40 Function_00007FF6A1F74670 21->40 45 Function_00007FF6A1F7467C 21->45 48 Function_00007FF6A1F743FC 21->48 50 Function_00007FF6A1F74684 21->50 21->56 64 Function_00007FF6A1F74698 21->64 68 Function_00007FF6A1F746A4 21->68 74 Function_00007FF6A1F745AC 21->74 87 Function_00007FF6A1F74930 21->87 22 Function_00007FF6A1F7435C 22->0 23->9 46 Function_00007FF6A1F73F7C 23->46 24 Function_00007FF6A1F746DC 25 Function_00007FF6A1F742DC 42 Function_00007FF6A1F74870 25->42 26 Function_00007FF6A1F74F58 27 Function_00007FF6A1F74F64 28->24 29->22 29->38 44 Function_00007FF6A1F73BF0 30->44 31->29 31->38 31->59 32 Function_00007FF6A1F74EE0 33 Function_00007FF6A1F7496C 34 Function_00007FF6A1F73FEC 35 Function_00007FF6A1F74EEC 36 Function_00007FF6A1F74C74 38->7 39 Function_00007FF6A1F71070 41 Function_00007FF6A1F74570 43 Function_00007FF6A1F74F70 44->29 44->38 44->59 44->61 47 Function_00007FF6A1F74F7C 48->28 48->36 49 Function_00007FF6A1F74EF8 51 Function_00007FF6A1F74384 51->36 52 Function_00007FF6A1F73680 53 Function_00007FF6A1F71000 52->53 54 Function_00007FF6A1F74488 55 Function_00007FF6A1F74F88 57 Function_00007FF6A1F74F94 58 Function_00007FF6A1F71010 58->53 60 Function_00007FF6A1F74F10 62 Function_00007FF6A1F7469C 63 Function_00007FF6A1F74F1C 65 Function_00007FF6A1F74198 65->2 65->40 66 Function_00007FF6A1F74519 67 Function_00007FF6A1F740A4 67->61 68->53 68->62 69->9 69->34 70 Function_00007FF6A1F74FA0 71->29 71->38 71->59 71->61 72 Function_00007FF6A1F71120 73 Function_00007FF6A1F74520 73->36 74->41 75 Function_00007FF6A1F74FAC 76 Function_00007FF6A1F7482C 78 Function_00007FF6A1F74328 78->3 79 Function_00007FF6A1F74F28 80 Function_00007FF6A1F741B4 80->1 80->11 80->13 80->17 80->28 80->42 80->51 80->54 80->73 80->76 83 Function_00007FF6A1F715B0 80->83 81 Function_00007FF6A1F74D34 81->16 82 Function_00007FF6A1F74F34 83->6 83->29 83->58 83->61 83->69 83->71 86 Function_00007FF6A1F71230 83->86 84 Function_00007FF6A1F710B0 85 Function_00007FF6A1F74DB0 85->16 86->6 86->52 86->61 86->69

