Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rOLZ579082-GHJ678992-PLRZ9000W029W00.exe

Overview

General Information

Sample name:rOLZ579082-GHJ678992-PLRZ9000W029W00.exe
Analysis ID:1544766
MD5:e38004414de6dde9350bb396dbee11e9
SHA1:f176f657829861a5734668ce574a91b625da57d3
SHA256:f5f0157aa26d0065a29b169008f4c5aac3c319d0dbd8010a6f8c8db3837f63d1
Tags:exeuser-Porcupine
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rOLZ579082-GHJ678992-PLRZ9000W029W00.exe (PID: 6556 cmdline: "C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe" MD5: E38004414DE6DDE9350BB396DBEE11E9)
    • RegSvcs.exe (PID: 7112 cmdline: "C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "cp8nl.hyperhost.ua", "Username": "absach@genesio.top", "Password": "@qwerty90123        "}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2932585654.00000000026CE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.2932585654.00000000026F9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.2931647950.0000000000392000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.2931647950.0000000000392000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000004.00000002.2932585654.0000000002681000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            4.2.RegSvcs.exe.390000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              4.2.RegSvcs.exe.390000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                4.2.RegSvcs.exe.390000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33e4f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33ec1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x33f4b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33fdd:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x34047:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x340b9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3414f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x341df:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548

                System Summary

                barindex
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.174.175.187, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7112, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 4.2.RegSvcs.exe.390000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "cp8nl.hyperhost.ua", "Username": "absach@genesio.top", "Password": "@qwerty90123 "}
                Source: rOLZ579082-GHJ678992-PLRZ9000W029W00.exeReversingLabs: Detection: 23%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: rOLZ579082-GHJ678992-PLRZ9000W029W00.exeJoe Sandbox ML: detected
                Source: rOLZ579082-GHJ678992-PLRZ9000W029W00.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: global trafficTCP traffic: 192.168.2.4:49736 -> 185.174.175.187:587
                Source: Joe Sandbox ViewIP Address: 185.174.175.187 185.174.175.187
                Source: Joe Sandbox ViewASN Name: ITLDC-NLUA ITLDC-NLUA
                Source: global trafficTCP traffic: 192.168.2.4:49736 -> 185.174.175.187:587
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: cp8nl.hyperhost.ua
                Source: RegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cp8nl.hyperhost.ua
                Source: RegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: RegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                Source: RegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: RegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                Source: RegSvcs.exe, 00000004.00000002.2931647950.0000000000392000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: RegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                System Summary

                barindex
                Source: 4.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00C54A984_2_00C54A98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00C53E804_2_00C53E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00C5CEA04_2_00C5CEA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00C5C0BC4_2_00C5C0BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00C541C84_2_00C541C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00C5A6324_2_00C5A632
                Source: rOLZ579082-GHJ678992-PLRZ9000W029W00.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 4.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeFile created: C:\Users\user\AppData\Local\Temp\lustringJump to behavior
                Source: rOLZ579082-GHJ678992-PLRZ9000W029W00.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: rOLZ579082-GHJ678992-PLRZ9000W029W00.exeReversingLabs: Detection: 23%
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeFile read: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe "C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe"
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe"
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: rOLZ579082-GHJ678992-PLRZ9000W029W00.exeStatic file information: File size 1156309 > 1048576
                Source: rOLZ579082-GHJ678992-PLRZ9000W029W00.exeStatic PE information: real checksum: 0xa2135 should be: 0x122b7b
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeAPI/Special instruction interceptor: Address: 3E8D844
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1300Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6041Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99873Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97516Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97391Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96844Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96495Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96391Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllXs<
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 591008Jump to behavior
