Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe

Overview

General Information

Sample name:1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe
Analysis ID:1545602
MD5:f74e38a857d9dc8f50ecf49bed208e83
SHA1:9d5236f192e87b788a8dca488c5786fa875d7765
SHA256:12dde6ea3c670f14799fc69df12216f93b853f17dcae5a936c238d2ebabd2746
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

LummaC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["goalyfeastz.site", "opposezmny.site", "seallysl.site", "contemteny.site", "dilemmadu.site", "servicedny.site", "authorisev.site", "faulteyotk.site"], "Build id": "24cuQj--"}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["goalyfeastz.site", "opposezmny.site", "seallysl.site", "contemteny.site", "dilemmadu.site", "servicedny.site", "authorisev.site", "faulteyotk.site"], "Build id": "24cuQj--"}
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeReversingLabs: Detection: 31%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeJoe Sandbox ML: detected
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: servicedny.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: authorisev.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: faulteyotk.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: dilemmadu.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: contemteny.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: goalyfeastz.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: opposezmny.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: seallysl.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: seallysl.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: TeslaBrowser/5.5
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: - Screen Resoluton:
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: - Physical Installed Memory:
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: Workgroup: -
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeString decryptor: 24cuQj--
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_00401000
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_0040111D
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_0040392F
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_00403933
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_0040393A
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h1_2_0040D33A

    Networking

    barindex
    Source: Malware configuration extractorURLs: goalyfeastz.site
    Source: Malware configuration extractorURLs: opposezmny.site
    Source: Malware configuration extractorURLs: seallysl.site
    Source: Malware configuration extractorURLs: contemteny.site
    Source: Malware configuration extractorURLs: dilemmadu.site
    Source: Malware configuration extractorURLs: servicedny.site
    Source: Malware configuration extractorURLs: authorisev.site
    Source: Malware configuration extractorURLs: faulteyotk.site
    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 1_2_00441AE51_2_00441AE5
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 1_2_0040B17B1_2_0040B17B
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 1_2_0040B1811_2_0040B181
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7460 -s 224
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal84.troj.evad.winEXE@2/5@0/0
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7460
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\0c814671-febe-4217-b5d5-01ff72456f9eJump to behavior
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeReversingLabs: Detection: 31%
    Source: unknownProcess created: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe "C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe"
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7460 -s 224
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeCode function: 1_2_00401525 push dword ptr [edx+eax-77h]; ret 1_2_0040152A
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Amcache.hve.4.drBinary or memory string: VMware
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exeProcess queried: DebugPortJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe, 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: servicedny.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe, 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: authorisev.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe, 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: faulteyotk.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe, 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: dilemmadu.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe, 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: contemteny.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe, 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: goalyfeastz.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe, 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: opposezmny.site
