Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
m8ufsTLLOU.exe

Overview

General Information

Sample name:m8ufsTLLOU.exe
renamed because original name is a hash value
Original sample name:a94bc986375eba0f2b06f3729a2fd7d6.exe
Analysis ID:1538172
MD5:a94bc986375eba0f2b06f3729a2fd7d6
SHA1:671fca5809281dd3d7f7d5feb834dbfb89815a85
SHA256:d377fa4fdb43913ef01b5b09bec79760416a7d4dfe472ab52b65d2e95af10c98
Tags:32exetrojan
Infos:

Detection

Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Creates a process in suspended mode (likely to inject code)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • m8ufsTLLOU.exe (PID: 6812 cmdline: "C:\Users\user\Desktop\m8ufsTLLOU.exe" MD5: A94BC986375EBA0F2B06F3729A2FD7D6)
    • cmd.exe (PID: 1352 cmdline: cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"Type": "Shell Reverse Tcp", "IP": "188.166.177.132", "Port": 443}
SourceRuleDescriptionAuthorStrings
m8ufsTLLOU.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1653761887.0000000000500000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      00000000.00000002.1653761887.0000000000500000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_a6e956c9Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x21:$a1: 60 89 E5 31 C0 64 8B 50 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61 7C 02 2C 20
      SourceRuleDescriptionAuthorStrings
      0.0.m8ufsTLLOU.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
        0.2.m8ufsTLLOU.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: m8ufsTLLOU.exeAvira: detected
          Source: 00000000.00000002.1653761887.0000000000500000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Type": "Shell Reverse Tcp", "IP": "188.166.177.132", "Port": 443}
          Source: m8ufsTLLOU.exeReversingLabs: Detection: 84%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
          Source: m8ufsTLLOU.exeJoe Sandbox ML: detected
          Source: m8ufsTLLOU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: m8ufsTLLOU.exe
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 4x nop then sti 0_2_004048F9
          Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
          Source: unknownTCP traffic detected without corresponding DNS query: 188.166.177.132
          Source: unknownTCP traffic detected without corresponding DNS query: 188.166.177.132
          Source: unknownTCP traffic detected without corresponding DNS query: 188.166.177.132
          Source: unknownTCP traffic detected without corresponding DNS query: 188.166.177.132
          Source: m8ufsTLLOU.exeString found in binary or memory: http://www.apache.org/
          Source: m8ufsTLLOU.exeString found in binary or memory: http://www.apache.org/licenses/LICEN
          Source: m8ufsTLLOU.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: m8ufsTLLOU.exeString found in binary or memory: http://www.zeustech.net/
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443

