Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eJeQNTcb4A.exe

Overview

General Information

Sample name:eJeQNTcb4A.exe
renamed because original name is a hash value
Original sample name:ef734216083e11283bcf66e631014748.exe
Analysis ID:1538173
MD5:ef734216083e11283bcf66e631014748
SHA1:31df8208dc92d0f31e4e56300f0fb673e5a55fa5
SHA256:f83382863ccd22a340325055ad63a04e7a9aab147dd8526a508a6f1cbc646b2b
Tags:32exetrojan
Infos:

Detection

Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Creates a process in suspended mode (likely to inject code)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • eJeQNTcb4A.exe (PID: 3556 cmdline: "C:\Users\user\Desktop\eJeQNTcb4A.exe" MD5: EF734216083E11283BCF66E631014748)
    • cmd.exe (PID: 6540 cmdline: cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"Type": "Shell Reverse Tcp", "IP": "188.166.177.132", "Port": 443}
SourceRuleDescriptionAuthorStrings
eJeQNTcb4A.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2016564869.0000000000590000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      00000000.00000002.2016564869.0000000000590000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_a6e956c9Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x21:$a1: 60 89 E5 31 C0 64 8B 50 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61 7C 02 2C 20
      SourceRuleDescriptionAuthorStrings
      0.2.eJeQNTcb4A.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
        0.0.eJeQNTcb4A.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: eJeQNTcb4A.exeAvira: detected
          Source: 00000000.00000002.2016564869.0000000000590000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Type": "Shell Reverse Tcp", "IP": "188.166.177.132", "Port": 443}
          Source: eJeQNTcb4A.exeReversingLabs: Detection: 84%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.7% probability
          Source: eJeQNTcb4A.exeJoe Sandbox ML: detected
          Source: eJeQNTcb4A.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: eJeQNTcb4A.exe
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 4x nop then mov dword ptr [eax+55F79090h], edx0_2_00404A4B
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 4x nop then enter 308Bh, 83h0_2_00404CD8
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 4x nop then push ebp0_2_00408680
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 4x nop then mov eax, dword ptr [A151EC8Bh]0_2_00404553
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 4x nop then push ebp0_2_00405F19
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 4x nop then xor eax, 90909090h0_2_004045E8
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 4x nop then push ebp0_2_00408780
          Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
          Source: unknownTCP traffic detected without corresponding DNS query: 188.166.177.132
          Source: unknownTCP traffic detected without corresponding DNS query: 188.166.177.132
          Source: unknownTCP traffic detected without corresponding DNS query: 188.166.177.132
          Source: eJeQNTcb4A.exeString found in binary or memory: http://www.apache.org/
          Source: eJeQNTcb4A.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: eJeQNTcb4A.exeString found in binary or memory: http://www.zeustech.net/
          Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

