Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe

Overview

General Information

Sample name:173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe
Analysis ID:1545599
MD5:1a5a84c727dba020f92a765814abcd28
SHA1:4cc40dcef25834ceff8dc92bf73dd0087b9c2db6
SHA256:9ad59d548f173fba235517acc0a5dbd416f3890cbf622767da02c83fc0c051e7
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

LummaC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["authorisev.site", "goalyfeastz.site", "servicedny.site", "dilemmadu.site", "contemteny.site", "seallysl.site", "computeryrati.site", "faulteyotk.site", "opposezmny.site"], "Build id": "BVnUqo--@noplohoy"}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["authorisev.site", "goalyfeastz.site", "servicedny.site", "dilemmadu.site", "contemteny.site", "seallysl.site", "computeryrati.site", "faulteyotk.site", "opposezmny.site"], "Build id": "BVnUqo--@noplohoy"}
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeReversingLabs: Detection: 28%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.0% probability
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeJoe Sandbox ML: detected
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: servicedny.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: authorisev.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: faulteyotk.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: dilemmadu.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: contemteny.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: goalyfeastz.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: opposezmny.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: seallysl.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: computeryrati.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: TeslaBrowser/5.5
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: - Screen Resoluton:
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: - Physical Installed Memory:
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: Workgroup: -
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeString decryptor: BVnUqo--@noplohoy
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+7EFF7A94h]1_2_0043E84A
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then movzx esi, byte ptr [esi+ecx-4Eh]1_2_0044547C
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_00401000
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then movzx esi, byte ptr [esi+ecx-4Eh]1_2_0044542E
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_0040111D
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then movzx esi, byte ptr [esi+ecx-4Eh]1_2_0044548B
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]1_2_004060BC
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then add al, ah1_2_00405D52
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then add al, ah1_2_00405D7C
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_0040392F
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_00403933
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_0040393A
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 4x nop then add al, ah1_2_00405D3C

    Networking

    barindex
    Source: Malware configuration extractorURLs: authorisev.site
    Source: Malware configuration extractorURLs: goalyfeastz.site
    Source: Malware configuration extractorURLs: servicedny.site
    Source: Malware configuration extractorURLs: dilemmadu.site
    Source: Malware configuration extractorURLs: contemteny.site
    Source: Malware configuration extractorURLs: seallysl.site
    Source: Malware configuration extractorURLs: computeryrati.site
    Source: Malware configuration extractorURLs: faulteyotk.site
    Source: Malware configuration extractorURLs: opposezmny.site
    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 1_2_004427291_2_00442729
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 1_2_004073DE1_2_004073DE
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 1_2_004073ED1_2_004073ED
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 1_2_004073B51_2_004073B5
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 228
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal84.troj.evad.winEXE@2/5@0/0
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7468
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d1188a85-e542-48ff-a582-212ac6913761Jump to behavior
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeReversingLabs: Detection: 28%
    Source: unknownProcess created: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe "C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe"
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 228
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeCode function: 1_2_00401525 push dword ptr [edx+eax-77h]; ret 1_2_0040152A
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Amcache.hve.4.drBinary or memory string: VMware