    Source: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe, 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: seallysl.site
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe32%ReversingLabs
    1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    s-part-0017.t-0009.t-msedge.net
    13.107.246.45
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      goalyfeastz.sitetrue
        unknown
        servicedny.sitetrue
          unknown
          contemteny.sitetrue
            unknown
            faulteyotk.sitetrue
              unknown
              opposezmny.sitetrue
                unknown
                seallysl.sitetrue
                  unknown
                  dilemmadu.sitetrue
                    unknown
                    authorisev.sitetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.4.drfalse
                      • URL Reputation: safe
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1545602
                      Start date and time:2024-10-30 17:54:13 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 12s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:10
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe
                      Detection:MAL
                      Classification:mal84.troj.evad.winEXE@2/5@0/0
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 11
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.42.73.29
                      • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe, PID 7460 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: 1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe
                      TimeTypeDescription
                      12:55:25API Interceptor1x Sleep call for process: WerFault.exe modified
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      s-part-0017.t-0009.t-msedge.netilZhNx3JAc.batGet hashmaliciousAgentTeslaBrowse
                      • 13.107.246.45
                      87M9Y3P4Z7.batGet hashmaliciousAgentTeslaBrowse
                      • 13.107.246.45
                      phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                      • 13.107.246.45
                      https://schiller.life/Get hashmaliciousHTMLPhisherBrowse
                      • 13.107.246.45
                      https://jpm-ghana-2024-election-conversation-with-oct-24.open-exchange.net/join-the-call?ml_access_token=eyJjb250ZW50Ijp7ImV4cGlyYXRpb25EYXRlIjoiMjAyNC0xMC0zMVQxNToyMDo1OS4wMDZaIiwiZW1haWwiOiJyZGVpdHpAdnItY2FwaXRhbC5jb20iLCJldmVudElkIjo0MjY3Mn0sInNpZ25hdHVyZSI6Ik1FVUNJQzhaMDJJblVZd0syUk9WRkdjL1pMNHRBbWo4RmwxdW9mQjhwZzRmSjZsMkFpRUE5d25HUFFoa3ZrdkM2MlJkQ3lkM09YbnFJZ0xlQTAwMDIxNlRWbG9Hb0ZjPSJ9Get hashmaliciousUnknownBrowse
                      • 13.107.246.45
                      Derickdermatology.htmlGet hashmaliciousPhisherBrowse
                      • 13.107.246.45
                      https://www.mediafire.com/file/oyfycncwen0a3ue/DSP_Plan_Set.zip/fileGet hashmaliciousUnknownBrowse
                      • 13.107.246.45
                      https://myworkspacec1d73.myclickfunnels.com/onlinereview--9cb35?preview=trueGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                      • 13.107.246.45
                      Receipt.htmGet hashmaliciousUnknownBrowse
                      • 13.107.246.45
                      weekly-finances-report.xlsxGet hashmaliciousKnowBe4Browse
                      • 13.107.246.45
                      No context
                      No context
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.7119453233365391
                      Encrypted:false
                      SSDEEP:96:onFwaIJxHH/s67hA1yDf0QXIDcQzc6CmcE1cw3C0tO+HbHg6ZAX/d5FMT2SlPkpN:OPI/H/r0NXfPjEzuiFxZ24IO82
                      MD5:0E8E632D887E80C7CFD26E271C6EB4B4
                      SHA1:E1D64A553C59BE37D49FEC048A18BBF6F4BBE315
                      SHA-256:396AC2B161DADF392891A0570E1C0C2E26706FAB7118B5F7841017BD53A9052E
                      SHA-512:55A19CA692263AE723353AE081F30D64D4F0C03A3E7777E496FA4CC3391F04C4AB5BAF9CCA129A9D3519DD13A4330AC7E19EAE38C5CFDBC17987851DA1A87706
                      Malicious:false
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.7.8.0.9.1.8.0.9.3.0.4.3.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.7.8.0.9.1.9.3.8.9.9.2.5.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.0.2.1.4.a.3.2.-.4.4.e.a.-.4.4.8.6.-.a.f.6.c.-.8.c.b.1.9.2.4.2.9.5.c.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.4.d.a.7.9.b.9.-.2.5.c.1.-.4.e.3.3.-.8.f.e.7.-.0.a.9.2.0.0.1.6.7.4.5.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.7.3.0.3.0.7.1.8.7.a.e.9.a.b.5.f.d.6.9.c.c.1.3.e.a.4.2.f.8.d.2.3.4.1.e.e.b.4.e.8.2.c.6.4.2.0.3.5.2.d.b.8.4.4.9.2.c.a.0.0.1.9.c.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.2.4.-.0.0.0.1.-.0.0.1.3.-.b.a.b.9.-.f.0.7.e.e.c.2.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.b.1.8.b.2.a.a.4.b.1.2.2.d.3.c.c.c.2.1.8.5.c.f.9.6.f.3.f.b.b.3.0.0.0.0.f.f.f.f.!.0.0.0.0.9.d.5.2.3.6.f.1.9.2.e.8.7.b.7.8.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Wed Oct 30 16:55:18 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):19618