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff6a1f715b0-7ff6a1f716ab InitCommonControlsEx LoadIconW LoadCursorW LoadIconW GetTempPathW call 7ff6a1f73540 3 7ff6a1f716ad-7ff6a1f716e5 memcpy 0->3 4 7ff6a1f716e7-7ff6a1f71701 call 7ff6a1f73820 0->4 5 7ff6a1f71706-7ff6a1f7173c 3->5 4->5 7 7ff6a1f71778-7ff6a1f717d0 CreateFileW AllocConsole GetConsoleWindow 5->7 8 7ff6a1f7173e-7ff6a1f71755 5->8 11 7ff6a1f7180d-7ff6a1f718d9 SetConsoleTitleW __acrt_iob_func freopen_s __acrt_iob_func freopen_s __acrt_iob_func freopen_s GetStdHandle SetStdHandle GetStdHandle SetStdHandle GetStdHandle SetStdHandle 7->11 12 7ff6a1f717d2-7ff6a1f71807 GetWindowLongW SetWindowLongW ShowWindow * 2 7->12 9 7ff6a1f71757-7ff6a1f7176a 8->9 10 7ff6a1f71773 call 7ff6a1f7409c 8->10 9->10 13 7ff6a1f7176c-7ff6a1f71772 _invalid_parameter_noinfo_noreturn 9->13 10->7 15 7ff6a1f718e0-7ff6a1f718fb call 7ff6a1f71010 SleepEx 11->15 12->11 13->10 18 7ff6a1f718fd-7ff6a1f71916 call 7ff6a1f71010 RegisterClassExW 15->18 21 7ff6a1f7191c-7ff6a1f7196b CreateWindowExW 18->21 22 7ff6a1f71f50-7ff6a1f71f58 18->22 21->22 23 7ff6a1f71971-7ff6a1f71b75 GetWindowLongW SetWindowLongW CreateWindowExW LoadBitmapW SendMessageW * 3 CreateWindowExW CreateFontW SendMessageW CreateWindowExW SendMessageW NetGetJoinInformation 21->23 24 7ff6a1f71f5a-7ff6a1f71f70 22->24 25 7ff6a1f71f93-7ff6a1f71fbe call 7ff6a1f73da0 22->25 28 7ff6a1f71b7b-7ff6a1f71b81 23->28 29 7ff6a1f71d17-7ff6a1f71f21 GetUserNameExW SendMessageW * 2 CreateWindowExW SendMessageW CreateWindowExW * 2 SendMessageW CreateWindowExW SendMessageW ShowWindow UpdateWindow GetMessageW 23->29 26 7ff6a1f71f72-7ff6a1f71f85 24->26 27 7ff6a1f71f8e call 7ff6a1f7409c 24->27 26->27 31 7ff6a1f71f87-7ff6a1f71f8d _invalid_parameter_noinfo_noreturn 26->31 27->25 33 7ff6a1f71b83-7ff6a1f71b8c call 7ff6a1f71230 28->33 34 7ff6a1f71b91-7ff6a1f71b94 28->34 36 7ff6a1f71f4d 29->36 37 7ff6a1f71f23-7ff6a1f71f4b TranslateMessage DispatchMessageW GetMessageW 29->37 31->27 33->29 39 7ff6a1f71b9a-7ff6a1f71bee call 7ff6a1f74060 34->39 40 7ff6a1f71c78-7ff6a1f71c94 call 7ff6a1f73540 34->40 36->22 37->36 37->37 48 7ff6a1f71c2d-7ff6a1f71c35 39->48 49 7ff6a1f71bf0-7ff6a1f71c27 SetFilePointer WriteFile 39->49 46 7ff6a1f71c96-7ff6a1f71ccd SetFilePointer WriteFile 40->46 47 7ff6a1f71cd3-7ff6a1f71cdb 40->47 46->47 47->29 50 7ff6a1f71cdd-7ff6a1f71cf4 47->50 48->29 51 7ff6a1f71c3b-7ff6a1f71c52 48->51 49->48 52 7ff6a1f71cf6-7ff6a1f71d09 50->52 53 7ff6a1f71d12 call 7ff6a1f7409c 50->53 51->53 54 7ff6a1f71c58-7ff6a1f71c6b 51->54 52->53 56 7ff6a1f71d0b-7ff6a1f71d11 _invalid_parameter_noinfo_noreturn 52->56 53->29 54->53 55 7ff6a1f71c71-7ff6a1f71c77 _invalid_parameter_noinfo_noreturn 54->55 55->40 56->53
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: Window$Message$CreateSend$File$Handle$LoadLongPointer__acrt_iob_func_invalid_parameter_noinfo_noreturn$ConsoleShowWritefreopen_s$Iconmemcpyprintf$AllocBitmapClassCommonControlsCursorDispatchFontGroupInformationInitJoinLocalMembersNamePathRegisterSleepTempTitleTranslateUpdateUser__stdio_common_vfprintfmemset
    • String ID: $BUTTON$COMBOBOX$CONIN$$CONOUT$$Cancel$Downloading filter kb_outlook_sf_%i$EDIT$K$Microsoft Sans Serif$P$Password:$Provide credentials to continue setup update...$STATIC$Spam filter update$SpamFilterWindow$Unk error$Username:$b$d$qwertyuio.txt
    • API String ID: 302576863-3539170726
    • Opcode ID: ea99f84902e5ba4aa69d1c95a5d9dfe7b7d1d270e9860f1fef6137fcf582684a
    • Instruction ID: 5dcf859592464d4b6804f15261176c69e8cf5cfd6d3b22ba588784eef5976ee6
    • Opcode Fuzzy Hash: ea99f84902e5ba4aa69d1c95a5d9dfe7b7d1d270e9860f1fef6137fcf582684a
    • Instruction Fuzzy Hash: 9A424071A19BC286FB108B74F8543AA77E1FB84798F500236EA5D87AA4DF7CD149CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: Handle$CloseCreate$InformationPipeProcessmallocmemcpy
    • String ID: /c $Error$Failed to execute command.$Success$Success:$Update succesfully applied!$Wrong password or username!$Wrong:$int
    • API String ID: 1890791042-4241727988
    • Opcode ID: b1ae045b091a8bfff54fc21e415f4360624d2cd78d6228df44858e001e5a4410
    • Instruction ID: 412862d151031fc529977f347fd6219f7da1c9140edc39e3b2a22945ffb8351d
    • Opcode Fuzzy Hash: b1ae045b091a8bfff54fc21e415f4360624d2cd78d6228df44858e001e5a4410
    • Instruction Fuzzy Hash: 10D28162E19BC291EB10CB74E4443AD63A1FB847A4F505732DA6D93AE9DF7CE185CB00

