Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tfSYi9zABT.exe

Overview

General Information

Sample name:tfSYi9zABT.exe
renamed because original name is a hash value
Original sample name:cef03024e5b35b5197c1337596109958.exe
Analysis ID:1545820
MD5:cef03024e5b35b5197c1337596109958
SHA1:6ca77f693ccc8c283c4de40fb94b62b06538437d
SHA256:5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d
Tags:32exe
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Quasar RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Uses dynamic DNS services
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • tfSYi9zABT.exe (PID: 6676 cmdline: "C:\Users\user\Desktop\tfSYi9zABT.exe" MD5: CEF03024E5B35B5197C1337596109958)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Host:Port": "~^')}-{#", "InstallName": "~o\"`", "MutexName": "Q/t*@", "StartupKey": "BmL]RX3~v2", "Tag": "5qAQ?%5n", "ServerCertificate": "`<L~"}
SourceRuleDescriptionAuthorStrings
tfSYi9zABT.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    tfSYi9zABT.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      tfSYi9zABT.exeWindows_Trojan_Quasarrat_e52df647unknownunknown
      • 0x3eb83:$a1: GetKeyloggerLogsResponse
      • 0x3e2e4:$a2: DoDownloadAndExecute
      • 0x5079c:$a3: http://api.ipify.org/
      • 0x4e2a5:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
      • 0x4f5f3:$a5: " /sc ONLOGON /tr "
      tfSYi9zABT.exeQuasar_RAT_1Detects Quasar RATFlorian Roth
      • 0x3e0a0:$s1: DoUploadAndExecute
      • 0x3e2e4:$s2: DoDownloadAndExecute
      • 0x3de65:$s3: DoShellExecute
      • 0x3e29c:$s4: set_Processname
      • 0x59fc:$op1: 04 1E FE 02 04 16 FE 01 60
      • 0x5920:$op2: 00 17 03 1F 20 17 19 15 28
      • 0x6386:$op3: 00 04 03 69 91 1B 40
      • 0x6bd6:$op3: 00 04 03 69 91 1B 40
      tfSYi9zABT.exeQuasar_RAT_2Detects Quasar RATFlorian Roth
      • 0x3eb83:$x1: GetKeyloggerLogsResponse
      • 0x3edc3:$s1: DoShellExecuteResponse
      • 0x3e732:$s2: GetPasswordsResponse
      • 0x3ec96:$s3: GetStartupItemsResponse
      • 0x3e0b4:$s5: RunHidden
      • 0x3e0d2:$s5: RunHidden
      • 0x3e0e0:$s5: RunHidden
      • 0x3e0f4:$s5: RunHidden
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Quasarrat_e52df647unknownunknown
        • 0x3e983:$a1: GetKeyloggerLogsResponse
        • 0x3e0e4:$a2: DoDownloadAndExecute
        • 0x5059c:$a3: http://api.ipify.org/
        • 0x4e0a5:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
        • 0x4f3f3:$a5: " /sc ONLOGON /tr "
        00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmpQuasar_RAT_1Detects Quasar RATFlorian Roth
        • 0x3dea0:$s1: DoUploadAndExecute
        • 0x3e0e4:$s2: DoDownloadAndExecute
        • 0x3dc65:$s3: DoShellExecute
        • 0x3e09c:$s4: set_Processname
        • 0x57fc:$op1: 04 1E FE 02 04 16 FE 01 60
        • 0x5720:$op2: 00 17 03 1F 20 17 19 15 28
        • 0x6186:$op3: 00 04 03 69 91 1B 40
        • 0x69d6:$op3: 00 04 03 69 91 1B 40
        00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmpQuasardetect Remcos in memoryJPCERT/CC Incident Response Group
        • 0x4edb2:$quasarstr1: [PRIVATE KEY LOCATION: "{0}"]
        • 0x4e9c6:$quasarstr2: User: {0}{3}Pass: {1}{3}Host: {2}
        • 0x33d59:$class: Core.MouseKeyHook.WinApi
        Process Memory Space: tfSYi9zABT.exe PID: 6676JoeSecurity_QuasarYara detected Quasar RATJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.tfSYi9zABT.exe.b00000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
            0.0.tfSYi9zABT.exe.b00000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.tfSYi9zABT.exe.b00000.0.unpackWindows_Trojan_Quasarrat_e52df647unknownunknown
              • 0x3eb83:$a1: GetKeyloggerLogsResponse
              • 0x3e2e4:$a2: DoDownloadAndExecute
              • 0x5079c:$a3: http://api.ipify.org/
              • 0x4e2a5:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
              • 0x4f5f3:$a5: " /sc ONLOGON /tr "
              0.0.tfSYi9zABT.exe.b00000.0.unpackQuasar_RAT_1Detects Quasar RATFlorian Roth
              • 0x3e0a0:$s1: DoUploadAndExecute
              • 0x3e2e4:$s2: DoDownloadAndExecute
              • 0x3de65:$s3: DoShellExecute
              • 0x3e29c:$s4: set_Processname
              • 0x59fc:$op1: 04 1E FE 02 04 16 FE 01 60
              • 0x5920:$op2: 00 17 03 1F 20 17 19 15 28
              • 0x6386:$op3: 00 04 03 69 91 1B 40
              • 0x6bd6:$op3: 00 04 03 69 91 1B 40
              0.0.tfSYi9zABT.exe.b00000.0.unpackQuasar_RAT_2Detects Quasar RATFlorian Roth
              • 0x3eb83:$x1: GetKeyloggerLogsResponse
              • 0x3edc3:$s1: DoShellExecuteResponse
              • 0x3e732:$s2: GetPasswordsResponse
              • 0x3ec96:$s3: GetStartupItemsResponse
              • 0x3e0b4:$s5: RunHidden
              • 0x3e0d2:$s5: RunHidden
              • 0x3e0e0:$s5: RunHidden
              • 0x3e0f4:$s5: RunHidden
              Click to see the 7 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-31T04:58:58.691117+010020363831A Network Trojan was detected192.168.2.449730208.95.112.180TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: tfSYi9zABT.exeAvira: detected
              Source: tfSYi9zABT.exeMalware Configuration Extractor: Quasar {"Host:Port": "~^')}-{#", "InstallName": "~o\"`", "MutexName": "Q/t*@", "StartupKey": "BmL]RX3~v2", "Tag": "5qAQ?%5n", "ServerCertificate": "`<L~"}
              Source: crissnda5.ddns.netVirustotal: Detection: 14%Perma Link
              Source: tfSYi9zABT.exeVirustotal: Detection: 83%Perma Link
              Source: tfSYi9zABT.exeReversingLabs: Detection: 86%
              Source: Yara matchFile source: tfSYi9zABT.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tfSYi9zABT.exe PID: 6676, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: tfSYi9zABT.exeJoe Sandbox ML: detected
              Source: tfSYi9zABT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: tfSYi9zABT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036383 - Severity 1 - ET MALWARE Common RAT Connectivity Check Observed : 192.168.2.4:49730 -> 208.95.112.1:80
              Source: Malware configuration extractorURLs: ~^')}-{#
              Source: unknownDNS query: name: crissnda5.ddns.net