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exeProcess queried: DebugPortJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: servicedny.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: authorisev.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: faulteyotk.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: dilemmadu.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: contemteny.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: goalyfeastz.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: opposezmny.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: seallysl.site
    Source: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: computeryrati.site
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe29%ReversingLabs
    173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    s-part-0017.t-0009.t-msedge.net
    13.107.246.45
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      goalyfeastz.sitetrue
        unknown
        servicedny.sitetrue
          unknown
          contemteny.sitetrue
            unknown
            faulteyotk.sitetrue
              unknown
              computeryrati.sitetrue
                unknown
                opposezmny.sitetrue
                  unknown
                  dilemmadu.sitetrue
                    unknown
                    seallysl.sitetrue
                      unknown
                      authorisev.sitetrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://upx.sf.netAmcache.hve.4.drfalse
                        • URL Reputation: safe
                        unknown
                        No contacted IP infos
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1545599
                        Start date and time:2024-10-30 17:54:06 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 24s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:11
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe
                        Detection:MAL
                        Classification:mal84.troj.evad.winEXE@2/5@0/0
                        EGA Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 18
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.189.173.22
                        • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe, PID 7468 because there are no executed function
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: 173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe
                        TimeTypeDescription
                        12:55:42API Interceptor1x Sleep call for process: WerFault.exe modified
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        s-part-0017.t-0009.t-msedge.netilZhNx3JAc.batGet hashmaliciousAgentTeslaBrowse
                        • 13.107.246.45
                        87M9Y3P4Z7.batGet hashmaliciousAgentTeslaBrowse
                        • 13.107.246.45
                        phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                        • 13.107.246.45
                        https://schiller.life/Get hashmaliciousHTMLPhisherBrowse
                        • 13.107.246.45
                        https://jpm-ghana-2024-election-conversation-with-oct-24.open-exchange.net/join-the-call?ml_access_token=eyJjb250ZW50Ijp7ImV4cGlyYXRpb25EYXRlIjoiMjAyNC0xMC0zMVQxNToyMDo1OS4wMDZaIiwiZW1haWwiOiJyZGVpdHpAdnItY2FwaXRhbC5jb20iLCJldmVudElkIjo0MjY3Mn0sInNpZ25hdHVyZSI6Ik1FVUNJQzhaMDJJblVZd0syUk9WRkdjL1pMNHRBbWo4RmwxdW9mQjhwZzRmSjZsMkFpRUE5d25HUFFoa3ZrdkM2MlJkQ3lkM09YbnFJZ0xlQTAwMDIxNlRWbG9Hb0ZjPSJ9Get hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        Derickdermatology.htmlGet hashmaliciousPhisherBrowse
                        • 13.107.246.45
                        https://www.mediafire.com/file/oyfycncwen0a3ue/DSP_Plan_Set.zip/fileGet hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        https://myworkspacec1d73.myclickfunnels.com/onlinereview--9cb35?preview=trueGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                        • 13.107.246.45
                        Receipt.htmGet hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        weekly-finances-report.xlsxGet hashmaliciousKnowBe4Browse
                        • 13.107.246.45
                        No context
                        No context
                        No context
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.7152449434996158
                        Encrypted:false
                        SSDEEP:96:hdDF2ZSFx5tanLBtLtVLsft9hv1yDf0QXIDcQzc6CmcE1cw3CF3tE3ts+HbHg6ZZ:f8YFxObLV0NXfPjEzuiFxZ24IO8KS/
                        MD5:B5FAC125C77A5313AA3C10BF168A2680
                        SHA1:BB9FE915178B6C0FFE202FDC1E497F449C41E367
                        SHA-256:07A9A3EC8E636466A1D225404613BBE7EF99B0888FF16DFCB84418917152342D
                        SHA-512:4CE66C2C280E03511DDEECAFE6D87CBD08CCF353ED7C747733CFFE087335DBECC390E36CFC010C87373FF2ACA47EAF4B35E034CB345DA84206F38718114E923D
                        Malicious:false