                      Entropy (8bit):2.0471683913477583
                      Encrypted:false
                      SSDEEP:96:5G88wXxLrxQSlfQ2Fi7nn3jtMpxmVkhWI/WItD+SOvzVp:n7OiQUOTYmiObH
                      MD5:F12D14841CE52F7DEFB1CF7C1E5BD55B
                      SHA1:F65A7E762403154D472F7846DAF87DEA8B26796C
                      SHA-256:7336A1D603C0F6752AFB813D05A66F797284D102A41189BEF39CDBE151680DBB
                      SHA-512:6EB98709797EA89CEB8F5FCB8174C674FBB1FADEB27B8D92B23539CF227D1CBC0EE5C279410921C0ACF3B983A6992A8123D9A5B640C94B1F4B2AB551C1E1472A
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... ........d"g............4...............<.......d...<...........T.......8...........T...........H...ZC......................................................................................................eJ......L.......GenuineIntel............T.......$....d"g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8550
                      Entropy (8bit):3.698609972335545
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJMc6AV6YWHSUjdwgmfPJPWOipxR489badsfshm:R6lXJn6AV6YWSURwgmfPJPWOiFaWfX
                      MD5:9EA5D34BB64EE4E52CF3E6F88F1FBE15
                      SHA1:60492799D1D85B0B490FCD52EE0A72A5FAD94086
                      SHA-256:3D76DDFF931D724586F358D676AA104F8B35B3C2692890546994BB1E8A2B80D5
                      SHA-512:83EE9A0FB281131E5B810FDB85754FCB3C4804F0C9B8F3B91DDC08E8FC49F6EB0B168753774A9F4810DE1AD9D69A767CF6BCEA6AF396001939C9A58B0B960D50
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.6.0.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4893
                      Entropy (8bit):4.551907183399658
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsTJg77aI9FjKWpW8VYvYm8M4JmnAnhKFs+q8nnQNftnvIQnvIKd:uIjftI73r7VrJ3RGPKd
                      MD5:724C972F027CC6EA2C064AC8EDB3AED0
                      SHA1:4773EF469D349796CA3BEECFB3372526D7482649
                      SHA-256:4A07E2E996E8CF5C3798B33FB6B2CC7D5F2FE447CC39FBEB0BD9E47D4F641FB8
                      SHA-512:7C7948CFB6B4677BF5DE515379FA4151FA68E46C1A636CCAB25B1CE8AD39E51ABD19FEA563AFBEA686FB7597E88637A0949AE756E41FE0A0DDD31FC927B2710E
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="566398" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.29593060903228
                      Encrypted:false
                      SSDEEP:6144:J41fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs+dumBMZJh1Vj6:e1/YCW2AoQ0NiHuwMHrVu
                      MD5:99C45C31781885549C94F6492DAEE18C
                      SHA1:59F5233E558F4CB19E331751B1F228B37BB6D8F5
                      SHA-256:2F63A1995704687AEB8727479DF68B5BC136019F2156541BFD091FA0319675D6
                      SHA-512:F602564A5D35AB3D41451878CF8F737104AF7B222FF20D070757017DC21F16287AFA827E77256D084F17CA02293729496382730E1FF36A4EC0B6BDE213FB276A
                      Malicious:false
                      Reputation:low
                      Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....*.................................................................................................................................................................................................................................................................................................................................................K........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.797791924958387
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe
                      File size:352'830 bytes
                      MD5:f74e38a857d9dc8f50ecf49bed208e83
                      SHA1:9d5236f192e87b788a8dca488c5786fa875d7765
                      SHA256:12dde6ea3c670f14799fc69df12216f93b853f17dcae5a936c238d2ebabd2746
                      SHA512:4c24117037e1309d9f8e45e0ec7681d571afaa85c0cefe3a177aaf80adbdb26c4a98c0dad80448f5ff456f3a319efb2e92cfcb9305f9416685fdd7608ceb7c38
                      SSDEEP:6144:7dGH3aV6ldgUHXAvgYi8w2HewuhLJcm7S3AXLyRmx6qA8gF/Kdee:7yqV6ldgUHXRi4JcwKJRmx6H8yaH
                      TLSH:A1748D05EB7380A1CCC78C7561DEBB7F997A6A0447384ED7CB5CDEA428A36D13839906
                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......g.................D........................@.......................................@.................................R......