              Source: Yara matchFile source: tfSYi9zABT.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.4:49731 -> 87.121.86.32:2024
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
              Source: Joe Sandbox ViewASN Name: SKATTV-ASBG SKATTV-ASBG
              Source: unknownDNS query: name: ip-api.com
              Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: global trafficDNS traffic detected: DNS query: crissnda5.ddns.net
              Source: tfSYi9zABT.exeString found in binary or memory: http://api.ipify.org/
              Source: tfSYi9zABT.exeString found in binary or memory: http://freegeoip.net/xml/
              Source: tfSYi9zABT.exeString found in binary or memory: http://ip-api.com/json/
              Source: tfSYi9zABT.exe, 00000000.00000002.4115090399.0000000002F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
              Source: tfSYi9zABT.exe, 00000000.00000002.4115090399.0000000002F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: tfSYi9zABT.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tfSYi9zABT.exe PID: 6676, type: MEMORYSTR

              System Summary

              barindex
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
              Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
              Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
              Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeCode function: 0_2_00007FFD9B8890B80_2_00007FFD9B8890B8
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeCode function: 0_2_00007FFD9B8890A80_2_00007FFD9B8890A8
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeCode function: 0_2_00007FFD9B8757D60_2_00007FFD9B8757D6
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeCode function: 0_2_00007FFD9B8717180_2_00007FFD9B871718
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeCode function: 0_2_00007FFD9B8896150_2_00007FFD9B889615
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeCode function: 0_2_00007FFD9B8765820_2_00007FFD9B876582
              Source: tfSYi9zABT.exe, 00000000.00000000.1666034153.0000000000B5A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs tfSYi9zABT.exe
              Source: tfSYi9zABT.exeBinary or memory string: OriginalFilenameClient.exe" vs tfSYi9zABT.exe
              Source: tfSYi9zABT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: tfSYi9zABT.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
              Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
              Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: tfSYi9zABT.exe, ------.csBase64 encoded string: 'gMF/1BjUy69kQYPmFT5Vmlj/C89TrNqccg8F6q58zLN66Jn1EqDU1eKLV2WA49cRdz68f26Ln8Lhd6Kq7Wdzsg==', 'LFaZRZgeB16rFy2urwxVP0NfhxXuy009a3kdetDxI9T8X0HtnXPuLswcgtey0B8qWCY7LoveMEf/DWc8wcEa0Ks2+70L09COtLQSLedTXt4=', 'h36LUNE6D6Y9hpohEF6YNS5bniF/Glgol+St+nwGv2QBfXWLmUsLx5aanXm2PRFz2aY54a//jMvBGR9l4hF9Vg==', 'jZIlbZLrBvn7C0Ntt/Uy1VCNMQ5NR4TIo/pQwPRUgtA9V5685ml+DP68ybJI+R4Ix1ybauk6pN7opxERMwr5ZgVzfwUPDtA4BagKt8M2m8E=', 'RBns8ujiO9cWMFwnkHDg0xMnemi+vkMFa7HJqUb/QvoLMneX0O+es5WD3t+yo2dTkiIsPC2+wgsZFPBmeoQA5aHgmjDvNAH1McuWI5Wtq0o=', 'Pplz1pSqCfNu8dBsROdDTlORzLlwTdKT+Bjcnoit9S59DYCbsI/8zfbnJOsVCqGxP6sU2Rul+ngqnqyn1032VA==', 'nnCCO+k6vzCW8hz3m1KFW/T2j3/MZpugmxCkSboUqFu/YBw6DgP8MAOhHA1aP/WLohuVWdo+Aj95+3YVdJGzYg==', 'VsiU6kMBR4Q0MKimY+QO8O0+5i+ovNBf3Xx99gZ9a8m+i+j11BEH4HdmgxKMvsLXHO9Lc1lTsodfcnhve5UkiA=='
              Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@2/2
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeMutant created: NULL
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeMutant created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_6VCXMuKq5sglsUPNYu
              Source: tfSYi9zABT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: tfSYi9zABT.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: tfSYi9zABT.exeVirustotal: Detection: 83%
              Source: tfSYi9zABT.exeReversingLabs: Detection: 86%
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: tfSYi9zABT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: tfSYi9zABT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeCode function: 0_2_00007FFD9B880468 push eax; retf 0_2_00007FFD9B8804D9

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeFile opened: C:\Users\user\Desktop\tfSYi9zABT.exe:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeMemory allocated: 1090000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeMemory allocated: 1AF00000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWindow / User API: threadDelayed 1194Jump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWindow / User API: threadDelayed 365Jump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWindow / User API: threadDelayed 8252Jump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exe TID: 6704Thread sleep count: 118 > 30Jump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exe TID: 6704Thread sleep time: -295000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exe TID: 7044Thread sleep count: 1194 > 30Jump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exe TID: 7044Thread sleep count: 365 > 30Jump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exe TID: 6704Thread sleep count: 8252 > 30Jump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exe TID: 6704Thread sleep time: -20630000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: tfSYi9zABT.exe, 00000000.00000002.4116506371.000000001B87B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeQueries volume information: C:\Users\user\Desktop\tfSYi9zABT.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: tfSYi9zABT.exe, 00000000.00000002.4116677676.000000001B9E2000.00000004.00000020.00020000.00000000.sdmp, tfSYi9zABT.exe, 00000000.00000002.4114863662.0000000001130000.00000004.00000020.00020000.00000000.sdmp, tfSYi9zABT.exe, 00000000.00000002.4116818780.000000001BA2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: tfSYi9zABT.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tfSYi9zABT.exe PID: 6676, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\tfSYi9zABT.exeMutex created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_6VCXMuKq5sglsUPNYuJump to behavior