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.7.8.0.9.1.8.7.3.8.8.1.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.7.8.0.9.1.9.9.1.0.6.9.0.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.2.4.6.5.8.7.a.-.1.b.6.0.-.4.d.a.a.-.b.5.9.e.-.d.6.1.a.7.7.1.d.1.0.d.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.c.8.5.4.f.c.1.-.0.d.f.c.-.4.7.0.b.-.a.a.b.4.-.3.8.0.e.d.0.a.e.2.2.7.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.7.3.0.3.0.7.1.8.8.8.2.f.d.8.a.7.8.a.f.f.7.f.b.8.b.0.3.8.f.7.e.8.d.b.4.8.c.b.3.c.0.9.5.5.5.e.d.5.3.a.2.9.2.9.b.e.b.f.8.d.4.2.5.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.c.-.0.0.0.1.-.0.0.1.4.-.e.b.4.b.-.a.3.7.f.e.c.2.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.7.9.5.d.1.a.8.0.e.3.b.2.f.c.4.0.0.4.5.5.4.0.0.5.5.d.d.f.4.b.f.0.0.0.0.f.f.f.f.!.0.0.0.0.4.c.c.4.0.d.c.e.f.2.5.8.3.4.c.e.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Wed Oct 30 16:55:19 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):19618
                        Entropy (8bit):2.054564572295005
                        Encrypted:false
                        SSDEEP:96:5b8Rr/z9y4/LnYtni7nfTru2wfJ+lWI/WItDAIZavHf:SuAjCOLaVx+Baff
                        MD5:4FF1691C40C9FA6FC72838D0E710193C
                        SHA1:67573A6C4C396AD5C52F893497996E4729E11310
                        SHA-256:0F6B35892061F3D87BE4ADCED5A4B334AF52421986EB4FAD24004BE9F9FA0214
                        SHA-512:55547F19FF4619212DDC62D27805B3FF066C507A3005EFB5117F2B6C7D084388BA786A83FD2ABE2EAEC7CEC7A5FE09AE0B1D76F5486E9C14F631CC38743BE37A
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... ........d"g............4...............<.......d...<...........T.......8...........T...........H...ZC......................................................................................................eJ......L.......GenuineIntel............T.......,....d"g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8548
                        Entropy (8bit):3.704302124196047
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJRR6Aj6YN6SU9X0gmfRJPWOJpx389bj6sf9YFshm:R6lXJn6Aj6YASU9X0gmfRJPWO+jZf9Y1
                        MD5:5BFE1AAA74EECC82F39312F4C98AF5C1
                        SHA1:FC143E7F9F9A6BE93D32934DE47BBA425C04AF4D
                        SHA-256:74A6E3FED578EE1F9659A6CDE03EB86F4A8281D7E48C36A95DEDFB7DA10EE383
                        SHA-512:CE6D1AF67AE2AD24BAD42530B7FF220A01F452939DE7D6557117848BF57CAF703C80A129157AADF24550CB430ACFAC5EB668234A3FFD97D06D3A07B5953C3BD5
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.8.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4893
                        Entropy (8bit):4.563585452127324
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsTJg77aI9NaWpW8VYjYm8M4JIKFw2+q8wiS7rU8r5d:uIjftI7jb7VDJhWSHUc5d
                        MD5:9F304CD94A19CE0561503C5AFF4E51D9
                        SHA1:3C17F73D5F25E123030EBD7A7B31A72914B838B7
                        SHA-256:289C5DC92D86A3CEBC5331F20AE027BE4B8712885DCC8ED4FAA2784475025FDA
                        SHA-512:EA351B0BF74783862BDF9B86E6E756091BBFD3DF5914A268F636AE1DE1561A8C142D450DB90B4A02A22203FDD6BFE5F1E564CA2576905C5450D722BD86FF6539
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="566398" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.417171185622592
                        Encrypted:false
                        SSDEEP:6144:Scifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNW5+:/i58oSWIZBk2MM6AFBQo
                        MD5:758FD419C089A58C7099F394200C0B26
                        SHA1:4281559B5AC2FBF1685D3515FB3AFEBC7774D96E
                        SHA-256:F7821F11E835BD76F96A37C6A73CF13E3521C644FAF316D913A31A5DE94DFD52
                        SHA-512:94A3AEE2DC60F1C3ED53A3F6AB86710FF8F8AA31AE79FE04274D16C988C29EFEE0D59E757E2EB5DEC968B8F2D536BAB6090BB6640BEBD0A907113AD9B3C6D831
                        Malicious:false
                        Reputation:low
                        Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm>D...*..............................................................................................................................................................................................................................................................................................................................................t...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.78662608756997
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe
                        File size:356'100 bytes
                        MD5:1a5a84c727dba020f92a765814abcd28
                        SHA1:4cc40dcef25834ceff8dc92bf73dd0087b9c2db6
                        SHA256:9ad59d548f173fba235517acc0a5dbd416f3890cbf622767da02c83fc0c051e7
                        SHA512:bae6730a7ce17e483757607a2d9a4de3aed391f77f6c8f23cb5945b8db08eb1c2afbcda8a14574de5abc8e3f6cd0b8ddeff078a75e512b29c5c976e16c2996f5
                        SSDEEP:6144:dYGQfZuMP44Qw+f5osENySVbhRpRbWzlYUJZX1mR6E9KUOexDsVZc:dMUg4465oDzizyOXgwUOT
                        TLSH:58749F06EB7390E0DC83447552DEB37FA97AB60443384E87DB5CDFE068A3AA17835946
                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......g.................N........................@.......................................@.................................R......