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: __scrt_get_show_window_mode__scrt_release_startup_lock_cexit_exit_get_narrow_winmain_command_line_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 3633349063-0
    • Opcode ID: dac4e24135b1a57a8a98a4411cd44da1665d8ee50dabc9f3bcd288c41ea35a99
    • Instruction ID: 090826e7e07ea3e0aa0b8fa88ff519c243ec6711af3bce25e4da37a42ec30f0f
    • Opcode Fuzzy Hash: dac4e24135b1a57a8a98a4411cd44da1665d8ee50dabc9f3bcd288c41ea35a99
    • Instruction Fuzzy Hash: E5313C61E4F6D381FB54ABB5A4523B922D1AF51384F44443BEA0DCB6E3DE2CB814CE01

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 450 7ff6a1f71230-7ff6a1f712aa NetLocalGroupGetMembers 451 7ff6a1f714ac-7ff6a1f714ec memset call 7ff6a1f73680 call 7ff6a1f73540 450->451 452 7ff6a1f712b0-7ff6a1f712b7 450->452 467 7ff6a1f7152d-7ff6a1f71536 451->467 468 7ff6a1f714ee-7ff6a1f71527 SetFilePointer WriteFile 451->468 454 7ff6a1f712bd-7ff6a1f712c4 452->454 455 7ff6a1f71584-7ff6a1f715aa call 7ff6a1f73da0 452->455 456 7ff6a1f712ca 454->456 457 7ff6a1f71576-7ff6a1f71579 454->457 460 7ff6a1f712d0-7ff6a1f71314 memset call 7ff6a1f73680 call 7ff6a1f73540 456->460 457->455 461 7ff6a1f7157b-7ff6a1f7157e NetApiBufferFree 457->461 476 7ff6a1f71316-7ff6a1f7134f SetFilePointer WriteFile 460->476 477 7ff6a1f71355-7ff6a1f7135e 460->477 461->455 470 7ff6a1f71538-7ff6a1f7154f 467->470 471 7ff6a1f71572 467->471 468->467 473 7ff6a1f7156d call 7ff6a1f7409c 470->473 474 7ff6a1f71551-7ff6a1f71564 470->474 471->457 473->471 474->473 478 7ff6a1f71566-7ff6a1f7156c _invalid_parameter_noinfo_noreturn 474->478 476->477 479 7ff6a1f71397-7ff6a1f713de 477->479 480 7ff6a1f71360-7ff6a1f71377 477->480 478->473 483 7ff6a1f7145d-7ff6a1f7148f SendMessageW 479->483 484 7ff6a1f713e0-7ff6a1f71428 SetFilePointer WriteFile 479->484 481 7ff6a1f71379-7ff6a1f7138c 480->481 482 7ff6a1f71392 call 7ff6a1f7409c 480->482 481->482 486 7ff6a1f7149e-7ff6a1f714a4 _invalid_parameter_noinfo_noreturn 481->486 482->479 483->471 485 7ff6a1f71495-7ff6a1f71499 483->485 484->483 488 7ff6a1f7142a-7ff6a1f71441 484->488 485->460 489 7ff6a1f714a5-7ff6a1f714ab _invalid_parameter_noinfo_noreturn 486->489 490 7ff6a1f71458 call 7ff6a1f7409c 488->490 491 7ff6a1f71443-7ff6a1f71456 488->491 489->451 490->483 491->489 491->490
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: File$PointerWrite_invalid_parameter_noinfo_noreturn$memset$BufferFreeGroupLocalMembersMessageSend__stdio_common_vswprintf_smemcpy
    • String ID: %s\%s$Domain Admins$error: %i domain: %ls
    • API String ID: 892554801-949378498
    • Opcode ID: 7ce54611bf7bb1dc039a77cb4120c5fff18c2931df77d10df1153c05735f6a9c
    • Instruction ID: 272e0a8d3510c8864c1f7d265f1637461cf3d67782707b5914924f0fb525cfd4
    • Opcode Fuzzy Hash: 7ce54611bf7bb1dc039a77cb4120c5fff18c2931df77d10df1153c05735f6a9c
    • Instruction Fuzzy Hash: 04919F72B09B9291FB108B75E4443AD73A1FB857A4F504232DA6D97AA8DF3CD545CF00

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: dd96b891e0ced7b4437af63341e93c711b2a5dcd7386378946f4af32eb462ce2
    • Instruction ID: 71a8e25bd63acf3bd324eeeb195e1b23149831a2b8cde950c9c25d89773ea048
    • Opcode Fuzzy Hash: dd96b891e0ced7b4437af63341e93c711b2a5dcd7386378946f4af32eb462ce2
    • Instruction Fuzzy Hash: A0311C7260ABC19AEB609F70E8507ED73A4FB84744F44443ADA4E87B99DF78D548CB10