              Source: Yara matchFile source: tfSYi9zABT.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.tfSYi9zABT.exe.b00000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tfSYi9zABT.exe PID: 6676, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts41
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              4
              Virtualization/Sandbox Evasion
              OS Credential Dumping41
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Disable or Modify Tools
              LSASS Memory4
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Hidden Files and Directories
              Security Account Manager1
              Application Window Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Remote Access Software
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Obfuscated Files or Information
              NTDS1
              System Network Configuration Discovery
              Distributed Component Object ModelInput Capture1
              Ingress Tool Transfer
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets33
              System Information Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture212
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              tfSYi9zABT.exe83%VirustotalBrowse
              tfSYi9zABT.exe87%ReversingLabsByteCode-MSIL.Backdoor.Quasar
              tfSYi9zABT.exe100%AviraHEUR/AGEN.1307418
              tfSYi9zABT.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              ip-api.com0%VirustotalBrowse
              crissnda5.ddns.net15%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://schemas.datacontract.org/2004/07/0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://freegeoip.net/xml/0%VirustotalBrowse
              http://ip-api.com/json/0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              ip-api.com
              208.95.112.1
              truetrueunknown
              crissnda5.ddns.net
              87.121.86.32
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://ip-api.com/json/trueunknown
              ~^')}-{#true
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://api.ipify.org/tfSYi9zABT.exefalse
                  unknown
                  http://freegeoip.net/xml/tfSYi9zABT.exefalseunknown
                  http://schemas.datacontract.org/2004/07/tfSYi9zABT.exe, 00000000.00000002.4115090399.0000000002F01000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nametfSYi9zABT.exe, 00000000.00000002.4115090399.0000000002F01000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  208.95.112.1
                  ip-api.comUnited States
                  53334TUT-ASUStrue
                  87.121.86.32
                  crissnda5.ddns.netBulgaria
                  34577SKATTV-ASBGtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1545820
                  Start date and time:2024-10-31 04:58:05 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 22s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:tfSYi9zABT.exe
                  renamed because original name is a hash value
                  Original Sample Name:cef03024e5b35b5197c1337596109958.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@1/0@2/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 98%
                  • Number of executed functions: 13
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  TimeTypeDescription
                  23:59:33API Interceptor7184678x Sleep call for process: tfSYi9zABT.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  208.95.112.1ilZhNx3JAc.batGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  87M9Y3P4Z7.batGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  wKj1CBkbos.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                  • ip-api.com/line/?fields=hosting
                  skuld3.exeGet hashmaliciousSkuld StealerBrowse
                  • ip-api.com/line/?fields=hosting
                  FixTsDfhiC.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                  • ip-api.com/line/?fields=hosting
                  file.exeGet hashmaliciousWhiteSnake StealerBrowse
                  • ip-api.com/line?fields=query,country
                  Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • ip-api.com/line/?fields=hosting
                  bLaLoo4ET5.exeGet hashmaliciousQuasarBrowse
                  • ip-api.com/json/
                  sipari_.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  crissnda5.ddns.netCorelDRAWGraphicsSuite202425.2.0.301x64MultilingualUpdate.exeGet hashmaliciousQuasar, DarkTortillaBrowse
                  • 94.156.64.45
                  ip-api.comilZhNx3JAc.batGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  87M9Y3P4Z7.batGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  wKj1CBkbos.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                  • 208.95.112.1
                  skuld3.exeGet hashmaliciousSkuld StealerBrowse
                  • 208.95.112.1
                  FixTsDfhiC.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                  • 208.95.112.1
                  file.exeGet hashmaliciousWhiteSnake StealerBrowse
                  • 208.95.112.1
                  Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • 208.95.112.1
                  bLaLoo4ET5.exeGet hashmaliciousQuasarBrowse
                  • 208.95.112.1
                  sipari_.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  SKATTV-ASBGfile.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                  • 94.156.116.236
                  https://www.google.com.bo/url?url=https://coqjcqixwpeuzndc&hpj=jguragr&fwbtzg=qoe&ffzzf=olnshn&aes=fvotjnl&garqe=txbrxc&emrj=ycbtmrgd&uwzlcgsurn=eygnbnharg&q=amp/jhjn24u.v%C2%ADvg%C2%ADzy%C2%ADnp%C2%ADe%C2%ADw%C2%ADl%C2%ADkkukl.com%E2%80%8B/4b3puorbt&vijx=zlglfoj&qcobrch=pupf&cjaim=omgedz&guneqiu=xqm&d=DwMFAgGet hashmaliciousUnknownBrowse
                  • 87.121.86.72
                  muAZlKU0hq.elfGet hashmaliciousMiraiBrowse
                  • 87.120.53.129
                  qRmUFzxtmx.elfGet hashmaliciousMoobotBrowse
                  • 87.120.53.108