          System Summary

          barindex
          Source: 00000000.00000002.2016564869.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
          Source: eJeQNTcb4A.exe, 00000000.00000000.2013923668.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs eJeQNTcb4A.exe
          Source: eJeQNTcb4A.exeBinary or memory string: OriginalFilenameab.exeF vs eJeQNTcb4A.exe
          Source: eJeQNTcb4A.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 00000000.00000002.2016564869.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
          Source: eJeQNTcb4A.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal96.troj.winEXE@4/0@0/1
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6692:120:WilError_03
          Source: eJeQNTcb4A.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: eJeQNTcb4A.exeReversingLabs: Detection: 84%
          Source: unknownProcess created: C:\Users\user\Desktop\eJeQNTcb4A.exe "C:\Users\user\Desktop\eJeQNTcb4A.exe"
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmdJump to behavior
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
          Source: eJeQNTcb4A.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: eJeQNTcb4A.exe
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 0_2_00406810 push ebp; retf 0_2_00406811
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 0_2_00407495 push ebp; retf 0_2_00407496
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 0_2_004018A4 push eax; iretd 0_2_004018D0
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 0_2_0040B540 pushfd ; retn 0010h0_2_0040B637
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 0_2_00401321 push eax; ret 0_2_00401326
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeCode function: 0_2_0040B5B1 pushfd ; retn 0010h0_2_0040B637
          Source: eJeQNTcb4A.exeStatic PE information: section name: .text entropy: 7.030657884174903
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: eJeQNTcb4A.exe, 00000000.00000002.2016609062.000000000061E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\eJeQNTcb4A.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmdJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000000.00000002.2016564869.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: eJeQNTcb4A.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.eJeQNTcb4A.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.eJeQNTcb4A.exe.400000.0.unpack, type: UNPACKEDPE
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          11
          Process Injection
          2
          Software Packing
          OS Credential Dumping1
          Security Software Discovery
          Remote ServicesData from Local System2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          11
          Process Injection
          LSASS Memory1
          System Information Discovery
          Remote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          DLL Side-Loading
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
          Obfuscated Files or Information
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          eJeQNTcb4A.exe84%ReversingLabsWin32.Backdoor.Swrort
          eJeQNTcb4A.exe100%AviraTR/Patched.Gen2
          eJeQNTcb4A.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0eJeQNTcb4A.exefalse
            unknown
            http://www.apache.org/eJeQNTcb4A.exefalse
              unknown
              http://www.zeustech.net/eJeQNTcb4A.exefalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                188.166.177.132
                unknownNetherlands
                14061DIGITALOCEAN-ASNUStrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1538173
                Start date and time:2024-10-20 18:02:05 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 1m 46s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:4
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:eJeQNTcb4A.exe
                renamed because original name is a hash value
                Original Sample Name:ef734216083e11283bcf66e631014748.exe
                Detection:MAL
                Classification:mal96.troj.winEXE@4/0@0/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 2
                • Number of non-executed functions: 9
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Stop behavior analysis, all processes terminated
                • Exclude process from analysis (whitelisted): dllhost.exe
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: eJeQNTcb4A.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                188.166.177.132m8ufsTLLOU.exeGet hashmaliciousMetasploitBrowse
                  VInxSo1xrN.exeGet hashmaliciousMetasploitBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    DIGITALOCEAN-ASNUSm8ufsTLLOU.exeGet hashmaliciousMetasploitBrowse
                    • 188.166.177.132
                    VInxSo1xrN.exeGet hashmaliciousMetasploitBrowse
                    • 188.166.177.132
                    bin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 138.197.177.4
                    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                    • 142.93.208.241
                    Setup.exeGet hashmaliciousLummaCBrowse
                    • 104.131.68.180
                    SecuriteInfo.com.Win32.TrojanX-gen.27480.13449.exeGet hashmaliciousUnknownBrowse
                    • 159.89.214.31
                    la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                    • 165.227.165.202
                    la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                    • 174.138.36.13
                    la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                    • 198.199.83.188
                    la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                    • 162.243.19.47
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.331020288570554
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:eJeQNTcb4A.exe
                    File size:73'802 bytes
                    MD5:ef734216083e11283bcf66e631014748
                    SHA1:31df8208dc92d0f31e4e56300f0fb673e5a55fa5
                    SHA256:f83382863ccd22a340325055ad63a04e7a9aab147dd8526a508a6f1cbc646b2b
                    SHA512:721be3cab4bfecce520a142af4412b9b521ad7154030d78dbf095f2136292cd623d3f3b213bd78444885def23a42c5a4cbe69e255daf3bdd5230817f6f70384c
                    SSDEEP:1536:IVtPru4zwgGajp8pWwCOEYp3rcYBMb+KR0Nc8QsJq39:OtSMwgGajnnvYBe0Nc8QsC9
                    TLSH:0A73AE42E9C41436C1E2117E2B723A799A71F1BA2612C29E394CCDE5DBD18F0673A3C3
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L....teJ...........
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x4092fc
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:
                    Time Stamp:0x4A65749C [Tue Jul 21 07:56:12 2009 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:481f47bbb2c9c21e108d65f52b04c448
                    Instruction
                    dec ecx
                    xchg eax, ecx
                    salc
                    aaa
                    cwde
                    dec ebx
                    das
                    lahf
                    das
                    nop
                    dec ecx
                    dec ecx
                    salc
                    dec edx
                    das
                    xchg eax, ecx
                    dec edx
                    stc
                    aaa
                    daa
                    nop
                    xchg eax, edx
                    cld
                    inc edx
                    cdq
                    dec ebx
                    inc ecx
                    cdq
                    xchg eax, ecx
                    wait
                    lahf
                    daa
                    cmc
                    wait
                    dec edx
                    cdq
                    dec edx
                    salc
                    xchg eax, edx
                    dec edx
                    cwde
                    salc
                    xchg eax, edx
                    std
                    xchg eax, ecx
                    clc
                    dec edx
                    aas
                    wait
                    dec ebx
                    lahf
                    xchg eax, ecx
                    inc eax
                    daa
                    dec ebx
                    xchg eax, edx
                    inc ecx
                    inc ecx
                    daa
                    clc
                    inc ebx
                    xchg eax, ebx
                    dec edx
                    salc
                    dec eax
                    clc
                    inc edx
                    dec eax
                    cld
                    inc eax
                    inc edx
                    xchg eax, ebx
                    xchg eax, edx
                    std
                    das
                    cwde
                    cmc
                    inc eax
                    lahf
                    cwde
                    dec edx
                    std
                    inc eax
                    dec eax
                    cwde
                    wait
                    clc
                    inc ecx
                    aaa
                    cwde
                    dec eax
                    inc ebx
                    cmc
                    clc
                    dec eax
                    cmc
                    cwde
                    cld
                    stc
                    dec eax
                    jmp 00007FF5F84AF91Dh
                    mov al, 7Ch
                    add byte ptr [ebp-58h], cl
                    div dword ptr [edx+ebx*2+3Dh]
                    add byte ptr [eax], al
                    add cl, bl
                    jne 00007FF5F84AEA89h
                    push FFFFFFCCh
                    jmp far fword ptr [eax+ecx-7CFFBF3Fh]
                    les eax, fword ptr [edx+ebp*2]
                    imul ebp, dword ptr [edx-0Ch], 59h
                    adc eax, 0040C0A4h
                    cmp al, byte ptr [esi+55h]
                    jne 00007FF5F84AEA72h
                    dec esp
                    add al, 75h
                    pop ss
                    push 00000001h
                    call dword ptr [0040C108h]
                    add esp, 04h
                    push FFFFFFFFh
                    push FFFFFFAEh
                    call dword ptr [004079A4h]
                    jmp 00007FF5F84AEA9Ah
                    cmp eax, 02000000h
                    jmp 00007FF5F7CC5496h
                    adc eax, AA247708h
                    add esp, 04h
                    push FFFFFFFFh
                    idiv bh
                    adc eax, 004042A4h
                    Programming Language:
                    • [EXP] VC++ 6.0 SP5 build 8804
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xa9660xb00025a5df28e40b9bb8f8448c306f577b6dFalse0.8182262073863636DOS executable (COM, 0x8C-variant)7.030657884174903IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
                    DLLImport
                    MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                    KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                    ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                    WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                    WS2_32.dllWSARecv, WSASend
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 20, 2024 18:02:53.572454929 CEST49704443192.168.2.5188.166.177.132
                    Oct 20, 2024 18:02:53.572504997 CEST44349704188.166.177.132192.168.2.5
                    Oct 20, 2024 18:02:53.572577953 CEST49704443192.168.2.5188.166.177.132
                    Oct 20, 2024 18:02:53.686876059 CEST49704443192.168.2.5188.166.177.132
                    Oct 20, 2024 18:02:53.686945915 CEST44349704188.166.177.132192.168.2.5
                    Oct 20, 2024 18:02:53.687012911 CEST44349704188.166.177.132192.168.2.5