                Source: C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe"Jump to behavior
                Source: rOLZ579082-GHJ678992-PLRZ9000W029W00.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 4.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2932585654.00000000026CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2932585654.00000000026F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2931647950.0000000000392000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2932585654.0000000002681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7112, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: Yara matchFile source: 4.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2931647950.0000000000392000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2932585654.0000000002681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7112, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 4.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2932585654.00000000026CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2932585654.00000000026F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2931647950.0000000000392000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2932585654.0000000002681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7112, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                212
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                211
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                121
                Virtualization/Sandbox Evasion
                1
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)212
                Process Injection
                Security Account Manager121
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                DLL Side-Loading
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture11
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials124
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                rOLZ579082-GHJ678992-PLRZ9000W029W00.exe24%ReversingLabsWin32.Trojan.Generic
                rOLZ579082-GHJ678992-PLRZ9000W029W00.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://sectigo.com/CPS00%URL Reputationsafe
                https://account.dyn.com/0%URL Reputationsafe
                http://ocsp.sectigo.com00%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                cp8nl.hyperhost.ua
                185.174.175.187
                truetrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://sectigo.com/CPS0RegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/RegSvcs.exe, 00000004.00000002.2931647950.0000000000392000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.sectigo.com0RegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2934424598.0000000005A70000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://cp8nl.hyperhost.uaRegSvcs.exe, 00000004.00000002.2932585654.00000000026D6000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.174.175.187
                      cp8nl.hyperhost.uaUkraine
                      21100ITLDC-NLUAtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1544766
                      Start date and time:2024-10-29 18:01:09 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 27s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:rOLZ579082-GHJ678992-PLRZ9000W029W00.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 97%
                      • Number of executed functions: 6
                      • Number of non-executed functions: 3
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: rOLZ579082-GHJ678992-PLRZ9000W029W00.exe
                      TimeTypeDescription
                      13:02:52API Interceptor36x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      185.174.175.187rPGI786687-7688Q21-SWYPPJIK89900.exeGet hashmaliciousAgentTeslaBrowse
                        SecuriteInfo.com.BackDoor.SpyBotNET.62.1543.28282.exeGet hashmaliciousAgentTeslaBrowse
                          rPDG8838EHU0309-XYSUJ288399-PQSHXII399.exeGet hashmaliciousAgentTeslaBrowse
                            MBD573792309-CGO7238929273-XDG02823929.exeGet hashmaliciousAgentTeslaBrowse
                              rSCV6239027-FLPEW828938-X2YUSJPPID20DK.exeGet hashmaliciousAgentTeslaBrowse
                                z1RFT798549034687-HJW90789-VXT9KGUINUII.exeGet hashmaliciousAgentTeslaBrowse
                                  rDFO68936OF-WVHU0780-FUIKTU4678G.exeGet hashmaliciousAgentTeslaBrowse
                                    SecuriteInfo.com.FileRepMalware.14031.20391.exeGet hashmaliciousAgentTeslaBrowse
                                      MJI5380328-PQX82938839039-HW7V89292999.exeGet hashmaliciousAgentTeslaBrowse
                                        rMBP0835T67-H7D67889677-VFD899U8889990998Y.exeGet hashmaliciousAgentTeslaBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          cp8nl.hyperhost.uarPGI786687-7688Q21-SWYPPJIK89900.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          SecuriteInfo.com.BackDoor.SpyBotNET.62.1543.28282.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          rPDG8838EHU0309-XYSUJ288399-PQSHXII399.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          MBD573792309-CGO7238929273-XDG02823929.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          rSCV6239027-FLPEW828938-X2YUSJPPID20DK.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          z1RFT798549034687-HJW90789-VXT9KGUINUII.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          rDFO68936OF-WVHU0780-FUIKTU4678G.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          SecuriteInfo.com.FileRepMalware.14031.20391.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          MJI5380328-PQX82938839039-HW7V89292999.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          rMBP0835T67-H7D67889677-VFD899U8889990998Y.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ITLDC-NLUArPGI786687-7688Q21-SWYPPJIK89900.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          SecuriteInfo.com.BackDoor.SpyBotNET.62.1543.28282.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          ekte.exeGet hashmaliciousFormBookBrowse