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x40d0b0
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6715CDA7 [Mon Oct 21 03:42:31 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      nop
                      nop
                      nop
                      nop
                      nop
                      add eax, dword ptr [esp+edx*4+34h]
                      add eax, eax
                      mov dword ptr [esp+edx*4+0000093Ch], eax
                      add eax, dword ptr [esp+edx*4+38h]
                      add eax, eax
                      mov dword ptr [esp+edx*4+00000940h], eax
                      add edx, 02h
                      cmp ebx, edx
                      jne 00007F4404B193A2h
                      loopne 00007F4404B19420h
                      mov bh, 83h
                      retn F602h
                      rol dword ptr [ecx], FFFFFF8Bh
                      mov word ptr [eax+ecx*8], fs
                      adc eax, 0D740000h
                      add eax, dword ptr [esp+edx*4+2Ch]
                      add eax, eax
                      mov dword ptr [esp+edx*4+00000934h], eax
                      test ecx, ecx
                      jng 00007F4404B194A3h
                      xor eax, eax
                      mov edx, dword ptr [esp+20h]
                      lea edi, dword ptr [edx+edx*8]
                      mov dword ptr [esi], ecx
                      add al, EBh
                      jp 00007F4404B19393h
                      loop 00007F4404B193D7h
                      mov esi, dword ptr [esp+10h]
                      add edx, esi
                      shl edi, 06h
                      add edi, esi
                      mov dword ptr [esp+04h], edi
                      jmp 00007F4404B193FAh
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      mov ecx, dword ptr [esp+04h]
                      mov word ptr [ecx+eax*2+00008852h], di
                      mov ecx, dword ptr [esp+000015C8h]
                      inc eax
                      cmp eax, ecx
                      add al, ah
                      dec esi
                      mov bh, 84h
                      xchg byte ptr [eax], al
                      add byte ptr [eax], al
                      add al, ah
                      dec esi
                      mov bh, B6h
                      pushfd
                      adc byte ptr [edx], dl
                      pop dword ptr [eax]
                      add byte ptr [ebp-74148B25h], al
                      mov word ptr [esp+esi-72FFFFF7h], ds
                      jns 00007F4404B193D3h
                      mov dword ptr [esp+ebx*4+00000934h], edi
                      xor eax, esi
                      loopne 00007F4404B19420h
                      mov bh, 80h
                      push cs
                      add al, EBh
                      jnp 00007F4404B193D6h
                      jc 00007F4404B19411h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x480520x8c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x4b80.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x4819c0xbc.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x442b80x444002cd4ae25ebdaee6c85ce1315e56eabcfFalse0.5441170157967034data6.641637773832036IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x460000x25270x26009175939b333ffddb8594b46408474ea6False0.6291118421052632data6.741066085511267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x490000xf5180x62008d01c99911841312711ca2641732de22False0.5073740433673469data6.79746027968583IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .reloc0x590000x4b800x4c0099fb7d76beb18648abc30e0923c44a04False0.5263671875data6.219770649256565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 30, 2024 17:55:11.272275925 CET1.1.1.1192.168.2.100xd66fNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                      Oct 30, 2024 17:55:11.272275925 CET1.1.1.1192.168.2.100xd66fNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:1
                      Start time:12:55:16
                      Start date:30/10/2024
                      Path:C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38aa20894.dat-decoded.exe"
                      Imagebase:0x400000
                      File size:352'830 bytes
                      MD5 hash:F74E38A857D9DC8F50ECF49BED208E83
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:4
                      Start time:12:55:17
                      Start date:30/10/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7460 -s 224
                      Imagebase:0xe00000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                        • Instruction ID: 50ea3f66718b9f0aec2dde1cafbd8e4c0de0bc4ea73b4abfd2f3b225e7e50961
                        • Opcode Fuzzy Hash: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                        • Instruction Fuzzy Hash: AC515CB16047418FD32A8F28C8947A67F96EF62305F1941AFD0825B3A1D7B89E4AC7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                        • Instruction ID: f7c5b6151606094664de1af60f9128b8343ad51cb9d90a512a25ca090a2e4e3f