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x40d1b0
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x6715CDBC [Mon Oct 21 03:42:52 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:
                        Instruction
                        jmp 00007F14B5223D68h
                        mov ecx, dword ptr [esp+000015C8h]
                        mov dword ptr [esp+00000938h], 00000000h
                        cmp ebx, 02h
                        jl 00007F14B5223E88h
                        lea ecx, dword ptr [ebx-10h]
                        loopne 00007F14B5223E70h
                        mov bh, 83h
                        push cs
                        add al, EBh
                        jnp 00007F14B5223E24h
                        jne 00007F14B5223E2Bh
                        xor eax, eax
                        mov edx, 00000002h
                        jmp 00007F14B5223E5Eh
                        mov ebx, ecx
                        cmp byte ptr [eax], 00000013h
                        lodsd
                        jecxz 00007F14B5223DE5h
                        cmp dword ptr [edx], 31C031DEh
                        rcl byte ptr [eax-6F6F6F70h], cl
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        add eax, dword ptr [esp+edx*4+34h]
                        add eax, eax
                        mov dword ptr [esp+edx*4+0000093Ch], eax
                        add eax, dword ptr [esp+edx*4+38h]
                        add eax, eax
                        mov dword ptr [esp+edx*4+00000940h], eax
                        add edx, 02h
                        cmp ebx, edx
                        jne 00007F14B5223E01h
                        add edx, 02h
                        test cl, 00000001h
                        mov ecx, dword ptr [esp+000015C8h]
                        je 00007F14B5223E2Fh
                        add eax, dword ptr [esp+edx*4+2Ch]
                        add eax, eax
                        mov dword ptr [esp+edx*4+00000934h], eax
                        test ecx, ecx
                        add al, ah
                        dec esi
                        mov bh, 8Eh
                        int 00h
                        add byte ptr [eax], al
                        xor eax, eax
                        mov edx, dword ptr [esp+1Ch]
                        lea edi, dword ptr [edx+edx*8]
                        mov edx, edi
                        shl edx, 05h
                        mov esi, dword ptr [esp+10h]
                        add edx, esi
                        shl edi, 06h
                        add edi, esi
                        mov dword ptr [esp+04h], edi
                        jmp 00007F14B5223E4Ah
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        mov ecx, dword ptr [esp+04h]
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x480520x8c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x4ba0.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x4819c0xbc.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x44dc60x44e00ba330312fd049b1ad78891401e7efe67False0.5383074807168784data6.628298058678767IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x460000x25270x260095c2ee8e3fb5138e53a74f8b67ebfe5fFalse0.6267475328947368data6.7448430786042515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x490000xf6900x6400d94bfaf4873995aa31e89ec3bb7114c9False0.5233984375data6.8381785514156945IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0x590000x4ba00x4c00dd8748defe8447455cee38253b697395False0.5301192434210527data6.2188521593590425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 30, 2024 17:55:13.645550966 CET1.1.1.1192.168.2.70x3f13No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                        Oct 30, 2024 17:55:13.645550966 CET1.1.1.1192.168.2.70x3f13No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:1
                        Start time:12:55:17
                        Start date:30/10/2024
                        Path:C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d42568818593e6176.dat-decoded.exe"
                        Imagebase:0x400000
                        File size:356'100 bytes
                        MD5 hash:1A5A84C727DBA020F92A765814ABCD28
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Target ID:4
                        Start time:12:55:18
                        Start date:30/10/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 228