                                          • 185.174.173.22
                                          rPDG8838EHU0309-XYSUJ288399-PQSHXII399.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          DHL TRACKING NUMBER.com.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 217.12.218.219
                                          EKTEDIR.exeGet hashmaliciousFormBookBrowse
                                          • 185.174.173.22
                                          UUNbg1gvrR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 217.12.218.219
                                          Quote101024.docGet hashmaliciousVIP KeyloggerBrowse
                                          • 217.12.218.219
                                          99HGuuYvKA.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.173.22
                                          sse5JV1aR1.exeGet hashmaliciousFormBookBrowse
                                          • 185.174.173.22
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):242688
                                          Entropy (8bit):6.650859951959103
                                          Encrypted:false
                                          SSDEEP:3072:22dAOUxqGiM2zU6trLYd84y5V43ELshjIK4YMIyy+yPNHe88X7Cm1Z5S:22uO8ixJdYd8niHcHYMIyy+yPkX7C9
                                          MD5:27FC605521BFB7E0381EE041B9B2C0D4
                                          SHA1:600D790FCD8B48A0F9E27228702EBACF45A1E70A
                                          SHA-256:B3E66A7E11F2169CEFE757A2BE7E27BE57C1A0F2627CEA3799DAF83DC3725D13
                                          SHA-512:BC367CF83DC47DECDBF431E9F47057C8CD96FB68310079A8A6FC344FB610DD07C8926BD425FCF3931C1E762E43DEC98177EA519E38829D5559070498AE97000F
                                          Malicious:false
                                          Reputation:low
                                          Preview:ub.UOXQHKHWD..KR.8MULXQH.HWDFCKR88MULXQHOHWDFCKR88MULXQHOHWD.CKR6'.[L.X.n.V..b.:QKm%>76:.%w''-%=L./0l*$&o!9d...rUW)0bU\BkHWDFCKRh}MU.YRH{.."FCKR88MU.XSIDI\DF.HR80MULXQH.TDFcKR8.NULX.HOhWDFAKR<8MULXQHKHWDFCKR8.IULZQHOHWDDC..88]ULHQHOHGDFSKR88MU\XQHOHWDFCKRp.NU.XQHO.TD.FKR88MULXQHOHWDFCKR88IU@XQHOHWDFCKR88MULXQHOHWDFCKR88MULXQHOHWDFCKR88MULXQHOhWDNCKR88MULXQHGhWD.CKR88MULXQHa<2<2CKR..NULxQHO.TDFAKR88MULXQHOHWDfCK2.J>'/XQH.MWDF.HR8>MUL.RHOHWDFCKR88MU.XQ.a:2() KR48MULXUHOJWDF.HR88MULXQHOHWD.CK.88MULXQHOHWDFCKR..NULXQH.HWDDCNRh.OU.kPHLHWDGCKT88MULXQHOHWDFCKR88MULXQHOHWDFCKR88MULXQHOHWDFCKR%....v.5iN$D.t._.V..B..1..I.^.C,....\.....a6M.q8.Z|..F...6.Z=AL....w(\5H+.%.7,.Q....uv0...TV.7.../z.&Q`.j....n....G;....7..[W {-(!$*f.% "9;.:.TLXQH........Q@..a[^V{Z/.....*5....1HWD"CKRJ8MU-XQH.HWD)CKRV8MU2XQH1HWD.CKRx8MU{XQHjHWD+CKR.8MU2XQH.5XK..;K..ULXQHz..t....g.b..~>.).${...\....T..G?.1.....C.3..X.<Be..U9>IPN_UKCuY....s:<IPN_UKCuY....s...u..>...9..88MULX.HO.WDF..R.8MU.X.H..WDF.R.8.U...H
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):7.3046380578113155
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 95.11%
                                          • AutoIt3 compiled script executable (510682/80) 4.86%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:rOLZ579082-GHJ678992-PLRZ9000W029W00.exe
                                          File size:1'156'309 bytes
                                          MD5:e38004414de6dde9350bb396dbee11e9
                                          SHA1:f176f657829861a5734668ce574a91b625da57d3
                                          SHA256:f5f0157aa26d0065a29b169008f4c5aac3c319d0dbd8010a6f8c8db3837f63d1
                                          SHA512:3a31c43f0f89141ce31df77d85b9dbdc0b8c980256797c58198bdf65e2cc36f7bd442dfc49e5a80b4ded0304e5bac8de99202a6cbab7cc244a0b356ac59fa535
                                          SSDEEP:24576:6fmMv6Ckr7Mny5Qc/D6/XpKTeGUeUwsqOn:63v+7/5Qc/uXMJhBY
                                          TLSH:F635CE12B2C680F2ED6336B11D37F3269A357D190236CC8FAFA53A768E32141563675E
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
                                          Icon Hash:2c921a29238ccd4c
                                          Entrypoint:0x416310
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                          Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:0
                                          File Version Major:5
                                          File Version Minor:0
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:0
                                          Import Hash:aaaa8913c89c8aa4a5d93f06853894da
                                          Instruction
                                          call 00007F2114FBFA3Ch
                                          jmp 00007F2114FB380Eh
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          push ebp
                                          mov ebp, esp
                                          push edi
                                          push esi
                                          mov esi, dword ptr [ebp+0Ch]
                                          mov ecx, dword ptr [ebp+10h]
                                          mov edi, dword ptr [ebp+08h]
                                          mov eax, ecx
                                          mov edx, ecx
                                          add eax, esi