          System Summary

          barindex
          Source: 00000000.00000002.1653761887.0000000000500000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
          Source: m8ufsTLLOU.exe, 00000000.00000000.1652085355.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs m8ufsTLLOU.exe
          Source: m8ufsTLLOU.exeBinary or memory string: OriginalFilenameab.exeF vs m8ufsTLLOU.exe
          Source: m8ufsTLLOU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 00000000.00000002.1653761887.0000000000500000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
          Source: m8ufsTLLOU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal96.troj.winEXE@4/0@0/1
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5924:120:WilError_03
          Source: m8ufsTLLOU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: m8ufsTLLOU.exeReversingLabs: Detection: 84%
          Source: unknownProcess created: C:\Users\user\Desktop\m8ufsTLLOU.exe "C:\Users\user\Desktop\m8ufsTLLOU.exe"
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmdJump to behavior
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
          Source: m8ufsTLLOU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: m8ufsTLLOU.exe
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_004060E5 push ebp; retn 0008h0_2_004061F2
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_0040809E push ss; ret 0_2_0040809F
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_004080BF push edx; ret 0_2_004080CA
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_00402D51 push ebp; retf 0_2_00402D5B
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_0040617D push ebp; retn 0008h0_2_004061F2
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_0040758D push ebp; iretd 0_2_00407626
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_00406197 push ebp; retn 0008h0_2_004061F2
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_00409340 push ebx; ret 0_2_004092E7
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_00409340 push esi; iretd 0_2_00409412
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_00401B5B push ss; ret 0_2_00401B67
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_00404764 push eax; ret 0_2_00404777
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeCode function: 0_2_00405BCC push edx; retn 0073h0_2_00405BD3
          Source: m8ufsTLLOU.exeStatic PE information: section name: .text entropy: 7.0313797670833535
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: m8ufsTLLOU.exe, 00000000.00000002.1653853497.000000000070E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\m8ufsTLLOU.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmdJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000000.00000002.1653761887.0000000000500000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: m8ufsTLLOU.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.m8ufsTLLOU.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.m8ufsTLLOU.exe.400000.0.unpack, type: UNPACKEDPE
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          11
          Process Injection
          2
          Software Packing
          OS Credential Dumping1
          Security Software Discovery
          Remote ServicesData from Local System2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          11
          Process Injection
          LSASS Memory1
          System Information Discovery
          Remote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          DLL Side-Loading
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
          Obfuscated Files or Information
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          m8ufsTLLOU.exe84%ReversingLabsWin32.Trojan.CryptZMarte
          m8ufsTLLOU.exe100%AviraTR/Patched.Gen2
          m8ufsTLLOU.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0m8ufsTLLOU.exefalse
            unknown
            http://www.apache.org/licenses/LICENm8ufsTLLOU.exefalse
              unknown
              http://www.apache.org/m8ufsTLLOU.exefalse
                unknown
                http://www.zeustech.net/m8ufsTLLOU.exefalse
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  188.166.177.132
                  unknownNetherlands
                  14061DIGITALOCEAN-ASNUStrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1538172
                  Start date and time:2024-10-20 18:01:10 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 1m 41s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:3
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:m8ufsTLLOU.exe
                  renamed because original name is a hash value
                  Original Sample Name:a94bc986375eba0f2b06f3729a2fd7d6.exe
                  Detection:MAL
                  Classification:mal96.troj.winEXE@4/0@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 2
                  • Number of non-executed functions: 9
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Stop behavior analysis, all processes terminated
                  • Not all processes where analyzed, report is missing behavior information
                  • VT rate limit hit for: m8ufsTLLOU.exe
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  188.166.177.132VInxSo1xrN.exeGet hashmaliciousMetasploitBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    DIGITALOCEAN-ASNUSVInxSo1xrN.exeGet hashmaliciousMetasploitBrowse
                    • 188.166.177.132
                    bin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 138.197.177.4
                    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                    • 142.93.208.241
                    Setup.exeGet hashmaliciousLummaCBrowse
                    • 104.131.68.180
                    SecuriteInfo.com.Win32.TrojanX-gen.27480.13449.exeGet hashmaliciousUnknownBrowse
                    • 159.89.214.31
                    la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                    • 165.227.165.202
                    la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                    • 174.138.36.13
                    la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                    • 198.199.83.188
                    la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                    • 162.243.19.47
                    la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                    • 103.253.147.242
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.331771244967971
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:m8ufsTLLOU.exe
                    File size:73'802 bytes
                    MD5:a94bc986375eba0f2b06f3729a2fd7d6
                    SHA1:671fca5809281dd3d7f7d5feb834dbfb89815a85
                    SHA256:d377fa4fdb43913ef01b5b09bec79760416a7d4dfe472ab52b65d2e95af10c98
                    SHA512:0d4e71839476f456d04bc09e52b39a130f96895a24c1e7fd32be89afb7989e35331da1c83469b5bef8e20fd4e09764b4006487d4b7c50ba1304d795bb14bc931
                    SSDEEP:1536:IAjswZVy6cdzdzuY8S31NdGadtY7CMb+KR0Nc8QsJq39:pjsw1k8KG0Y7Ce0Nc8QsC9
                    TLSH:3773BF43E9C42431D1A2127D277536BAAA75F5F63611C19A398CCEF5DBC1CF0A2293C6
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L....c.J...........
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x4011a3
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:
                    Time Stamp:0x4AA5630C [Mon Sep 7 19:46:20 2009 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:481f47bbb2c9c21e108d65f52b04c448
                    Instruction
                    inc eax
                    stc
                    std
                    inc eax
                    salc
                    inc ebx
                    cdq
                    wait
                    cld
                    dec edx
                    cdq
                    nop
                    aaa
                    aaa
                    dec ebx
                    cld
                    dec eax
                    cwde
                    daa
                    xchg eax, ebx
                    daa
                    das
                    nop
                    aas
                    dec eax
                    inc eax
                    wait
                    cmc
                    xchg eax, ebx
                    inc edx
                    stc
                    cmc
                    wait
                    nop
                    inc edx
                    dec ecx
                    daa
                    cld
                    dec ecx
                    std
                    dec eax
                    stc
                    daa
                    lahf
                    clc
                    dec ebx
                    xchg eax, edx
                    xchg eax, ecx
                    inc ebx
                    salc
                    inc edx
                    cmc
                    std
                    wait
                    xchg eax, edx
                    xchg eax, ecx
                    lahf
                    cld
                    inc eax
                    stc
                    inc eax
                    std
                    xchg eax, ecx
                    dec edx
                    wait
                    cdq
                    inc ebx
                    cdq
                    inc edx
                    std
                    clc
                    lahf
                    lahf
                    xchg eax, ebx
                    dec edx
                    nop
                    xchg eax, ebx
                    stc
                    wait
                    dec ebx
                    salc
                    wait
                    xchg eax, ebx
                    cld
                    cld
                    cmc
                    inc ecx
                    xchg eax, ecx
                    cwde
                    std
                    std
                    nop
                    aaa
                    wait
                    daa
                    dec edx
                    xchg eax, ebx
                    cdq
                    xchg eax, ebx
                    aas
                    inc edx
                    lahf
                    aas
                    aaa
                    xchg eax, ebx
                    daa
                    stc
                    dec edx
                    lahf
                    inc ebx
                    dec eax
                    xchg eax, ecx
                    aas
                    xchg eax, ebx
                    aas
                    inc edx
                    cdq
                    xchg eax, ecx
                    cld
                    aaa
                    xchg eax, ebx
                    dec ecx
                    wait
                    nop
                    aas
                    salc
                    dec ebx
                    aaa
                    xchg eax, edx
                    inc ecx
                    stc
                    das
                    nop
                    dec ecx
                    nop
                    aas
                    salc
                    cdq
                    inc eax
                    cmc
                    wait
                    wait
                    aas
                    inc ecx
                    dec eax
                    cmc
                    xchg eax, edx
                    cmc
                    stc
                    dec ecx
                    cmc
                    jmp 00007FA17CCD29D3h
                    pop ds
                    push ecx
                    jmp far fword ptr [ebp+6Ch]
                    rol dword ptr [eax+00h], FFFFFFA3h
                    movsd
                    add al, ah
                    add bh, al
                    add eax, 0040D010h
                    push eax
                    ret
                    add byte ptr [eax], al
                    jmp 00007FA17D53279Dh
                    xchg eax, esp
                    inc ebp
                    push edx
                    mov edx, 00413840h
                    lahf
                    ror byte ptr [edx-7E8D77F8h], 1
                    Programming Language:
                    • [EXP] VC++ 6.0 SP5 build 8804
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xa9660xb000dda628ade71c4d1ad292dafa212a2151False0.8198686079545454data7.0313797670833535IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
                    DLLImport
                    MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                    KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                    ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                    WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                    WS2_32.dllWSARecv, WSASend
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 20, 2024 18:02:00.224315882 CEST49730443192.168.2.4188.166.177.132
                    Oct 20, 2024 18:02:00.224426985 CEST44349730188.166.177.132192.168.2.4
                    Oct 20, 2024 18:02:00.224534988 CEST49730443192.168.2.4188.166.177.132
                    Oct 20, 2024 18:02:00.323576927 CEST49730443192.168.2.4188.166.177.132
                    Oct 20, 2024 18:02:00.323626041 CEST44349730188.166.177.132192.168.2.4
                    Oct 20, 2024 18:02:00.323688030 CEST44349730188.166.177.132192.168.2.4
                    Oct 20, 2024 18:02:00.323699951 CEST49730443192.168.2.4188.166.177.132
                    Oct 20, 2024 18:02:00.323729038 CEST44349730188.166.177.132192.168.2.4