                        Imagebase:0x2c0000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                          • Instruction ID: 50ea3f66718b9f0aec2dde1cafbd8e4c0de0bc4ea73b4abfd2f3b225e7e50961
                          • Opcode Fuzzy Hash: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                          • Instruction Fuzzy Hash: AC515CB16047418FD32A8F28C8947A67F96EF62305F1941AFD0825B3A1D7B89E4AC7C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                          • Instruction ID: f7c5b6151606094664de1af60f9128b8343ad51cb9d90a512a25ca090a2e4e3f
                          • Opcode Fuzzy Hash: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                          • Instruction Fuzzy Hash: 333109B15047419FD32A8F24889862B7F57AB62305B1982BFC4511B3E2D3F8DA19C7C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                          • Instruction ID: 8d1535539f6c5361cf9dca1fd3e7e74b7c3d02e9c21871ba0092eb5ffd02d52e
                          • Opcode Fuzzy Hash: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                          • Instruction Fuzzy Hash: 6131A3B1A047115ED32A8F14889862BBE97AB62315F1982BBC0516B3E1D3F8DA1DC7C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                          • Instruction ID: 667a8602ed86c8e57a971cd8e4128e82d883590cc2420ca462f20316beda6c97
                          • Opcode Fuzzy Hash: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                          • Instruction Fuzzy Hash: 8A31B2B19047115ED32A8F14889872BBE57AB62315F1982BBC0516B3E1D3F89A1DC7C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                          • Instruction ID: a3f89da26ddce334d935fd876fc161bfabed00f9a58923f1678de83345a9f44d
                          • Opcode Fuzzy Hash: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                          • Instruction Fuzzy Hash: 1E015EF25113008FC32E8F41D8D493BBF27A6B2314326A2AFC0402B261D3B5C62DCB88
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID: MO
                          • API String ID: 0-1334946670
                          • Opcode ID: b6aff7123218be1a0d1602fb4b240106a2eb7943352475ec984eacc4ea201a01
                          • Instruction ID: 5785bae2aa9a70ada213d4cc5ece7b5e088b4d6b833ab07ae3980fca8a13a13e
                          • Opcode Fuzzy Hash: b6aff7123218be1a0d1602fb4b240106a2eb7943352475ec984eacc4ea201a01
                          • Instruction Fuzzy Hash: 13210071A08745AFE3118E24DC4170ABFE5AFE2300F04895EE4E89B294D7748946C792
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a71fcf114eb94f91a89038221a7da89add4612ed83818a1b0de7c21c6e54832e
                          • Instruction ID: 6458114db20999368ecdf2dbd514df0989909b65eb10b55967aa45296c67be28
                          • Opcode Fuzzy Hash: a71fcf114eb94f91a89038221a7da89add4612ed83818a1b0de7c21c6e54832e
                          • Instruction Fuzzy Hash: 2061ACB2B153009FE715CF24CD8175ABBD2EBE6314F5985AFE48187252C778C802C796
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bc4911aad12808fb5ddc6cd2a25baab3b00e5fdd003218fe9c1d8c32f8f31474
                          • Instruction ID: b5b5737c89c1aede0922476ab6603e85e3440ab81fcd943452ed9ff030fa79aa
                          • Opcode Fuzzy Hash: bc4911aad12808fb5ddc6cd2a25baab3b00e5fdd003218fe9c1d8c32f8f31474
                          • Instruction Fuzzy Hash: 4251D3B5A046018FC714DF18C88081BB7E1FF99324F15867EE899AB392D635ED42CF96
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cc4cd74da72f572b0ecb66daa44d5b419c04e2dc052bc831a8dfba3a25b28a2f
                          • Instruction ID: 39874928ab33cbcae12bf39dee43c5dc33ce356178645b1f83f907bf179e10aa
                          • Opcode Fuzzy Hash: cc4cd74da72f572b0ecb66daa44d5b419c04e2dc052bc831a8dfba3a25b28a2f
                          • Instruction Fuzzy Hash: 575131B0404701AFD7109F28EC48607BBB0FF41328F154739E9A6562E2E735E975DB8A
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d4a1146ade3cd12f3cbc8031ddf7e5a1b28b60066d05b3a0c9ebf6515fe46b43
                          • Instruction ID: a9c2fe42e9e0335d089e68f3832008025a41de2d4199b8b4062b125ed52e4e37
                          • Opcode Fuzzy Hash: d4a1146ade3cd12f3cbc8031ddf7e5a1b28b60066d05b3a0c9ebf6515fe46b43
                          • Instruction Fuzzy Hash: BC31D175A146018FC714CF18C88065BB7A2FF95314F298A7AEC99AB391E635DC428F86