                                          cmp edi, esi
                                          jbe 00007F2114FB399Ah
                                          cmp edi, eax
                                          jc 00007F2114FB3B3Ah
                                          cmp ecx, 00000100h
                                          jc 00007F2114FB39B1h
                                          cmp dword ptr [004A94E0h], 00000000h
                                          je 00007F2114FB39A8h
                                          push edi
                                          push esi
                                          and edi, 0Fh
                                          and esi, 0Fh
                                          cmp edi, esi
                                          pop esi
                                          pop edi
                                          jne 00007F2114FB399Ah
                                          pop esi
                                          pop edi
                                          pop ebp
                                          jmp 00007F2114FB3DFAh
                                          test edi, 00000003h
                                          jne 00007F2114FB39A7h
                                          shr ecx, 02h
                                          and edx, 03h
                                          cmp ecx, 08h
                                          jc 00007F2114FB39BCh
                                          rep movsd
                                          jmp dword ptr [00416494h+edx*4]
                                          nop
                                          mov eax, edi
                                          mov edx, 00000003h
                                          sub ecx, 04h
                                          jc 00007F2114FB399Eh
                                          and eax, 03h
                                          add ecx, eax
                                          jmp dword ptr [004163A8h+eax*4]
                                          jmp dword ptr [004164A4h+ecx*4]
                                          nop
                                          jmp dword ptr [00416428h+ecx*4]
                                          nop
                                          mov eax, E4004163h
                                          arpl word ptr [ecx+00h], ax
                                          or byte ptr [ecx+eax*2+00h], ah
                                          and edx, ecx
                                          mov al, byte ptr [esi]
                                          mov byte ptr [edi], al
                                          mov al, byte ptr [esi+01h]
                                          mov byte ptr [edi+01h], al
                                          mov al, byte ptr [esi+02h]
                                          shr ecx, 02h
                                          mov byte ptr [edi+02h], al
                                          add esi, 03h
                                          add edi, 03h
                                          cmp ecx, 08h
                                          jc 00007F2114FB395Eh
                                          Programming Language:
                                          • [ASM] VS2008 SP1 build 30729
                                          • [ C ] VS2008 SP1 build 30729
                                          • [C++] VS2008 SP1 build 30729
                                          • [ C ] VS2005 build 50727
                                          • [IMP] VS2005 build 50727
                                          • [ASM] VS2008 build 21022
                                          • [RES] VS2008 build 21022
                                          • [LNK] VS2008 SP1 build 30729
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x12ac8.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0xab0000x12ac80x12c0044a7c9b56bdda85725656717d1507557False0.15942708333333333data3.801227199599993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                          RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                          RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                          RT_ICON0xab7c00xfc08Device independent bitmap graphic, 150 x 208 x 32, image size 62400, resolution 3779 x 3779 px/mEnglishGreat Britain0.1332920024798512
                                          RT_MENU0xbb3c80x50dataEnglishGreat Britain0.9
                                          RT_DIALOG0xbb4180xfcdataEnglishGreat Britain0.6507936507936508
                                          RT_STRING0xbb5180x530dataEnglishGreat Britain0.33960843373493976
                                          RT_STRING0xbba480x690dataEnglishGreat Britain0.26964285714285713
                                          RT_STRING0xbc0d80x43adataEnglishGreat Britain0.3733826247689464
                                          RT_STRING0xbc5180x5fcdataEnglishGreat Britain0.3087467362924282
                                          RT_STRING0xbcb180x65cdataEnglishGreat Britain0.34336609336609336
                                          RT_STRING0xbd1780x388dataEnglishGreat Britain0.377212389380531
                                          RT_STRING0xbd5000x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                          RT_GROUP_ICON0xbd6580x14dataEnglishGreat Britain1.25
                                          RT_GROUP_ICON0xbd6700x14dataEnglishGreat Britain1.15
                                          RT_GROUP_ICON0xbd6880x14dataEnglishGreat Britain1.25
                                          RT_GROUP_ICON0xbd6a00x14dataEnglishGreat Britain1.25