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:12:01:59
                    Start date:20/10/2024
                    Path:C:\Users\user\Desktop\m8ufsTLLOU.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\m8ufsTLLOU.exe"
                    Imagebase:0x400000
                    File size:73'802 bytes
                    MD5 hash:A94BC986375EBA0F2B06F3729A2FD7D6
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1653761887.0000000000500000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_a6e956c9, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.1653761887.0000000000500000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:12:01:59
                    Start date:20/10/2024
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd
                    Imagebase:0x240000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:12:01:59
                    Start date:20/10/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:1%
                      Dynamic/Decrypted Code Coverage:13.8%
                      Signature Coverage:0%
                      Total number of Nodes:58
                      Total number of Limit Nodes:2
                      execution_graph 3623 408ac0 WSASend 3624 408afe 3623->3624 3634 409340 3635 409342 3634->3635 3636 4092cd 3634->3636 3637 40936d _close SetStdHandle 3635->3637 3638 40930f 3635->3638 3639 4093d1 3637->3639 3640 4093f4 3639->3640 3641 4093e6 CloseHandle 3639->3641 3641->3640 3642 405f40 3643 405f54 TlsAlloc 3642->3643 3644 405f64 3643->3644 3644->3643 3645 405f68 3644->3645 3662 405fe3 3665 405772 3662->3665 3664 405ff2 3664->3664 3667 40575e 3665->3667 3667->3665 3668 4057c7 3667->3668 3669 40a46e DeleteCriticalSection 3667->3669 3668->3664 3669->3667 3607 406664 3608 40666a DuplicateHandle 3607->3608 3609 406686 3608->3609 3585 500000 3586 500010 3585->3586 3586->3586 3589 5000a3 3586->3589 3590 5000b6 WSASocketA 3589->3590 3592 5000e4 connect 3590->3592 3593 5000f3 3592->3593 3594 5000f8 CreateProcessA 3592->3594 3593->3592 3593->3594 3596 500140 ExitProcess 3594->3596 3650 401116 3651 401120 3650->3651 3652 4015a4 wcsncmp 3651->3652 3653 4015c1 3651->3653 3652->3653 3653->3653 3618 406619 socket 3619 406632 3618->3619 3620 406667 DuplicateHandle 3618->3620 3621 406686 3620->3621 3654 403dd9 3655 403df4 3654->3655 3656 403e3d printf 3655->3656 3657 403e4f 3655->3657 3656->3657 3603 40125b 3604 401265 3603->3604 3605 4015a4 wcsncmp 3604->3605 3606 4015c1 3604->3606 3605->3606 3629 4010bb 3630 401088 3629->3630 3631 4010c7 3629->3631 3632 4015a4 wcsncmp 3631->3632 3633 4015c1 3631->3633 3632->3633 3633->3633 3622 40683d connect 3598 401a5f 3599 401a63 3598->3599 3600 401b0b VirtualAlloc 3599->3600 3601 4017a9 3599->3601 3602 401b2c 3600->3602