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:12:02:53
                    Start date:20/10/2024
                    Path:C:\Users\user\Desktop\eJeQNTcb4A.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\eJeQNTcb4A.exe"
                    Imagebase:0x400000
                    File size:73'802 bytes
                    MD5 hash:EF734216083E11283BCF66E631014748
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2016564869.0000000000590000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_a6e956c9, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.2016564869.0000000000590000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:12:02:53
                    Start date:20/10/2024
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd
                    Imagebase:0x790000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:12:02:53
                    Start date:20/10/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:1.9%
                      Dynamic/Decrypted Code Coverage:12.5%
                      Signature Coverage:9.4%
                      Total number of Nodes:64
                      Total number of Limit Nodes:2
                      execution_graph 1365 408c20 1366 408c94 1365->1366 1367 408bd0 1365->1367 1366->1366 1368 408c44 WSAGetLastError 1367->1368 1369 408bde 1367->1369 1376 4096c0 GetFileInformationByHandle 1377 4096eb 1376->1377 1378 40a0e0 1379 40a0f2 1378->1379 1381 40a0dc 1378->1381 1380 40a49c VirtualAlloc 1379->1380 1379->1381 1380->1381 1386 403a83 1387 403c15 1386->1387 1388 403ab9 fprintf 1386->1388 1388->1387 1394 402ca6 1395 402cc3 1394->1395 1396 402e87 malloc perror 1395->1396 1397 402dcf 1395->1397 1412 4045e8 1413 404612 1412->1413 1414 40461a 1413->1414 1415 40b6e0 exit 1413->1415 1416 4047af 1415->1416 1362 403c0c fprintf 1363 403bdd 1362->1363 1364 403c15 1362->1364 1363->1362 1399 40396c 1400 40398b 1399->1400 1401 4039ec fprintf 1400->1401 1402 403a0c 1400->1402 1401->1402 1353 409250 1355 409259 1353->1355 1354 409245 1355->1354 1358 40a49c 1355->1358 1359 40a4ae VirtualAlloc 1358->1359 1361 40a53b 1359->1361 1370 403030 1373 403050 1370->1373 1371 4030c8 1372 4030cc __WSAFDIsSet 1371->1372 1375 4030d4 1371->1375 1372->1375 1373->1371 1374 4030aa fclose 1373->1374 1374->1371 1403 404730 1404 404743 1403->1404 1406 4046e6 1404->1406 1408 40b6e0 1404->1408 1409 40b6f5 exit 1408->1409 1411 4047af 1409->1411 1398 404553 exit 1336 40a49c 1337 40a4ae VirtualAlloc 1336->1337 1339 40a53b 1337->1339 1382 4092fc 1383 409301 1382->1383 1384 40a49c VirtualAlloc 1383->1384 1385 40a224 1384->1385 1340 590004 1341 590010 1340->1341 1341->1341 1344 5900a3 1341->1344 1345 5900b6 WSASocketA 1344->1345 1347 5900e4 connect 1345->1347 1348 5900f8 CreateProcessA 1347->1348 1349 5900f3 1347->1349 1352 590140 ExitProcess 1348->1352 1349->1347 1349->1348