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 36d0b131f462754af5f55e879ec2882f5de732510407c2e63ad20b50b08b2635
                          • Instruction ID: 5b2bfbff871702cadb45cc61de65391fe638e345797a24207ff2362b7d3ca7bc
                          • Opcode Fuzzy Hash: 36d0b131f462754af5f55e879ec2882f5de732510407c2e63ad20b50b08b2635
                          • Instruction Fuzzy Hash: E531B175A04601CFC7108F18C48455BB7A1FF95324F29C67BE899AB391D639DC428F85
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2756ed4631783ae0cc829404af07eadf753561bb50897bdfdf90c7d9c5c52181
                          • Instruction ID: 7191519e40c2549bdc5fb28814f5e176edbe34b71cf25d64ae5d41f4b316713b
                          • Opcode Fuzzy Hash: 2756ed4631783ae0cc829404af07eadf753561bb50897bdfdf90c7d9c5c52181
                          • Instruction Fuzzy Hash: 5F210537B1C3624BE351CF35DCC425B7B92EB87214B1A017AE981D7382C676F802D296
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: df886b0847863313051c2667727db0ab781dfdfa4379abec52b675b3adf67df5
                          • Instruction ID: 905e1fac2abb8f754d5982ac808e9b332f0fa649e7db131ac9d538a820bac972
                          • Opcode Fuzzy Hash: df886b0847863313051c2667727db0ab781dfdfa4379abec52b675b3adf67df5
                          • Instruction Fuzzy Hash: 6F01B13BB285310BE3509F79ECC814A6753F78721531E0231EA81D7242C632F412E18A
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f41794e3928cb6e0539c6a4908f13629fe67f6b067a3fbe579289c771abfb159
                          • Instruction ID: 1f74f8a4c37e39be6e754943e961f0cb521ce6c8b1f3894f2a16a0648568570b
                          • Opcode Fuzzy Hash: f41794e3928cb6e0539c6a4908f13629fe67f6b067a3fbe579289c771abfb159
                          • Instruction Fuzzy Hash: BB017B329615A047E3188D7ACC813B26B90D727205F2914BFC183DB652C49CDC43874D
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e59bd75f90f6762a350f60cc67819cdfbff5167c3b74ca74d3300752da125bf8
                          • Instruction ID: 500497e234893a58bc26809d79ac84d0b2d2eddbc2fdeebfa3b9623f375600f1
                          • Opcode Fuzzy Hash: e59bd75f90f6762a350f60cc67819cdfbff5167c3b74ca74d3300752da125bf8
                          • Instruction Fuzzy Hash: 86F0E93699167047E7288E3588411B3BBA1FB5A314B150C6ED9C2DB701D5ACDC4387C9
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1e3f459278469afbb133ee62e0ee88876258ec6f3384b2c6b1d440ac83ad25e7
                          • Instruction ID: b2580c2385783fb1a5ea8edc422510b9d5f88dfb76d8483e2c9e75cbe2d4b030
                          • Opcode Fuzzy Hash: 1e3f459278469afbb133ee62e0ee88876258ec6f3384b2c6b1d440ac83ad25e7
                          • Instruction Fuzzy Hash: D2F027339896B047E3198E398C511F3BBA0EB1B210B1A04AFD8C2EB642C45CDC43838A
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1f28a8a5de9b0aa23fd99f53cd2d8b87933a2631140e4c19104637d173a8c570
                          • Instruction ID: c67997776537e714a7077ce1c875711bb1b3b6b18745c46573b70cc1e1626955
                          • Opcode Fuzzy Hash: 1f28a8a5de9b0aa23fd99f53cd2d8b87933a2631140e4c19104637d173a8c570
                          • Instruction Fuzzy Hash: 26F0BE2FB286714BE7A18F65ECC800A6703E78621571E0135EB81D7782C676F522D256
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2625299316.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2625280273.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625337973.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625358305.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625379231.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2625402061.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_173030718882fd8a78aff7fb8b038f7e8db48cb3c09555ed53a2929bebf8d425688185.jbxd
                          Similarity
                          • API ID:
                          • String ID: L)v+$M%T'$R!@#$]5Z7$]9I;$_1T3$|-\/
                          • API String ID: 0-2252748621
                          • Opcode ID: dc919fad064744963025305389dc530fa56a26dd8fe6e17e50d56424eaa40650
                          • Instruction ID: e6905b68e736da697c87da36dda6cdf621680ae388a30db01868de207295afc1
                          • Opcode Fuzzy Hash: dc919fad064744963025305389dc530fa56a26dd8fe6e17e50d56424eaa40650
                          • Instruction Fuzzy Hash: 015177B02147A1AFD7258F2498817867FF0EB17310F994A9DD4A68FB62C3B48807CB85