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 5000a3-5000e2 WSASocketA 3 5000e4-5000f1 connect 0->3 4 5000f3-5000f6 3->4 5 5000ff-50010d 3->5 4->3 6 5000f8 4->6 7 50010e-50010f 5->7 6->5 7->7 8 500111-50014e CreateProcessA 7->8 11 500150-500153 8->11 12 50015a-50015f ExitProcess 8->12 11->12 13 500155 11->13 13->12
                      APIs
                      • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,?,?,5F327377,00003233), ref: 005000D3
                      • connect.WS2_32(6174A599,?,?,00000010,BB010002,84B1A6BC,00000005,?,?,5F327377,00003233), ref: 005000ED
                      • CreateProcessA.KERNELBASE(863FCC79,00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?,00000000,?,?,?,00646D63), ref: 00500130
                      • ExitProcess.KERNEL32(56A2B5F0,00000000,?,-00000001,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?,00000000), ref: 0050015D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653761887.0000000000500000.00000040.00001000.00020000.00000000.sdmp, Offset: 00500000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_500000_m8ufsTLLOU.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CreateExitSocketconnect
                      • String ID:
                      • API String ID: 3024456309-0
                      • Opcode ID: cfff8ca681b342b4c75668f473363d898dce70f725c7b5b7602ea4f0850e1a4a
                      • Instruction ID: d3b985b3755afd3ba2f773e01df79e2038182c2554406b7fd7a00ebbfccb4d74
                      • Opcode Fuzzy Hash: cfff8ca681b342b4c75668f473363d898dce70f725c7b5b7602ea4f0850e1a4a
                      • Instruction Fuzzy Hash: A411CEA06823697FE23122638C0BFBB3D5CEF47BA4F452011F9859A1D1D4929C00C1FA