                  plugzx.exeGet hashmaliciousRemcosBrowse
                  • 87.121.87.143
                  INQ_#_8721.docGet hashmaliciousRemcosBrowse
                  • 87.121.87.143
                  koNJgi223g.exeGet hashmaliciousRemcosBrowse
                  • 87.121.87.143
                  file.exeGet hashmaliciousGlupteba, SmokeLoader, Socks5Systemz, Stealc, VidarBrowse
                  • 87.120.237.130
                  Marmouris_01792PDF.docGet hashmaliciousRemcosBrowse
                  • 87.121.87.143
                  oplugmanzx.exeGet hashmaliciousRemcosBrowse
                  • 87.121.87.143
                  TUT-ASUSilZhNx3JAc.batGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  87M9Y3P4Z7.batGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  wKj1CBkbos.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                  • 208.95.112.1
                  skuld3.exeGet hashmaliciousSkuld StealerBrowse
                  • 208.95.112.1
                  FixTsDfhiC.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                  • 208.95.112.1
                  file.exeGet hashmaliciousWhiteSnake StealerBrowse
                  • 208.95.112.1
                  Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  O3o5Xzk5Wd.exeGet hashmaliciousAsyncRAT, XWormBrowse
                  • 208.95.112.1
                  bLaLoo4ET5.exeGet hashmaliciousQuasarBrowse
                  • 208.95.112.1
                  sipari_.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):6.436803656380804
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:tfSYi9zABT.exe
                  File size:355'840 bytes
                  MD5:cef03024e5b35b5197c1337596109958
                  SHA1:6ca77f693ccc8c283c4de40fb94b62b06538437d
                  SHA256:5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d
                  SHA512:b683f194c7fd437596a263327e147c98f94e3898d20fcbf9a36dafbc7817ba77ad562c6fe6400f3c49756257cf1ee6518c6443ae2eef30b9cd0665b6b45286e9
                  SSDEEP:6144:mOL+PQIshf+PME+WoWmbeAR4gt4wG3eCoDs:FisPEfF0ft4wG3eZDs
                  TLSH:15748D1377A4E93BD1FE577AE43205144BB0D9467A26F38F9A5896BC2C133868D903B3
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...e'.g.................b..........N.... ........@.. ....................................@................................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x45814e
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x671D2765 [Sat Oct 26 17:31:17 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x581000x4b.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x800.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5c0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x561540x562007693d04f1b9ed8e521eeecbfaf40dd51False0.5131616246371553data6.4479233434677IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0x5a0000x8000x800a0099238a79c36d03b65c5535813727cFalse0.42138671875data4.829015235565521IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x5c0000xc0x20080aebd11b345ef4b5958ffa2b73b6fccFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0x5a0900x2d4data0.43646408839779005
                  RT_MANIFEST0x5a3740x478exported SGML document, Unicode text, UTF-8 (with BOM) text0.4423076923076923
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-10-31T04:58:58.691117+01002036383ET MALWARE Common RAT Connectivity Check Observed1192.168.2.449730208.95.112.180TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 31, 2024 04:58:58.046988010 CET4973080192.168.2.4208.95.112.1
                  Oct 31, 2024 04:58:58.053175926 CET8049730208.95.112.1192.168.2.4
                  Oct 31, 2024 04:58:58.053277016 CET4973080192.168.2.4208.95.112.1
                  Oct 31, 2024 04:58:58.053749084 CET4973080192.168.2.4208.95.112.1
                  Oct 31, 2024 04:58:58.061856031 CET8049730208.95.112.1192.168.2.4
                  Oct 31, 2024 04:58:58.650981903 CET8049730208.95.112.1192.168.2.4
                  Oct 31, 2024 04:58:58.691117048 CET4973080192.168.2.4208.95.112.1
                  Oct 31, 2024 04:58:59.538311958 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 04:58:59.543282032 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 04:58:59.543382883 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 04:59:00.270515919 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 04:59:00.316097975 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 04:59:00.321607113 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 04:59:00.326474905 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 04:59:00.564289093 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 04:59:00.612957001 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 04:59:00.678379059 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 04:59:00.722343922 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 04:59:00.775938034 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 04:59:00.780952930 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 04:59:25.785093069 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 04:59:25.790668011 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 04:59:48.741396904 CET8049730208.95.112.1192.168.2.4
                  Oct 31, 2024 04:59:48.741461992 CET4973080192.168.2.4208.95.112.1
                  Oct 31, 2024 04:59:50.800595999 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 04:59:51.282341957 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 05:00:16.285007954 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 05:00:16.290126085 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 05:00:38.709212065 CET4973080192.168.2.4208.95.112.1
                  Oct 31, 2024 05:00:38.714227915 CET8049730208.95.112.1192.168.2.4
                  Oct 31, 2024 05:00:41.300746918 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 05:00:41.687822104 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 05:01:06.691389084 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 05:01:06.696348906 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 05:01:31.707071066 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 05:01:31.712137938 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 05:01:56.738514900 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 05:01:56.743501902 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 05:02:21.754051924 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 05:02:21.759071112 CET20244973187.121.86.32192.168.2.4