                                          RT_VERSION0xbd6b80x19cdataEnglishGreat Britain0.5339805825242718
                                          RT_MANIFEST0xbd8580x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                          DLLImport
                                          WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                          VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                          COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                          MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                          PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                          USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                          KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
                                          USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
                                          GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
                                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                          ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                          ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
                                          OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishGreat Britain
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 29, 2024 18:02:53.693169117 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:53.698625088 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:53.698724031 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:54.670732021 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:54.672415018 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:54.677962065 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:54.918013096 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:54.926179886 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:54.931672096 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.173388958 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.185347080 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:55.190803051 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.438575029 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.438600063 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.438616037 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.438632965 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.438663006 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:55.439666033 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.439692974 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:55.457372904 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:55.462778091 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.703121901 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.719317913 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:55.724692106 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.965152025 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:55.966147900 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:55.971673012 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:56.214587927 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:56.214857101 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:56.220242023 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:56.488490105 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:56.488871098 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:56.494313955 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:56.734293938 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:56.734565973 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:56.740009069 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:56.999838114 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:57.001315117 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:57.006694078 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:57.246604919 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:57.247342110 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:57.247442007 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:57.247442007 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:57.247442007 CET49736587192.168.2.4185.174.175.187
                                          Oct 29, 2024 18:02:57.253109932 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:57.253119946 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:57.253128052 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:57.253137112 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:57.556453943 CET58749736185.174.175.187192.168.2.4
                                          Oct 29, 2024 18:02:57.603060961 CET49736587192.168.2.4185.174.175.187
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 29, 2024 18:02:53.644998074 CET5546053192.168.2.41.1.1.1
                                          Oct 29, 2024 18:02:53.656836987 CET53554601.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 29, 2024 18:02:53.644998074 CET192.168.2.41.1.1.10x13f0Standard query (0)cp8nl.hyperhost.uaA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 29, 2024 18:02:53.656836987 CET1.1.1.1192.168.2.40x13f0No error (0)cp8nl.hyperhost.ua185.174.175.187A (IP address)IN (0x0001)false
                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          Oct 29, 2024 18:02:54.670732021 CET58749736185.174.175.187192.168.2.4220-cp8nl.hyperhost.ua ESMTP Exim 4.98 #2 Tue, 29 Oct 2024 19:02:54 +0200
                                          220-We do not authorize the use of this system to transport unsolicited,
                                          220 and/or bulk e-mail.