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 5900a3-5900e2 WSASocketA 3 5900e4-5900f1 connect 0->3 4 5900ff-59010d 3->4 5 5900f3-5900f6 3->5 7 59010e-59010f 4->7 5->3 6 5900f8 5->6 6->4 7->7 8 590111-59014e CreateProcessA 7->8 11 59015a-59015f ExitProcess 8->11 12 590150-590153 8->12 12->11 13 590155 12->13 13->11
                      APIs
                      • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,?,?,5F327377,00003233), ref: 005900D3
                      • connect.WS2_32(6174A599,?,?,00000010,BB010002,84B1A6BC,00000005,?,?,5F327377,00003233), ref: 005900ED
                      • CreateProcessA.KERNELBASE(863FCC79,00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?,00000000,?,?,?,00646D63), ref: 00590130
                      • ExitProcess.KERNEL32(56A2B5F0,00000000,?,-00000001,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?,00000000), ref: 0059015D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016564869.0000000000590000.00000040.00001000.00020000.00000000.sdmp, Offset: 00590000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_590000_eJeQNTcb4A.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CreateExitSocketconnect
                      • String ID:
                      • API String ID: 3024456309-0
                      • Opcode ID: cfff8ca681b342b4c75668f473363d898dce70f725c7b5b7602ea4f0850e1a4a
                      • Instruction ID: 35343c53119b01f87b65ac01113cfd3aec4ee6967ba77c461d37edab207f7e82
                      • Opcode Fuzzy Hash: cfff8ca681b342b4c75668f473363d898dce70f725c7b5b7602ea4f0850e1a4a
                      • Instruction Fuzzy Hash: AA11CEA06823687FE63122638C0BFB73D5CEF47BA4F452411FA899A1D1D5929C00C1FA