                  Oct 31, 2024 05:02:46.769731998 CET497312024192.168.2.487.121.86.32
                  Oct 31, 2024 05:02:46.774852037 CET20244973187.121.86.32192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 31, 2024 04:58:58.032924891 CET5868153192.168.2.41.1.1.1
                  Oct 31, 2024 04:58:58.041244984 CET53586811.1.1.1192.168.2.4
                  Oct 31, 2024 04:58:59.508646965 CET5657453192.168.2.41.1.1.1
                  Oct 31, 2024 04:58:59.525995970 CET53565741.1.1.1192.168.2.4
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 31, 2024 04:58:58.032924891 CET192.168.2.41.1.1.10xa1acStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                  Oct 31, 2024 04:58:59.508646965 CET192.168.2.41.1.1.10xf74aStandard query (0)crissnda5.ddns.netA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 31, 2024 04:58:58.041244984 CET1.1.1.1192.168.2.40xa1acNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                  Oct 31, 2024 04:58:59.525995970 CET1.1.1.1192.168.2.40xf74aNo error (0)crissnda5.ddns.net87.121.86.32A (IP address)IN (0x0001)false
                  • ip-api.com
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.449730208.95.112.1806676C:\Users\user\Desktop\tfSYi9zABT.exe
                  TimestampBytes transferredDirectionData
                  Oct 31, 2024 04:58:58.053749084 CET144OUTGET /json/ HTTP/1.1
                  User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                  Host: ip-api.com
                  Connection: Keep-Alive
                  Oct 31, 2024 04:58:58.650981903 CET468INHTTP/1.1 200 OK
                  Date: Thu, 31 Oct 2024 03:58:58 GMT
                  Content-Type: application/json; charset=utf-8
                  Content-Length: 291
                  Access-Control-Allow-Origin: *
                  X-Ttl: 60
                  X-Rl: 44
                  Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 54 58 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 54 65 78 61 73 22 2c 22 63 69 74 79 22 3a 22 4b 69 6c 6c 65 65 6e 22 2c 22 7a 69 70 22 3a 22 37 36 35 34 39 22 2c 22 6c 61 74 22 3a 33 31 2e 30 30 36 35 2c 22 6c 6f 6e 22 3a 2d 39 37 2e 38 34 30 36 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 22 2c 22 69 73 70 22 3a 22 51 75 61 64 72 61 4e 65 74 22 2c 22 6f 72 67 22 3a 22 4f 4d 47 49 54 53 46 41 53 54 22 2c 22 61 73 22 3a 22 41 53 38 31 30 30 20 51 75 61 64 72 61 4e 65 74 20 45 6e 74 65 72 70 72 69 73 65 73 20 4c 4c 43 22 2c 22 71 75 65 72 79 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 22 7d
                  Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"TX","regionName":"Texas","city":"Killeen","zip":"76549","lat":31.0065,"lon":-97.8406,"timezone":"America/Chicago","isp":"QuadraNet","org":"OMGITSFAST","as":"AS8100 QuadraNet Enterprises LLC","query":"173.254.250.77"}


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:23:58:55
                  Start date:30/10/2024
                  Path:C:\Users\user\Desktop\tfSYi9zABT.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\tfSYi9zABT.exe"
                  Imagebase:0xb00000
                  File size:355'840 bytes
                  MD5 hash:CEF03024E5B35B5197C1337596109958
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
                  • Rule: Quasar, Description: detect Remcos in memory, Source: 00000000.00000000.1665954446.0000000000B02000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:14.3%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:14
                    Total number of Limit Nodes:1
                    execution_graph 14857 7ffd9b87d050 14858 7ffd9b87d059 14857->14858 14859 7ffd9b87cfff DeleteFileW 14858->14859 14861 7ffd9b87d06b 14858->14861 14860 7ffd9b87d016 14859->14860 14845 7ffd9b889b1a 14848 7ffd9b8896fa 14845->14848 14846 7ffd9b889734 14848->14846 14849 7ffd9b888ad0 14848->14849 14850 7ffd9b888b08 14849->14850 14851 7ffd9b888bde 14849->14851 14850->14851 14853 7ffd9b87cf10 14850->14853 14851->14848 14854 7ffd9b87cf0f DeleteFileW 14853->14854 14856 7ffd9b87d016 14854->14856 14856->14851
                    Memory Dump Source
                    • Source File: 00000000.00000002.4117672593.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b870000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 11a4e5365c771647fedab27c4ad9e2d332df321fc40e344d278a697b9ec5f5ef
                    • Instruction ID: c041ef1b9db33b1cdc191f9050fdf483358bebb9f06bc16ef781984153bd7809
                    • Opcode Fuzzy Hash: 11a4e5365c771647fedab27c4ad9e2d332df321fc40e344d278a697b9ec5f5ef
                    • Instruction Fuzzy Hash: 16C25730A19A4A4BE72DDF5884A12B8B3E1FF99306F21067DC5EBC3596DE34B5438781

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 929 7ffd9b8890b8-7ffd9b889e38 931 7ffd9b889e3a-7ffd9b889e5c 929->931 932 7ffd9b889e5d-7ffd9b889e60 929->932 934 7ffd9b88a695-7ffd9b88a6a9 932->934 935 7ffd9b889e66-7ffd9b889e75 932->935 942 7ffd9b88a6ab-7ffd9b88a6b2 934->942 943 7ffd9b88a6b3-7ffd9b88a6c9 934->943 936 7ffd9b889e77-7ffd9b889e7a 935->936 937 7ffd9b889e80-7ffd9b889e83 call 7ffd9b889090 935->937 936->937 939 7ffd9b88a65b-7ffd9b88a664 936->939 944 7ffd9b889e88-7ffd9b889e9a 937->944 939->934 942->943 946 7ffd9b889e9c-7ffd9b889ea2 944->946 947 7ffd9b889ea4-7ffd9b889ea5 944->947 948 7ffd9b889eaa-7ffd9b889f09 946->948 947->948 954 7ffd9b889f0b-7ffd9b889f23 948->954 955 7ffd9b889f5d-7ffd9b889f66 948->955 959 7ffd9b889f25-7ffd9b889f2a 954->959 960 7ffd9b889f2c 954->960 957 7ffd9b88a0a6-7ffd9b88a0aa 955->957 958 7ffd9b889f6c-7ffd9b889f6f 955->958 961 7ffd9b88a46f-7ffd9b88a472 957->961 962 7ffd9b88a0b0-7ffd9b88a0b6 957->962 958->934 963 7ffd9b889f75-7ffd9b889f84 958->963 964 7ffd9b889f31-7ffd9b889f5c 959->964 960->964 965 7ffd9b88a478-7ffd9b88a47f 961->965 966 7ffd9b88a63a-7ffd9b88a640 