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 14 401a5f-401a61 15 401a63-401a67 14->15 16 401aa5-401aa6 14->16 17 401a69-401a6d 15->17 18 401aae-401ab5 15->18 19 401ab6-401b19 VirtualAlloc 16->19 20 401a6e-401a92 17->20 18->19 28 401b2c-401b7d call 401c53 19->28 32 4017cf-4017e2 20->32 45 401b82-401be4 28->45 46 401b7d call 401c41 28->46 36 4017e4-401806 32->36 37 401807-40181b 32->37 36->37 37->32 47 40181d-401886 37->47 63 401c27-401c4e 45->63 64 401bea-401c0c 45->64 46->45 59 401a5a 47->59 60 40188c-4018a4 47->60 59->20 68 4018a5-4018b8 60->68 63->45 64->63 71 401c12-401c18 64->71 75 401a46-401a59 68->75 76 4018be-4018f4 68->76 71->63 75->59 83 4018f5-40193e 76->83 89 401944-401964 83->89 89->68 92 40196a-401a54 89->92 92->59
                      APIs
                      • VirtualAlloc.KERNELBASE(E553A458,00000000,0000015F,00001000,00000040), ref: 00401B14
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: fd5c1dee84791e53608ee4ee62bd37cec038920e4bb738962954d22993747b45
                      • Instruction ID: cd434b195584e9a42e123b8459aefc03c3af0885a4ba5d7ed152f3dd3f7b93c3
                      • Opcode Fuzzy Hash: fd5c1dee84791e53608ee4ee62bd37cec038920e4bb738962954d22993747b45
                      • Instruction Fuzzy Hash: 9E41E17774E101CBC718991188A0AB122ADA7AB351735B577C00B7B2F3E63C8943B64F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b2c2b50ee410f897b0f58f84d3da2a31096d6ff3d5654595e5b60d41829b6629
                      • Instruction ID: ed258a48166ff4f787b449bf7efc6ff928dc7efd1327f01e9866bfffd62b3b6b
                      • Opcode Fuzzy Hash: b2c2b50ee410f897b0f58f84d3da2a31096d6ff3d5654595e5b60d41829b6629
                      • Instruction Fuzzy Hash: FDC04C359582185A9744DE98D450464F7B4E666714F04E01A9D199B342D331D5128B88

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 115 4010bb-4010c5 116 4010c7-401526 115->116 117 401088-4010b2 115->117 121 40152c-401596 call 405850 116->121 122 401527 call 405b70 116->122 127 4015f7-401618 121->127 128 401598-4015bf wcsncmp 121->128 122->121 134 40161a-401632 call 404310 127->134 131 4015c1-4015c6 128->131 132 4015c8-4015ea 128->132 131->132 132->134 137 401672-401696 call 404e00 134->137 138 401634-40163a 134->138 138->137 140 40163c-40163d 138->140 142 401641-401662 140->142 142->142
                      APIs
                      Strings
                      • n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq, xrefs: 00401521
                      • f, xrefs: 004010A6
                      • %s: wrong number of arguments, xrefs: 00401555
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID: wcsncmp
                      • String ID: %s: wrong number of arguments$f$n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq
                      • API String ID: 2509195183-2164878838
                      • Opcode ID: 0ba253ff6a3d735a563eaab360e2925f79a61c6e607e6dd56adf0242396657a4
                      • Instruction ID: 26a858b66bc9a92d23d6882d5fca1cd68c77086590c59a64b97cfa5d0b6d9938
                      • Opcode Fuzzy Hash: 0ba253ff6a3d735a563eaab360e2925f79a61c6e607e6dd56adf0242396657a4
                      • Instruction Fuzzy Hash: 917147719482829FD706CFB48C964967FA0EE46314B1886EFD8C6EF2D3D2389947CB45

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 143 40125b-401264 144 401265-40126d 143->144 144->144 145 40126f-401596 call 405b70 call 405850 144->145 153 4015f7-401618 145->153 154 401598-4015bf wcsncmp 145->154 160 40161a-401632 call 404310 153->160 157 4015c1-4015c6 154->157 158 4015c8-4015ea 154->158 157->158 158->160 163 401672-401696 call 404e00 160->163 164 401634-40163a 160->164 164->163 166 40163c-40163d 164->166 168 401641-401662 166->168 168->168
                      APIs
                      Strings
                      • n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq, xrefs: 00401521
                      • @8A, xrefs: 0040125E
                      • %s: wrong number of arguments, xrefs: 00401555
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID: wcsncmp
                      • String ID: %s: wrong number of arguments$@8A$n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq
                      • API String ID: 2509195183-1207984875
                      • Opcode ID: e5c887a12490db37da2c690ade2f9c298e8cea240331115aa9d0ec6cf975e4e1
                      • Instruction ID: 1db3285900a9e52cabad41815b0a9f66ab7504e49dbb6783d16a0c47952cdcb0
                      • Opcode Fuzzy Hash: e5c887a12490db37da2c690ade2f9c298e8cea240331115aa9d0ec6cf975e4e1
                      • Instruction Fuzzy Hash: CE319170904281DFD711CBB4CC95956BF64EE4630471885BFE586EB2E3D239D443C749