                                          Oct 29, 2024 18:02:54.672415018 CET49736587192.168.2.4185.174.175.187EHLO 927537
                                          Oct 29, 2024 18:02:54.918013096 CET58749736185.174.175.187192.168.2.4250-cp8nl.hyperhost.ua Hello 927537 [173.254.250.72]
                                          250-SIZE 52428800
                                          250-LIMITS MAILMAX=1000 RCPTMAX=50000
                                          250-8BITMIME
                                          250-PIPELINING
                                          250-PIPECONNECT
                                          250-STARTTLS
                                          250 HELP
                                          Oct 29, 2024 18:02:54.926179886 CET49736587192.168.2.4185.174.175.187STARTTLS
                                          Oct 29, 2024 18:02:55.173388958 CET58749736185.174.175.187192.168.2.4220 TLS go ahead

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:13:02:00
                                          Start date:29/10/2024
                                          Path:C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe"
                                          Imagebase:0x400000
                                          File size:1'156'309 bytes
                                          MD5 hash:E38004414DE6DDE9350BB396DBEE11E9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:4
                                          Start time:13:02:51
                                          Start date:29/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\rOLZ579082-GHJ678992-PLRZ9000W029W00.exe"
                                          Imagebase:0x2c0000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2932585654.00000000026CE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2932585654.00000000026F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2931647950.0000000000392000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2931647950.0000000000392000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2932585654.0000000002681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2932585654.0000000002681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:11.1%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:4
                                            Total number of Limit Nodes:0
                                            execution_graph 9025 c5fda0 9026 c5fde2 9025->9026 9028 c5fde9 9025->9028 9027 c5fe3a CallWindowProcW 9026->9027 9026->9028 9027->9028
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2932354878.0000000000C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_c50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fab8c9aae2edb05f84321a9801e5f62d632925cf03147bb7d06627bf13fcc547
                                            • Instruction ID: f5bdbbe45faacbcbb7233a04b1257774e008c0149a42e63dadb25a4d961cd884
                                            • Opcode Fuzzy Hash: fab8c9aae2edb05f84321a9801e5f62d632925cf03147bb7d06627bf13fcc547
                                            • Instruction Fuzzy Hash: A8332E35D107198ECB15DF68C8806ADF7B1FF99300F14C79AE459A7225EB70AAC5CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1116 c54a98-c54afe 1118 c54b00-c54b0b 1116->1118 1119 c54b48-c54b4a 1116->1119 1118->1119 1120 c54b0d-c54b19 1118->1120 1121 c54b4c-c54b65 1119->1121 1122 c54b3c-c54b46 1120->1122 1123 c54b1b-c54b25 1120->1123 1127 c54b67-c54b73 1121->1127 1128 c54bb1-c54bb3 1121->1128 1122->1121 1124 c54b27 1123->1124 1125 c54b29-c54b38 1123->1125 1124->1125 1125->1125 1129 c54b3a 1125->1129 1127->1128 1130 c54b75-c54b81 1127->1130 1131 c54bb5-c54bcd 1128->1131 1129->1122 1132 c54ba4-c54baf 1130->1132 1133 c54b83-c54b8d 1130->1133 1138 c54c17-c54c19 1131->1138 1139 c54bcf-c54bda 1131->1139 1132->1131 1134 c54b91-c54ba0 1133->1134 1135 c54b8f 1133->1135 1134->1134 1137 c54ba2 1134->1137 1135->1134 1137->1132 1141 c54c1b-c54c33 1138->1141 1139->1138 1140 c54bdc-c54be8 1139->1140 1142 c54c0b-c54c15 1140->1142 1143 c54bea-c54bf4 1140->1143 1147 c54c35-c54c40 1141->1147 1148 c54c7d-c54c7f 1141->1148 1142->1141 1145 c54bf6 1143->1145 1146 c54bf8-c54c07 1143->1146 1145->1146 1146->1146 1149 c54c09 1146->1149 1147->1148 1151 c54c42-c54c4e 1147->1151 1150 c54c81-c54cf4 1148->1150 1149->1142 1160 