961->966 967 7ffd9b88a128-7ffd9b88a12c 962->967 968 7ffd9b88a0b8-7ffd9b88a0ca 962->968 963->934 969 7ffd9b889f8a-7ffd9b889f9e 963->969 965->934 974 7ffd9b88a485-7ffd9b88a499 965->974 970 7ffd9b88a5f5-7ffd9b88a5f9 966->970 971 7ffd9b88a642-7ffd9b88a65a 966->971 972 7ffd9b88a149-7ffd9b88a14d 967->972 973 7ffd9b88a12e-7ffd9b88a144 967->973 968->934 975 7ffd9b88a0d0-7ffd9b88a0e4 968->975 969->934 976 7ffd9b889fa4-7ffd9b889fb8 969->976 981 7ffd9b88a605-7ffd9b88a608 970->981 982 7ffd9b88a5fb-7ffd9b88a600 970->982 978 7ffd9b88a166-7ffd9b88a16a 972->978 979 7ffd9b88a14f-7ffd9b88a164 972->979 977 7ffd9b88a1ce-7ffd9b88a1e3 973->977 974->934 983 7ffd9b88a49f-7ffd9b88a4b3 974->983 984 7ffd9b88a0e6-7ffd9b88a0f7 975->984 985 7ffd9b88a0fc-7ffd9b88a103 975->985 976->934 986 7ffd9b889fbe-7ffd9b889fdb 976->986 987 7ffd9b88a1e7-7ffd9b88a1f3 977->987 991 7ffd9b88a18a-7ffd9b88a193 978->991 992 7ffd9b88a16c-7ffd9b88a188 978->992 979->977 981->934 993 7ffd9b88a60e-7ffd9b88a622 981->993 982->981 994 7ffd9b88a4b9-7ffd9b88a4c0 983->994 995 7ffd9b88a59c-7ffd9b88a5a3 983->995 984->987 985->934 990 7ffd9b88a109-7ffd9b88a123 985->990 988 7ffd9b88a035-7ffd9b88a03a 986->988 989 7ffd9b889fdd-7ffd9b889fe0 986->989 987->934 1001 7ffd9b88a1f9-7ffd9b88a205 987->1001 988->957 996 7ffd9b88a03c-7ffd9b88a03f 989->996 997 7ffd9b889fe2-7ffd9b889fe5 989->997 990->987 998 7ffd9b88a1b5-7ffd9b88a1cb 991->998 999 7ffd9b88a195-7ffd9b88a1b3 991->999 992->977 993->934 1002 7ffd9b88a624-7ffd9b88a636 993->1002 1003 7ffd9b88a4c6-7ffd9b88a4c7 994->1003 1004 7ffd9b88a55d-7ffd9b88a564 994->1004 995->934 1000 7ffd9b88a5a9-7ffd9b88a5cb 995->1000 996->934 1007 7ffd9b88a045-7ffd9b88a055 996->1007 997->934 1006 7ffd9b889feb-7ffd9b889ffb 997->1006 998->977 999->977 1000->934 1009 7ffd9b88a5d1-7ffd9b88a5f0 1000->1009 1001->934 1010 7ffd9b88a20b-7ffd9b88a21a 1001->1010 1002->966 1005 7ffd9b88a4ce-7ffd9b88a4d4 1003->1005 1004->934 1008 7ffd9b88a56a-7ffd9b88a597 1004->1008 1005->934 1011 7ffd9b88a4da-7ffd9b88a4e9 1005->1011 1006->934 1012 7ffd9b88a001-7ffd9b88a016 1006->1012 1007->934 1013 7ffd9b88a05b-7ffd9b88a070 1007->1013 1008->955 1009->955 1010->934 1014 7ffd9b88a220-7ffd9b88a230 1010->1014 1011->934 1016 7ffd9b88a4ef-7ffd9b88a503 1011->1016 1012->934 1017 7ffd9b88a01c-7ffd9b88a033 1012->1017 1013->934 1018 7ffd9b88a076-7ffd9b88a08a 1013->1018 1014->934 1015 7ffd9b88a236-7ffd9b88a249 1014->1015 1015->934 1019 7ffd9b88a24f-7ffd9b88a25f 1015->1019 1016->934 1020 7ffd9b88a509-7ffd9b88a52c 1016->1020 1017->957 1018->934 1021 7ffd9b88a090-7ffd9b88a0a2 1018->1021 1019->934 1022 7ffd9b88a265-7ffd9b88a279 1019->1022 1020->934 1023 7ffd9b88a532-7ffd9b88a54f 1020->1023 1021->957 1024 7ffd9b88a2d7-7ffd9b88a2dd 1022->1024 1025 7ffd9b88a27b-7ffd9b88a28b 1022->1025 1023->1005 1026 7ffd9b88a555-7ffd9b88a556 1023->1026 1028 7ffd9b88a3eb-7ffd9b88a3ee 1024->1028 1029 7ffd9b88a2e3-7ffd9b88a2ea 1024->1029 1027 7ffd9b88a28f-7ffd9b88a29a 1025->1027 1026->1004 1027->934 1030 7ffd9b88a2a0-7ffd9b88a2ad 1027->1030 1028->934 1031 7ffd9b88a3f4-7ffd9b88a404 1028->1031 1029->934 1032 7ffd9b88a2f0-7ffd9b88a300 1029->1032 1030->934 1033 7ffd9b88a2b3-7ffd9b88a2c4 1030->1033 1031->934 1034 7ffd9b88a40a-7ffd9b88a41e 1031->1034 1032->934 1035 7ffd9b88a306-7ffd9b88a31b 1032->1035 1033->1027 1036 7ffd9b88a2c6-7ffd9b88a2d3 1033->1036 1034->934 1037 7ffd9b88a424-7ffd9b88a438 1034->1037 1035->934 1038 7ffd9b88a321-7ffd9b88a33b 1035->1038 1036->1024 1037->934 1039 7ffd9b88a43e-7ffd9b88a449 1037->1039 1040 7ffd9b88a33d-7ffd9b88a358 1038->1040 1041 7ffd9b88a39f-7ffd9b88a3a2 1038->1041 1043 7ffd9b88a44b-7ffd9b88a46a 1039->1043 1040->934 1044 7ffd9b88a35e-7ffd9b88a376 1040->1044 1041->934 1042 7ffd9b88a3a8-7ffd9b88a3b9 1041->1042 1042->934 1045 7ffd9b88a3bf-7ffd9b88a3d5 1042->1045 1043->955 1044->934 1046 7ffd9b88a37c-7ffd9b88a39d 1044->1046 1045->934 1047 7ffd9b88a3db-7ffd9b88a3e9 1045->1047 1046->1040 1046->1041 1047->1043
                    Memory Dump Source
                    • Source File: 00000000.00000002.4117672593.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b870000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ca98af93cbf649bfd8263a2f0612e3bf0049d353ba277b283b6c2901ed1535af
                    • Instruction ID: f64b62b035cc6d2261af0695bd7ce01c459d55ce875b2ee76048c1b1a530f0c6
                    • Opcode Fuzzy Hash: ca98af93cbf649bfd8263a2f0612e3bf0049d353ba277b283b6c2901ed1535af
                    • Instruction Fuzzy Hash: 17428A30A1DF4E0BE32E8B5884A20B977D2EF95305F28993DD4EB435DBE93CA5474281

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1525 7ffd9b889615-7ffd9b889621 1526 7ffd9b889623 1525->1526 1527 7ffd9b889624-7ffd9b889635 1525->1527 1526->1527 1528 7ffd9b889637 1527->1528 1529 7ffd9b889638-7ffd9b889649 1527->1529 1528->1529 1530 7ffd9b88964b 1529->1530 1531 7ffd9b88964c-7ffd9b88965d 1529->1531 1530->1531 1532 7ffd9b88965f 1531->1532 1533 7ffd9b889660-7ffd9b889671 1531->1533 1532->1533 1534 7ffd9b889673 1533->1534 1535 7ffd9b889674-7ffd9b889685 1533->1535 1534->1535 1536 7ffd9b889687 1535->1536 1537 7ffd9b889688-7ffd9b889699 1535->1537 1536->1537 1538 7ffd9b88969b 1537->1538 1539 7ffd9b88969c-7ffd9b8896ad 1537->1539 1538->1539 1540 7ffd9b8896af 1539->1540 1541 7ffd9b8896b0-7ffd9b8896c1 1539->1541 1540->1541 1542 7ffd9b8896c3 1541->1542 1543 7ffd9b8896c4-7ffd9b8896f7 1541->1543 1542->1543 1545 7ffd9b8896fa-7ffd9b88970f 1543->1545 1546 7ffd9b889716-7ffd9b889732 1545->1546 1547 7ffd9b889711 1545->1547 1549 7ffd9b889772-7ffd9b88977b 1546->1549 1550 7ffd9b889734-7ffd9b889749 1546->1550 1547->1546 1554 7ffd9b88978a-7ffd9b8897a4 call 7ffd9b889bdb 1549->1554 1555 7ffd9b88977d-7ffd9b889bab call 7ffd9b889bdb 1549->1555 1551 7ffd9b88974b 1550->1551 1552 7ffd9b889750-7ffd9b889770 call 7ffd9b889bac 1550->1552 1551->1552 1552->1555 1564 7ffd9b8897ab-7ffd9b8897b7 1554->1564 1565 7ffd9b8897c7-7ffd9b8897e1 1564->1565 1566 7ffd9b8897b9-7ffd9b8897bc 1564->1566 1569 7ffd9b8897e7-7ffd9b8897f4 1565->1569 1570 7ffd9b889909-7ffd9b889956 1565->1570 1567 7ffd9b88995b-7ffd9b889966 1566->1567 1568 7ffd9b8897c2 1566->1568 1571 7ffd9b889968-7ffd9b889977 1567->1571 1572 7ffd9b889979-7ffd9b88999d 1567->1572 1573 7ffd9b889b61-7ffd9b889b65 1568->1573 1574 