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 169 4014d2-4014d5 170 4014d7-4014f6 169->170 171 40152c-401596 call 405850 169->171 172 4014f8-4014fb 170->172 173 4014fd-401527 call 405b70 170->173 180 4015f7-401618 171->180 181 401598-4015bf wcsncmp 171->181 172->173 173->171 187 40161a-401632 call 404310 180->187 184 4015c1-4015c6 181->184 185 4015c8-4015ea 181->185 184->185 185->187 190 401672-401696 call 404e00 187->190 191 401634-40163a 187->191 191->190 193 40163c-40163d 191->193 195 401641-401662 193->195 195->195
                      APIs
                      Strings
                      • n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq, xrefs: 00401521
                      • %s: wrong number of arguments, xrefs: 00401555
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID: wcsncmp
                      • String ID: %s: wrong number of arguments$n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq
                      • API String ID: 2509195183-315943389
                      • Opcode ID: 7c21344ba97934cac195b81437e2b034d2b67f71bcc8f592590eeeabd49c660c
                      • Instruction ID: a81ddea2be524d2313c2122f7c1fb6986d42d6a168625e9a9fb2eefe7c81d125
                      • Opcode Fuzzy Hash: 7c21344ba97934cac195b81437e2b034d2b67f71bcc8f592590eeeabd49c660c
                      • Instruction Fuzzy Hash: 6B417D709082859FDB15CBB0CC9599A7F74EB47304B1846BFD885EB3E3D2399846C749

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 196 401274-401596 call 405b70 call 405850 205 4015f7-401618 196->205 206 401598-4015bf wcsncmp 196->206 212 40161a-401632 call 404310 205->212 209 4015c1-4015c6 206->209 210 4015c8-4015ea 206->210 209->210 210->212 215 401672-401696 call 404e00 212->215 216 401634-40163a 212->216 216->215 218 40163c-40163d 216->218 220 401641-401662 218->220 220->220
                      APIs
                      Strings
                      • n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq, xrefs: 00401521
                      • %s: wrong number of arguments, xrefs: 00401555
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID: wcsncmp
                      • String ID: %s: wrong number of arguments$n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq
                      • API String ID: 2509195183-315943389
                      • Opcode ID: baf2ad41dcdb75046dfe829d69bdc4f42cba775552df8ba1c9cd0448bebd8911
                      • Instruction ID: d06d981c4cfe0bc27398167b9fbeae3ec2afab37e10340f0fac8e841db4ec205
                      • Opcode Fuzzy Hash: baf2ad41dcdb75046dfe829d69bdc4f42cba775552df8ba1c9cd0448bebd8911
                      • Instruction Fuzzy Hash: F2318C70904241EFD710CFA4CC9596A7FB4EB4630471886BFE586EB2E3D239D842CB59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 221 401508-40150b 222 40150d-40150e call 404310 221->222 223 40150f-401526 221->223 222->223 226 40152c-401596 call 405850 223->226 227 401527 call 405b70 223->227 232 4015f7-401618 226->232 233 401598-4015bf wcsncmp 226->233 227->226 239 40161a-401632 call 404310 232->239 236 4015c1-4015c6 233->236 237 4015c8-4015ea 233->237 236->237 237->239 242 401672-401696 call 404e00 239->242 243 401634-40163a 239->243 243->242 245 40163c-40163d 243->245 247 401641-401662 245->247 247->247
                      APIs
                      Strings
                      • n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq, xrefs: 00401521
                      • %s: wrong number of arguments, xrefs: 00401555
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID: wcsncmp
                      • String ID: %s: wrong number of arguments$n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq
                      • API String ID: 2509195183-315943389
                      • Opcode ID: 0bf62f420ae53468efda3827de06a49d8c1f09909205e95655d02357fcf1e6a0
                      • Instruction ID: 259c6eda59f25a8e3a97326c391b3f3097c8824ca98a3b72bb60c9d1db97ed1b
                      • Opcode Fuzzy Hash: 0bf62f420ae53468efda3827de06a49d8c1f09909205e95655d02357fcf1e6a0
                      • Instruction Fuzzy Hash: D03199719042819FDB04CFB48D9696A7B64EF4630471886BFE586EB2E3D239D842CB48