                        • Opcode Fuzzy Hash: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                        • Instruction Fuzzy Hash: 333109B15047419FD32A8F24889862B7F57AB62305B1982BFC4511B3E2D3F8DA19C7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                        • Instruction ID: 8d1535539f6c5361cf9dca1fd3e7e74b7c3d02e9c21871ba0092eb5ffd02d52e
                        • Opcode Fuzzy Hash: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                        • Instruction Fuzzy Hash: 6131A3B1A047115ED32A8F14889862BBE97AB62315F1982BBC0516B3E1D3F8DA1DC7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                        • Instruction ID: 667a8602ed86c8e57a971cd8e4128e82d883590cc2420ca462f20316beda6c97
                        • Opcode Fuzzy Hash: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                        • Instruction Fuzzy Hash: 8A31B2B19047115ED32A8F14889872BBE57AB62315F1982BBC0516B3E1D3F89A1DC7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                        • Instruction ID: a3f89da26ddce334d935fd876fc161bfabed00f9a58923f1678de83345a9f44d
                        • Opcode Fuzzy Hash: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                        • Instruction Fuzzy Hash: 1E015EF25113008FC32E8F41D8D493BBF27A6B2314326A2AFC0402B261D3B5C62DCB88
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID: ;:54
                        • API String ID: 0-2887251705
                        • Opcode ID: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                        • Instruction ID: c9837bf11cf4ad60dd6dd8dd9122ae42f90ca62632c53ad74a67825a83bc24ac
                        • Opcode Fuzzy Hash: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                        • Instruction Fuzzy Hash: F5A1BE72B153809FE715DA29DC807A6BF93EB96300F1D84AFD481DB322E6399C81C345
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 715d7916b224c39307e0617a062feb3ddebb362834602855e4efd5692a3746ef
                        • Instruction ID: b7764c4af62fa0c2d5b5ef5cd1ab6a06a14ec5ca4f1d67a2cca15874c182747d
                        • Opcode Fuzzy Hash: 715d7916b224c39307e0617a062feb3ddebb362834602855e4efd5692a3746ef
                        • Instruction Fuzzy Hash: 64414D7110D3809FD3258B68884065FBFE0AFAA604F480D5DF5C5AB383C665E619CBAB
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e854304da8fa9dae1a0fad74b231f64dd279c4c28cf09559f9af3042c2b94788
                        • Instruction ID: 15271058e7cda56ff3f9a36a900eb8e385046b1bc0e6906e50e720d0b9c466b1
                        • Opcode Fuzzy Hash: e854304da8fa9dae1a0fad74b231f64dd279c4c28cf09559f9af3042c2b94788
                        • Instruction Fuzzy Hash: 6F414C7110D3808FD3158B6C884165FBFE0AFAA604F480D5DF5C5AB383C665E619CBAB
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                        • Instruction ID: 4efda905ac7a41cadf9716579617f48ebd0f1d3c79b6496c68504865d56f4ba9
                        • Opcode Fuzzy Hash: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                        • Instruction Fuzzy Hash: 7F11023390635087EB144B7258912BEB7629BBE310F4D116FC851277C3D26A8C41C3C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID: I$K$L$N$V$V$X$Y$Y$]$_$q
                        • API String ID: 0-2073889574
                        • Opcode ID: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                        • Instruction ID: 43827593aa6497e58040c952b9477bc89a4bd2f44540a878b620f7f54beaff88
                        • Opcode Fuzzy Hash: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                        • Instruction Fuzzy Hash: A8613C7150C3C18FD3219F2888843AABFD19B57324F185AAFD4D54B382C67D894B9797
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2597660790.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2597637536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597717718.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597743105.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597767026.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000001.00000002.2597795205.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_1730307187ae9ab5fd69cc13ea42f8d2341eeb4e82c6420352db84492ca0019ca4ec38.jbxd
                        Similarity
                        • API ID:
                        • String ID: 9tWU$<194$JHz~$UW$^
                        • API String ID: 0-831947292
                        • Opcode ID: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                        • Instruction ID: 3abd27d06bb50cb3e07a1f710ed1dcbcc1a7b5c52bb8c7ac571728cc573a4b06
                        • Opcode Fuzzy Hash: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                        • Instruction Fuzzy Hash: CB4119311083919FD726CF25885076BBFE0AFA7304F084DAED4D65B392D739891AC766