7ffd9b8897f6-7ffd9b8897fb 1569->1574 1575 7ffd9b8897fd-7ffd9b889801 1569->1575 1570->1573 1571->1572 1578 7ffd9b8899a4-7ffd9b8899bd 1571->1578 1572->1578 1573->1564 1577 7ffd9b889b6b-7ffd9b889b76 1573->1577 1580 7ffd9b889804-7ffd9b889806 1574->1580 1575->1580 1583 7ffd9b889b86-7ffd9b889b9f 1577->1583 1584 7ffd9b889b78-7ffd9b889b80 1577->1584 1585 7ffd9b8899bf 1578->1585 1586 7ffd9b8899c1-7ffd9b8899c3 1578->1586 1581 7ffd9b88980c-7ffd9b88986b 1580->1581 1582 7ffd9b8898af-7ffd9b8898c6 1580->1582 1591 7ffd9b8898cc-7ffd9b8898d8 1581->1591 1582->1591 1583->1545 1584->1583 1587 7ffd9b8899c5-7ffd9b889a22 1585->1587 1586->1587 1593 7ffd9b889a28-7ffd9b889a3e 1587->1593 1594 7ffd9b889b4f-7ffd9b889b5a 1587->1594 1595 7ffd9b8898da-7ffd9b8898e0 1591->1595 1596 7ffd9b88986d-7ffd9b8898a8 1591->1596 1597 7ffd9b889a69-7ffd9b889a6b 1593->1597 1598 7ffd9b889a40-7ffd9b889a66 call 7ffd9b870e00 1593->1598 1594->1573 1601 7ffd9b889b5c-7ffd9b889b5e 1594->1601 1595->1596 1599 7ffd9b8898e2-7ffd9b889904 1595->1599 1596->1582 1604 7ffd9b889a6d-7ffd9b889a75 call 7ffd9b8890b8 1597->1604 1605 7ffd9b889a9f-7ffd9b889aa1 1597->1605 1598->1597 1599->1573 1601->1573 1614 7ffd9b889a7a-7ffd9b889a9c 1604->1614 1609 7ffd9b889ab6-7ffd9b889b09 call 7ffd9b8703a8 call 7ffd9b87cd90 1605->1609 1610 7ffd9b889aa3-7ffd9b889ab1 call 7ffd9b888ad0 1605->1610 1609->1594 1610->1573 1614->1605
                    Memory Dump Source
                    • Source File: 00000000.00000002.4117672593.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b870000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 792b6c5eaf5ce57a716dfbeaf2be47f09fb8d112da9417e00ca34b411e31a883
                    • Instruction ID: 7bb243e78cd47af60789ef7d3f1ee376b24f441cc13fd0542d864f82e00664c6
                    • Opcode Fuzzy Hash: 792b6c5eaf5ce57a716dfbeaf2be47f09fb8d112da9417e00ca34b411e31a883
                    • Instruction Fuzzy Hash: 9812D430A09A8E8FDB95DF58C864BAA77A1FF49304F1445BEE45DC7296CE35A802CB41

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1624 7ffd9b871718-7ffd9b871741 1627 7ffd9b871743-7ffd9b87176f 1624->1627 1628 7ffd9b871770-7ffd9b8717ff call 7ffd9b8707f0 call 7ffd9b8707e8 1624->1628 1627->1628 1643 7ffd9b871801-7ffd9b871826 1628->1643 1644 7ffd9b871828-7ffd9b87182a 1628->1644 1645 7ffd9b87182d-7ffd9b87183f call 7ffd9b870800 call 7ffd9b8707e8 1643->1645 1644->1645 1652 7ffd9b871841-7ffd9b871866 1645->1652 1653 7ffd9b871868-7ffd9b87186a 1645->1653 1655 7ffd9b87186d-7ffd9b87187f call 7ffd9b870810 call 7ffd9b8707e8 1652->1655 1653->1655 1662 7ffd9b871881-7ffd9b8718dd 1655->1662 1663 7ffd9b8718df-7ffd9b8718e1 1655->1663 1666 7ffd9b8718e4-7ffd9b8718f6 call 7ffd9b870820 call 7ffd9b8707e8 1662->1666 1663->1666 1673 7ffd9b87195c-7ffd9b87195e 1666->1673 1674 7ffd9b8718f8-7ffd9b87195a 1666->1674 1677 7ffd9b871961-7ffd9b871973 call 7ffd9b870830 call 7ffd9b8707e8 1673->1677 1674->1677 1685 7ffd9b8719d3-7ffd9b8719d5 1677->1685 1686 7ffd9b871975-7ffd9b8719d1 1677->1686 1689 7ffd9b8719d8-7ffd9b8719ea call 7ffd9b870840 call 7ffd9b8707e8 1685->1689 1686->1689 1697 7ffd9b8719ec-7ffd9b871a36 1689->1697 1698 7ffd9b871a38-7ffd9b871a3a 1689->1698 1700 7ffd9b871a3d-7ffd9b871ac1 call 7ffd9b870850 call 7ffd9b8707e0 call 7ffd9b8707c0 call 7ffd9b870860 call 7ffd9b870870 1697->1700 1698->1700 1721 7ffd9b871b30-7ffd9b871b41 1700->1721 1723 7ffd9b871ac3-7ffd9b871b2e call 7ffd9b8713a0 call 7ffd9b8707c0 1721->1723 1724 7ffd9b871b43-7ffd9b871b4d call 7ffd9b871ca9 1721->1724 1723->1721 1741 7ffd9b871b4f-7ffd9b871b57 call 7ffd9b871ca9 1723->1741 1730 7ffd9b871b59-7ffd9b871b61 call 7ffd9b871ce4 1724->1730 1735 7ffd9b871b6c-7ffd9b871ba8 call 7ffd9b8707b8 1730->1735 1747 7ffd9b871bb4-7ffd9b871c38 call 7ffd9b8707c0 call 7ffd9b8707d0 call 7ffd9b8707b8 call 7ffd9b8707c8 1735->1747 1748 7ffd9b871baa-7ffd9b871bb3 1735->1748 1741->1730 1746 7ffd9b871b63-7ffd9b871b6b call 7ffd9b871ce4 1741->1746 1746->1735 1763 7ffd9b871c53-7ffd9b871c63 1747->1763 1764 7ffd9b871c3a-7ffd9b871c51 1747->1764 1748->1747 1765 7ffd9b871c6a-7ffd9b871c91 1763->1765 1764->1765 1767 7ffd9b871c99-7ffd9b871ca8 call 7ffd9b8707b0 1765->1767
                    Memory Dump Source
                    • Source File: 00000000.00000002.4117672593.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b870000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2fbf76dcff0f2ca7563a725a80167c0eb9e7dbda0674b4e3e0ef14ed7dfa8d67
                    • Instruction ID: 9b648d4175b06432bf31ec621bf23191265b8b2d400620c735d7a149d55bda09
                    • Opcode Fuzzy Hash: 2fbf76dcff0f2ca7563a725a80167c0eb9e7dbda0674b4e3e0ef14ed7dfa8d67
                    • Instruction Fuzzy Hash: 9702A470E1951E8FEBA8EBA898A57BD77A1FF48304F5000BAD05DD72D6DE3869419B00
                    Memory Dump Source
                    • Source File: 00000000.00000002.4117672593.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b870000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 57abae5f06751c18e76d9ed4d18f474f06d215f6b69eee021ba2628d131270e8
                    • Instruction ID: d458d320aefef152cde3fc126d7238ebb9f52ad79debcf1632e78942a4042b4d
                    • Opcode Fuzzy Hash: 57abae5f06751c18e76d9ed4d18f474f06d215f6b69eee021ba2628d131270e8
                    • Instruction Fuzzy Hash: 6DF1B530A09A8D8FEBA8DF28D8957F977E1FF58314F04426EE84DC7295DB3499418B81
                    Memory Dump Source
                    • Source File: 00000000.00000002.4117672593.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b870000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2b075793709a275dffe3c782db3d150f9073c02f1888ff7d12287ceabeb01f53
                    • Instruction ID: 29f72d0fe3c37c9d1014a51bbdc33559e2965f680c8913a204dec8f98fcbba79
                    • Opcode Fuzzy Hash: 2b075793709a275dffe3c782db3d150f9073c02f1888ff7d12287ceabeb01f53
                    • Instruction Fuzzy Hash: 60E1D670A09A4E8FEBA8DF28C8657E937D1FF58314F04426EE84DC7295DF74A9418B81

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 491 7ffd9b87cf69-7ffd9b87cf79 492 7ffd9b87cf0f-7ffd9b87cf12 491->492 493 7ffd9b87cf7b-7ffd9b87cfd8 491->493 495 7ffd9b87cf14-7ffd9b87cf62 492->495 496 7ffd9b87cf63 492->496 502 7ffd9b87cfe2-7ffd9b87d014 DeleteFileW 493->502 503 7ffd9b87cfda-7ffd9b87cfdf 493->503 495->496 496->491 506 7ffd9b87d01c-7ffd9b87d04a 502->506 507 7ffd9b87d016 502->507 503->502 507->506