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 14 40a49c-40a529 VirtualAlloc 22 40a53b-40a543 call 40a667 14->22
                      APIs
                      • VirtualAlloc.KERNELBASE(E553A458,00000000,0000015F,00001000,00000040), ref: 0040A522
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 12d5f3a733a181d0d6c5035cc0e996bf70ce92e2166974714922e13ea0af5c2a
                      • Instruction ID: e080440ba21bf6cc39dd8ef88ba725f9c6d8a366cf630793f7a53bc5bbadb87f
                      • Opcode Fuzzy Hash: 12d5f3a733a181d0d6c5035cc0e996bf70ce92e2166974714922e13ea0af5c2a
                      • Instruction Fuzzy Hash: C8D05E292CE314FAD00004200C4EFB1218423DE796E352473624B7B6C298FC0573319F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 95 4045e8-404614 97 404717-404741 95->97 98 40461a-404621 95->98 102 404743-404748 97->102 103 40474b-40475c call 409439 97->103 99 404665-40466b 98->99 100 404627-40464a 98->100 104 4046b7-4046be 99->104 106 4046c3-4046e9 99->106 100->104 105 40464c-404663 call 4055d0 100->105 102->103 112 4046e6-4046e9 103->112 113 40475e-404763 103->113 104->106 105->99 114 4047a4-4047d0 call 40b6e0 113->114 115 404765-404787 113->115
                      Strings
                      • e: %s [options] [http://]hostname[:port]/path, xrefs: 00404658
                      • _, xrefs: 004046E4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID:
                      • String ID: _$e: %s [options] [http://]hostname[:port]/path
                      • API String ID: 0-2782774714
                      • Opcode ID: 7cff6acdd2949e1d7cf9449180698d20ed85aea66fcec3146f748d6ea2936fc1
                      • Instruction ID: d6841969abfcb491f2c224397de6985d303222c40c5098ec24e8cbecb0424006
                      • Opcode Fuzzy Hash: 7cff6acdd2949e1d7cf9449180698d20ed85aea66fcec3146f748d6ea2936fc1
                      • Instruction Fuzzy Hash: A331AEB1A083849FDB11DF65DC84AE67FE89B97314F0444BFD544AB2D2E679E800CB68
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID: exit
                      • String ID:
                      • API String ID: 2483651598-0
                      • Opcode ID: d8698bd1e8a701ab943243107c1e1bb3fcf2a9467b09da4c648664757b260b91
                      • Instruction ID: 4c6f93d053f590bd902e08cdf759c35fc1f66a1038da5c70d7187247eed12d14
                      • Opcode Fuzzy Hash: d8698bd1e8a701ab943243107c1e1bb3fcf2a9467b09da4c648664757b260b91
                      • Instruction Fuzzy Hash: 16E08C3058C6928FC7029B28DC90AE57BA0A70B301F8820A0C451AB1E7C369944A8B89
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eb3649a2dbc37e4d35d55e72dd9b985be3a5b120f1842432fc9ec542cf55224f
                      • Instruction ID: 887185dfe972e653cfc012745c7c9e56f5f97c2143ea6d96ca44591bfc69196d
                      • Opcode Fuzzy Hash: eb3649a2dbc37e4d35d55e72dd9b985be3a5b120f1842432fc9ec542cf55224f
                      • Instruction Fuzzy Hash: 50316A318493C85FCB12CB749C419EABFB4AE02320B2846AFD8D56B2D3C77AD446C385
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0b2b021bc979f3f29223eac2b35f3edaca0aa52fd60a9a7988a493bc3297444b
                      • Instruction ID: c469007cf790193a2daf0705d015c4a294332e7bec958e9b198efbd6a10625b1
                      • Opcode Fuzzy Hash: 0b2b021bc979f3f29223eac2b35f3edaca0aa52fd60a9a7988a493bc3297444b
                      • Instruction Fuzzy Hash: 7C3189B9A00642AFCB24DF69C48199AFBB4FF59310714412EEA44AB702C734F921CFD8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf743ebcca388057ec145ac1f4e738c107674119595ec81d71d91810a4ba8ad9
                      • Instruction ID: a1d3d31339e21565dc552876c83e389e985aea2359ac29b0ae1ca13dcd82c94e
                      • Opcode Fuzzy Hash: cf743ebcca388057ec145ac1f4e738c107674119595ec81d71d91810a4ba8ad9
                      • Instruction Fuzzy Hash: 88115972B442408FDB04CF74D881866BBB0EFC2320B1482FBD941AB2D2DB358856C798
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 99077f95451ff77e3f3cdd10879bf54af02f2d955bf1e21b5fe398b6c9c34609
                      • Instruction ID: f00abd1d2c7a9f85ce4cafaf70bb5b909f0bf17652e1e0c7aca4e6cad747e74d
                      • Opcode Fuzzy Hash: 99077f95451ff77e3f3cdd10879bf54af02f2d955bf1e21b5fe398b6c9c34609
                      • Instruction Fuzzy Hash: 0901283148C3C84FC312CF68A8515E9FFA0EB42210B2891AFD8C58B683DB6A8486C795
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9497cab3467787b11cbe2a35f3a247f5995e3399645d8dfece0dcc629eddd5d1
                      • Instruction ID: 00563fdf74049f653ad2f1a620f5a6f79526b7832c69a67141fdfc03fb01576a
                      • Opcode Fuzzy Hash: 9497cab3467787b11cbe2a35f3a247f5995e3399645d8dfece0dcc629eddd5d1
                      • Instruction Fuzzy Hash: 86D0A730D583D74FDB295F5858520E0FBF89A1360475065BEDCE1A7342D615D442DB4E