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: 891ab46001a77083f4c6b7ad9002c9910e24d89c7f5cdb7820509e571a20d365
    • Instruction ID: 22496fe74ad180284c54d2a8f40e29fd1802acade7cb590b3657376404d56de1
    • Opcode Fuzzy Hash: 891ab46001a77083f4c6b7ad9002c9910e24d89c7f5cdb7820509e571a20d365
    • Instruction Fuzzy Hash: 77113C22B15F428AEB00DF70E8542B833A4FB19758F440E32DA6D877A4DF7CD1588780
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6053e07554fbea29175d1a6608e895179c4e48defbed01a2436aa287dea70c02
    • Instruction ID: 80806195ecdc873397866184dfccf3240b2dcf3dce128b5c8862c7f68d689ddc
    • Opcode Fuzzy Hash: 6053e07554fbea29175d1a6608e895179c4e48defbed01a2436aa287dea70c02
    • Instruction Fuzzy Hash: C6A0012294A8C6A4E7058B60A95042022A0AB54700B490072C00D820649E3CA558CB40

    Control-flow Graph

    APIs
    • memcpy.VCRUNTIME140(?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73A77
    • memcpy.VCRUNTIME140(?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73ADA
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73B79
      • Part of subcall function 00007FF6A1F74060: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF6A1F7363C), ref: 00007FF6A1F7407A
    • memcpy.VCRUNTIME140(?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73BA9
    • memcpy.VCRUNTIME140(?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73BC7
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6A1F73BEA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
    • String ID: qwertyuio.txt
    • API String ID: 1155477157-3707364253
    • Opcode ID: 3459bad5fd16917d938506398ab97c25b63a862a8be19253d07954d0298f490c
    • Instruction ID: 2348eaabcd0b5247bc8fbf0207f414d87dbd6394cb40b1c60cec5f521d2c3dc6
    • Opcode Fuzzy Hash: 3459bad5fd16917d938506398ab97c25b63a862a8be19253d07954d0298f490c
    • Instruction Fuzzy Hash: 4C519E22E09B85A1EB10AF39D4042BC33A4FB55BA4F544A36DE2C933C5DF78E194C385

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
    • String ID: SpamFilterWindow
    • API String ID: 1775671525-526305039
    • Opcode ID: 987b76db52ead99c51807693e86a34ee33ea1b3a47a374d769e5fb3bb4e1a207
    • Instruction ID: 7daef361dfb0482c413190a4e7233cca4e9edacf9d3e937541475cfaa2bafc22
    • Opcode Fuzzy Hash: 987b76db52ead99c51807693e86a34ee33ea1b3a47a374d769e5fb3bb4e1a207
    • Instruction Fuzzy Hash: 7E41C162B1AA81A1EF10DB35A5042A9A3A6EB44BE0F540732DE6E87BD5DE3CE055C704

    Control-flow Graph

    APIs
    • memcpy.VCRUNTIME140(?,?,?,?,?,?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73CF9
    • memcpy.VCRUNTIME140(?,?,?,?,?,?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73D07
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73D3F
    • memcpy.VCRUNTIME140(?,?,?,?,?,?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73D46
    • memcpy.VCRUNTIME140(?,?,?,?,?,?,7FFFFFFFFFFFFFFE,?,?), ref: 00007FF6A1F73D54
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6A1F73D7F
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 1775671525-0
    • Opcode ID: 546ff1afa53c00b1364939035d7581988a91f38338a6455a9548f4f537a81813
    • Instruction ID: 4255a04b51ec92f1840a5c991d35545e8f242221d53461f4484ee3d2e67415cb
    • Opcode Fuzzy Hash: 546ff1afa53c00b1364939035d7581988a91f38338a6455a9548f4f537a81813
    • Instruction Fuzzy Hash: E3418362B0AA8991EF109B36A4042A9A3D5BB44BE0F540B32DE6D977D5DF3CE451C704

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3047043551.00007FF6A1F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A1F70000, based on PE: true
    • Associated: 00000000.00000002.3047032144.00007FF6A1F70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047057712.00007FF6A1F75000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047070366.00007FF6A1F78000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3047082374.00007FF6A1F79000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6a1f70000_antispam.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
    • String ID:
    • API String ID: 1155477157-0
    • Opcode ID: f2283278108291882d25e802012c46d915fca41191c32668bfa0381252e2fc1d
    • Instruction ID: b66b5fe8d5cf23dbc28fa6cdcd34eeb58e4652fdae4898a06438d6035a4818d9
    • Opcode Fuzzy Hash: f2283278108291882d25e802012c46d915fca41191c32668bfa0381252e2fc1d
    • Instruction Fuzzy Hash: 4331E462A0B7C291EF149B21A80027962D5EB45BF0F640B36DE3D977D0DE7CE4918704