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.4117672593.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b870000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID: DeleteFile
                    • String ID:
                    • API String ID: 4033686569-0
                    • Opcode ID: a9ef3779d7e367a184527df110e4b952fdda1c8f90825ccc7bf0f26d0bb3cb8d
                    • Instruction ID: 2a2c8fb8a5c486e9823875b41f3c9f33d0d6bc0cb491306996699dca4a5f9cbe
                    • Opcode Fuzzy Hash: a9ef3779d7e367a184527df110e4b952fdda1c8f90825ccc7bf0f26d0bb3cb8d
                    • Instruction Fuzzy Hash: 26414A7190DA5C4FDB59DB6C98596F97FF0EF5A320F0442BFC089C72A2DA6468468780

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 566 7ffd9b87d050-7ffd9b87d057 567 7ffd9b87d062-7ffd9b87d069 566->567 568 7ffd9b87d059-7ffd9b87d061 566->568 569 7ffd9b87cfff-7ffd9b87d014 DeleteFileW 567->569 570 7ffd9b87d06b-7ffd9b87d0d5 567->570 568->567 571 7ffd9b87d01c-7ffd9b87d04a 569->571 572 7ffd9b87d016 569->572 581 7ffd9b87d0dc-7ffd9b87d0e3 570->581 572->571
                    Memory Dump Source
                    • Source File: 00000000.00000002.4117672593.00007FFD9B870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B870000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b870000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8d28cfe02589e54e175a8c523d09cec4bb51c90ac9ab4dd0cadf0818ca4e944a
                    • Instruction ID: ec0b8dc42ce24a0ed9696d100bc87e868ba7c6fef4c7976ca9ba1c666ba0a6db
                    • Opcode Fuzzy Hash: 8d28cfe02589e54e175a8c523d09cec4bb51c90ac9ab4dd0cadf0818ca4e944a
                    • Instruction Fuzzy Hash: 0E21AE72B0D98D0EE758977C54553E8BBD0EF99234F0842BBC05CC71D7DE1868824392

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 896 7ffd9b952971-7ffd9b9529da 899 7ffd9b952a0f-7ffd9b952a25 896->899 900 7ffd9b9529dc-7ffd9b9529ee 896->900 902 7ffd9b9544fc-7ffd9b954523 899->902 901 7ffd9b9529f0-7ffd9b9529f4 900->901 904 7ffd9b9529fb-7ffd9b952a0b 901->904 904->902 907 7ffd9b952a11-7ffd9b952a2f 904->907 910 7ffd9b952a31-7ffd9b952a4a 907->910 911 7ffd9b952a4c-7ffd9b952a4f 907->911 910->911 911->901
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4118032448.00007FFD9B950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B950000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b950000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID: r
                    • API String ID: 0-1812594589
                    • Opcode ID: c28ac1d6cc2967b3eddfd8b15f61e28ed4a473fae400420baa9b87656efaf5da
                    • Instruction ID: ace715f6a881c22b0476966cb1392dc694f771ec73538d8b0cc3a91dbb4ab529
                    • Opcode Fuzzy Hash: c28ac1d6cc2967b3eddfd8b15f61e28ed4a473fae400420baa9b87656efaf5da
                    • Instruction Fuzzy Hash: E121EF61A1EBCE1FD36297B448795643FA1EFA621070A01FBC489CB1F3EE9859498312

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 915 7ffd9b952a29-7ffd9b952a2f 916 7ffd9b952a31-7ffd9b952a4a 915->916 917 7ffd9b952a4c-7ffd9b952a4f 915->917 916->917 919 7ffd9b9529f0-7ffd9b9529f4 917->919 921 7ffd9b9529fb-7ffd9b952a0b 919->921 923 7ffd9b952a11-7ffd9b952a25 921->923 924 7ffd9b9544fc-7ffd9b954523 921->924 923->915
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.4118032448.00007FFD9B950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B950000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b950000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID: r
                    • API String ID: 0-1812594589
                    • Opcode ID: f52a9086b698897e6f9aca52d5878d7fa10049e7d3bf0ae32a55683ce9eb099e
                    • Instruction ID: d0310be25d93c37d6fc4c5f5da68d1a7a18f3ea7b3d8d62580b538d915c600ac
                    • Opcode Fuzzy Hash: f52a9086b698897e6f9aca52d5878d7fa10049e7d3bf0ae32a55683ce9eb099e
                    • Instruction Fuzzy Hash: 8DF09611B5DE5E0FE7B5BAD854746793286DF98300B12427AC80DC72EBED98AE058384
                    Memory Dump Source
                    • Source File: 00000000.00000002.4118032448.00007FFD9B950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B950000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b950000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 75d64b9d259ba290f28529e198e7def60ad4ff9cd1b9b373372a56978acd9653
                    • Instruction ID: 67dd57b7afa3bc3abd4a88368206dadf856d606707283963323e3b61792db91a
                    • Opcode Fuzzy Hash: 75d64b9d259ba290f28529e198e7def60ad4ff9cd1b9b373372a56978acd9653
                    • Instruction Fuzzy Hash: EFB16761A0EBC54FD7539B7488716953FB1AF5B20070E05DBC0C5CB1F3DA18AA1AC362
                    Memory Dump Source
                    • Source File: 00000000.00000002.4118032448.00007FFD9B950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B950000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b950000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 16bd9dc7c99ded38f1e72daddab15560300f424e44fe008ccd94e54d58af8d68
                    • Instruction ID: ac1789e41fdbf56e8a5b0ef328a6a18919653569b924219b6aaaf076f3baaadf
                    • Opcode Fuzzy Hash: 16bd9dc7c99ded38f1e72daddab15560300f424e44fe008ccd94e54d58af8d68
                    • Instruction Fuzzy Hash: 91914F6240E7C14FD3078BB888762913FB0AF27224B1E45EBC4C1CF5B3E658691AD762
                    Memory Dump Source
                    • Source File: 00000000.00000002.4118032448.00007FFD9B950000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B950000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b950000_tfSYi9zABT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2c9e0fb3ddd08b3c1902d912dc061fdfc0c477eabcbbfce4ff6ac48abc74caf6
                    • Instruction ID: 4f3a7a24fd3e22d4c89d343a5372d0e8afc0afe770f7ea6e63661aeb9ef2fcab
                    • Opcode Fuzzy Hash: 2c9e0fb3ddd08b3c1902d912dc061fdfc0c477eabcbbfce4ff6ac48abc74caf6
                    • Instruction Fuzzy Hash: 1F31683174D98D0FE768976C9869A713BD1DB57320B0502BFD44EC72E3DD58AC428390