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 25 402ca6-402cc1 26 402cc3-402cca 25->26 27 402ccc-402ce8 25->27 26->27 28 402ce9-402cf0 27->28 30 402cf3-402d0c 28->30 31 402d0e-402d1a 30->31 32 402d1f-402d2c 30->32 34 402db5-402dc9 31->34 33 402d32-402db4 32->33 32->34 33->34 36 402e87-402eb7 malloc perror 34->36 37 402dcf-402de3 34->37 39 402df4-402e20 37->39 40 402de5-402def call 402e7b 37->40 43 402e26-402e5a 39->43 40->39 47 402e5c-402e78 43->47 48 402e1d-402e20 43->48 48->43
                      Strings
                      • ERROR: The median and mean for the total time are more than twice the standard deviation apart. These results are NOT reliable., xrefs: 00402D0E
                      • ERROR: The median and mean for the waiting time are more than twice the standard deviation apart. These results are NOT reliable., xrefs: 00402CC5
                      • 0%% <0> (never), xrefs: 00402DE5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0%% <0> (never)$ERROR: The median and mean for the total time are more than twice the standard deviation apart. These results are NOT reliable.$ERROR: The median and mean for the waiting time are more than twice the standard deviation apart. These results are NOT reliable.
                      • API String ID: 0-251436712
                      • Opcode ID: 7f86986d65c2794b3e863aee856603a2850d5c8bcf83c3e0c8399f5a2659fa34
                      • Instruction ID: 05c86611ae1f173dbbe43247a6aef215eed18310665a5b8ea1b2d83200ce7302
                      • Opcode Fuzzy Hash: 7f86986d65c2794b3e863aee856603a2850d5c8bcf83c3e0c8399f5a2659fa34
                      • Instruction Fuzzy Hash: 2331E032A04204D7E7101BB4ED5A6D23B20EF41324F244237D855B62C1DABD8C4F8A9B

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 59 403030-403059 61 40305b 59->61 62 40305c 59->62 61->62 63 4030c8-4030ca 62->63 64 40305e-4030c2 fclose 62->64 65 4030d4-4030d8 63->65 66 4030cc-4030ce __WSAFDIsSet 63->66 64->63 68 403137-40313e 65->68 69 4030da 65->69 66->65 70 403140-403145 68->70 71 403146-403148 68->71 70->71 73 403158 71->73 74 40314a-403157 71->74 75 40311a-40311c 73->75 76 40315a-40315c 73->76
                      APIs
                      • fclose.MSVCRT ref: 004030BC
                      • __WSAFDIsSet.WSOCK32(00000001,00000000,?,?,?,000003E8,00000000), ref: 004030CE
                      Strings
                      • %s%I64d%I64d%I64d%I64d%I64d, xrefs: 00403091
                      Memory Dump Source
                      • Source File: 00000000.00000002.2016290627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2016261227.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016314714.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016337695.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2016371276.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_eJeQNTcb4A.jbxd
                      Similarity
                      • API ID: fclose
                      • String ID: %s%I64d%I64d%I64d%I64d%I64d
                      • API String ID: 3125558077-4289954599
                      • Opcode ID: 4d9cc41b1644a913836adae7ec5a8ebba3413e75d021d9a86e3bc3d043af8935
                      • Instruction ID: 7fe5781e7553d7a49f7c5ec33b507560565e3f292ed9e3c441622f42f9125613
                      • Opcode Fuzzy Hash: 4d9cc41b1644a913836adae7ec5a8ebba3413e75d021d9a86e3bc3d043af8935
                      • Instruction Fuzzy Hash: A6217C71608280AFD311DB68CC88FAA7FA8EF4A319F0846ADF554AF0C3C671E500CB55