c54cfa-c54d08 1150->1160 1152 c54c71-c54c7b 1151->1152 1153 c54c50-c54c5a 1151->1153 1152->1150 1154 c54c5c 1153->1154 1155 c54c5e-c54c6d 1153->1155 1154->1155 1155->1155 1157 c54c6f 1155->1157 1157->1152 1161 c54d11-c54d71 1160->1161 1162 c54d0a-c54d10 1160->1162 1169 c54d81-c54d85 1161->1169 1170 c54d73-c54d77 1161->1170 1162->1161 1172 c54d95-c54d99 1169->1172 1173 c54d87-c54d8b 1169->1173 1170->1169 1171 c54d79 1170->1171 1171->1169 1175 c54da9-c54dad 1172->1175 1176 c54d9b-c54d9f 1172->1176 1173->1172 1174 c54d8d 1173->1174 1174->1172 1178 c54dbd-c54dc1 1175->1178 1179 c54daf-c54db3 1175->1179 1176->1175 1177 c54da1 1176->1177 1177->1175 1180 c54dd1-c54dd5 1178->1180 1181 c54dc3-c54dc7 1178->1181 1179->1178 1182 c54db5 1179->1182 1184 c54de5 1180->1184 1185 c54dd7-c54ddb 1180->1185 1181->1180 1183 c54dc9-c54dcc call c50ab8 1181->1183 1182->1178 1183->1180 1189 c54de6 1184->1189 1185->1184 1187 c54ddd-c54de0 call c50ab8 1185->1187 1187->1184 1189->1189
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2932354878.0000000000C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_c50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bbe55b03a9f95fd7ed142d2215ee79933c214fd764172a20888072cff6a04ae7
                                            • Instruction ID: d59822d37f117bb546d613208f18b0117306a03dd03c232deb6c69a8600062cf
                                            • Opcode Fuzzy Hash: bbe55b03a9f95fd7ed142d2215ee79933c214fd764172a20888072cff6a04ae7
                                            • Instruction Fuzzy Hash: 69B17074E00209CFDF18CFA9C88579DBBF2AF88359F148129D815E7254EB7499C9CB85

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1264 c53e80-c53ee6 1266 c53f30-c53f32 1264->1266 1267 c53ee8-c53ef3 1264->1267 1269 c53f34-c53f8c 1266->1269 1267->1266 1268 c53ef5-c53f01 1267->1268 1270 c53f24-c53f2e 1268->1270 1271 c53f03-c53f0d 1268->1271 1278 c53fd6-c53fd8 1269->1278 1279 c53f8e-c53f99 1269->1279 1270->1269 1272 c53f11-c53f20 1271->1272 1273 c53f0f 1271->1273 1272->1272 1275 c53f22 1272->1275 1273->1272 1275->1270 1281 c53fda-c53ff2 1278->1281 1279->1278 1280 c53f9b-c53fa7 1279->1280 1282 c53fa9-c53fb3 1280->1282 1283 c53fca-c53fd4 1280->1283 1288 c53ff4-c53fff 1281->1288 1289 c5403c-c5403e 1281->1289 1284 c53fb5 1282->1284 1285 c53fb7-c53fc6 1282->1285 1283->1281 1284->1285 1285->1285 1287 c53fc8 1285->1287 1287->1283 1288->1289 1291 c54001-c5400d 1288->1291 1290 c54040-c540a2 1289->1290 1300 c540a4-c540aa 1290->1300 1301 c540ab-c5410b 1290->1301 1292 c54030-c5403a 1291->1292 1293 c5400f-c54019 1291->1293 1292->1290 1294 c5401d-c5402c 1293->1294 1295 c5401b 1293->1295 1294->1294 1297 c5402e 1294->1297 1295->1294 1297->1292 1300->1301 1308 c5410d-c54111 1301->1308 1309 c5411b-c5411f 1301->1309 1308->1309 1310 c54113 1308->1310 1311 c54121-c54125 1309->1311 1312 c5412f-c54133 1309->1312 1310->1309 1311->1312 1313 c54127-c5412a call c50ab8 1311->1313 1314 c54135-c54139 1312->1314 1315 c54143-c54147 1312->1315 1313->1312 1314->1315 1317 c5413b-c5413e call c50ab8 1314->1317 1318 c54157-c5415b 1315->1318 1319 c54149-c5414d 1315->1319 1317->1315 1321 c5415d-c54161 1318->1321 1322 c5416b-c5416f 1318->1322 1319->1318 1320 c5414f-c54152 call c50ab8 1319->1320 1320->1318 1321->1322 1325 c54163 1321->1325 1326 c54171-c54175 1322->1326 1327 c5417f 1322->1327 1325->1322 1326->1327 1328 c54177 1326->1328 1329 c54180 1327->1329 1328->1327 1329->1329
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2932354878.0000000000C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_c50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 56ae7424daa6e0c02ca17f8097eb1677712e46a12caabdad435e5b566874f8ca
                                            • Instruction ID: bc814e61108c3ca56a4036696799a21775fd817db027520bff98bc09947bdd1c
                                            • Opcode Fuzzy Hash: 56ae7424daa6e0c02ca17f8097eb1677712e46a12caabdad435e5b566874f8ca
                                            • Instruction Fuzzy Hash: 30918174E00209CFDF14CFA9C98579EBBF2AF88305F248129E815E7294DB7499C9CB85

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 486 c5fda0-c5fddc 487 c5fde2-c5fde7 486->487 488 c5fe8c-c5feac 486->488 489 c5fde9-c5fe20 487->489 490 c5fe3a-c5fe72 CallWindowProcW 487->490 495 c5feaf-c5febc 488->495 496 c5fe22-c5fe28 489->496 497 c5fe29-c5fe38 489->497 491 c5fe74-c5fe7a 490->491 492 c5fe7b-c5fe8a 490->492 491->492 492->495 496->497 497->495