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 248 401479-401596 call 405b70 call 405850 256 4015f7-401618 248->256 257 401598-4015bf wcsncmp 248->257 263 40161a-401632 call 404310 256->263 260 4015c1-4015c6 257->260 261 4015c8-4015ea 257->261 260->261 261->263 266 401672-401696 call 404e00 263->266 267 401634-40163a 263->267 267->266 269 40163c-40163d 267->269 271 401641-401662 269->271 271->271
                      APIs
                      Strings
                      • n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq, xrefs: 00401521
                      • %s: wrong number of arguments, xrefs: 00401555
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID: wcsncmp
                      • String ID: %s: wrong number of arguments$n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq
                      • API String ID: 2509195183-315943389
                      • Opcode ID: 18443f90c329c7b012a9d2e1e704cacb882785177e1e10341e23bed2ce4fd3b4
                      • Instruction ID: 0daff1623111f59cd11218e7e38f22cb9769a203fcb9c5a765c787cacb6e6998
                      • Opcode Fuzzy Hash: 18443f90c329c7b012a9d2e1e704cacb882785177e1e10341e23bed2ce4fd3b4
                      • Instruction Fuzzy Hash: D8316E70908281DFD715CFA4CC9599A7FB4EF46304B1846BFE585AB3E3D2399842CB49

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 272 401116-401526 275 40152c-401596 call 405850 272->275 276 401527 call 405b70 272->276 281 4015f7-401618 275->281 282 401598-4015bf wcsncmp 275->282 276->275 288 40161a-401632 call 404310 281->288 285 4015c1-4015c6 282->285 286 4015c8-4015ea 282->286 285->286 286->288 291 401672-401696 call 404e00 288->291 292 401634-40163a 288->292 292->291 294 40163c-40163d 292->294 296 401641-401662 294->296 296->296
                      APIs
                      Strings
                      • n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq, xrefs: 00401521
                      • %s: wrong number of arguments, xrefs: 00401555
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID: wcsncmp
                      • String ID: %s: wrong number of arguments$n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq
                      • API String ID: 2509195183-315943389
                      • Opcode ID: 1e36580b47c22f19a3237878011a2a247687a0302d65aa52d5a6d1def5f74e29
                      • Instruction ID: ef3c3cb2277113b5e9b03611c6f54953749f46f0744119eb22ba0d47c6cd4abc
                      • Opcode Fuzzy Hash: 1e36580b47c22f19a3237878011a2a247687a0302d65aa52d5a6d1def5f74e29
                      • Instruction Fuzzy Hash: 32318D71908241DFDB14CFB0CD9596A7B64EB4630471846BFE546FB2E3D239D842CB48

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 297 4013dd-401526 299 40152c-401596 call 405850 297->299 300 401527 call 405b70 297->300 305 4015f7-401618 299->305 306 401598-4015bf wcsncmp 299->306 300->299 312 40161a-401632 call 404310 305->312 309 4015c1-4015c6 306->309 310 4015c8-4015ea 306->310 309->310 310->312 315 401672-401696 call 404e00 312->315 316 401634-40163a 312->316 316->315 318 40163c-40163d 316->318 320 401641-401662 318->320 320->320
                      APIs
                      Strings
                      • n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq, xrefs: 00401521
                      • %s: wrong number of arguments, xrefs: 00401555
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653699273.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1653685127.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653712707.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653724413.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1653738797.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_m8ufsTLLOU.jbxd
                      Similarity
                      • API ID: wcsncmp
                      • String ID: %s: wrong number of arguments$n:c:t:b:T:p:u:v:rkVhwix:y:z:C:H:P:A:g:X:de:Sq
                      • API String ID: 2509195183-315943389
                      • Opcode ID: 484fad41696e2d916350ad6ac1ffe037c0f1c3e8257ddffc7c633dc2f9b7ec57
                      • Instruction ID: d7e10ed3a08d878ddf331e7657613093cf115b8c1a00feff62b846a7a8cd8371
                      • Opcode Fuzzy Hash: 484fad41696e2d916350ad6ac1ffe037c0f1c3e8257ddffc7c633dc2f9b7ec57
                      • Instruction Fuzzy Hash: 9131AF709082819FD715CBB0CCD69667F64EB4630471886BFE586EB2E3D239D843CB49