                                            APIs
                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 00C5FE61
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2932354878.0000000000C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_c50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID: CallProcWindow
                                            • String ID:
                                            • API String ID: 2714655100-0
                                            • Opcode ID: 7d99a12b902af79b45743c5beeb18fd0b7c884fdee948be01a90a119d9125cf5
                                            • Instruction ID: 1702c785af8d71b976a1df072cf6157c904211c186dbd363436d902ba606158c
                                            • Opcode Fuzzy Hash: 7d99a12b902af79b45743c5beeb18fd0b7c884fdee948be01a90a119d9125cf5
                                            • Instruction Fuzzy Hash: FA4138B8900309CFCB14CF99C449A9ABBF5FB88314F24C459D419AB361D3B4A886CFA4
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2931955900.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_a0d000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5084e79217ff4804a68ec6f9f4199d64467148b20662f9569eeb8a5a5fdfc3af
                                            • Instruction ID: 40ee66d4b90f563bd61a2ef0aab019963b2743c1e7899102e0cbbc1faa3b410f
                                            • Opcode Fuzzy Hash: 5084e79217ff4804a68ec6f9f4199d64467148b20662f9569eeb8a5a5fdfc3af
                                            • Instruction Fuzzy Hash: 52216B7650D3C49FCB13CF64D990711BF71AB56314F28C5DBD8898B2A3C23A981ACB62
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2931955900.0000000000A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A0D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_a0d000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a4ed01c441dbf2daa1973c50dc23c58101f48b55e8c3eeabd97830c14b8f14dd
                                            • Instruction ID: 0006c6083f4b99d2e12163c7922132b72e17a4c8b9f8a17522927169e2b0f085
                                            • Opcode Fuzzy Hash: a4ed01c441dbf2daa1973c50dc23c58101f48b55e8c3eeabd97830c14b8f14dd
                                            • Instruction Fuzzy Hash: AD210472604208DFDB14DF54E9C0B26BFA5FB84314F24C66DE84E4B296C37AD847CA62
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2932354878.0000000000C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_c50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a2518e9fbd473486fa87d764c011f1280c030311da2ce932ee934975c9fa53b4
                                            • Instruction ID: 731e706d90008948cd96a0e9cb7f0ab2960254514a10bcbe7482fbaf59afcd06
                                            • Opcode Fuzzy Hash: a2518e9fbd473486fa87d764c011f1280c030311da2ce932ee934975c9fa53b4
                                            • Instruction Fuzzy Hash: 41D2E731D10B5A8ECB15EF68C884699F7B1FF99300F51D79AE4586B121EB70AAC4CF81
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2932354878.0000000000C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_c50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ba0505c313b9b1aae9c68760506c0963c39c6414d400bb146b881b687731e031
                                            • Instruction ID: f42d5db55399ede16e7d3ff437110b120cf0c5f99a58d33d2ac2df42e651a974
                                            • Opcode Fuzzy Hash: ba0505c313b9b1aae9c68760506c0963c39c6414d400bb146b881b687731e031
                                            • Instruction Fuzzy Hash: 5D02D231D14B198ACB10EF68C884A99F7B1FF99300F51D69AE45C6B121EB70AAD4CF81
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2932354878.0000000000C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_c50000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0431a9537475d732e4c63708f31501491270a091ad97b55e5da16fd52dd5305d
                                            • Instruction ID: 41cf250cf500a67b8f5d4fbb6951cccb622c18e0198db9cb400f05ddabf98661
                                            • Opcode Fuzzy Hash: 0431a9537475d732e4c63708f31501491270a091ad97b55e5da16fd52dd5305d
                                            • Instruction Fuzzy Hash: 38B15074E00219CFDF14CFA9C88579DBBF2AF88319F148129E815E7264EB7499C9CB45