Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
test2.exe

Overview

General Information

Sample name:test2.exe
Analysis ID:1558605
MD5:396ef18c45676b0074e41dc2212e06d3
SHA1:fe07d7d57a66b71611086771260163432a9e7b55
SHA256:1209c3df30d7d53edad5c43e122e5c14e350e9d229cdf1e263fd16ef22f485f0
Tags:exeopendiruser-Joker
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • test2.exe (PID: 4468 cmdline: "C:\Users\user\Desktop\test2.exe" MD5: 396EF18C45676B0074E41DC2212E06D3)
  • cleanup
{"C2 url": ["158.247.200.45"], "Port": 7033, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
test2.exeJoeSecurity_XWormYara detected XWormJoe Security
    test2.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6af2:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1497145384.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000000.00000000.1497145384.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x6a80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x6b1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x6c32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x68f2:$cnc4: POST / HTTP/1.1
      Process Memory Space: test2.exe PID: 4468JoeSecurity_XWormYara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.test2.exe.db0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.0.test2.exe.db0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6af2:$cnc4: POST / HTTP/1.1
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: test2.exeAvira: detected
          Source: test2.exeMalware Configuration Extractor: Xworm {"C2 url": ["158.247.200.45"], "Port": 7033, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
          Source: test2.exeReversingLabs: Detection: 73%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: test2.exeJoe Sandbox ML: detected
          Source: test2.exeString decryptor: 158.247.200.45
          Source: test2.exeString decryptor: 7033
          Source: test2.exeString decryptor: <123456789>
          Source: test2.exeString decryptor: <Xwormmm>
          Source: test2.exeString decryptor: XWorm V5.6
          Source: test2.exeString decryptor: USB.exe
          Source: test2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: test2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Malware configuration extractorURLs: 158.247.200.45
          Source: global trafficTCP traffic: 192.168.2.8:49704 -> 158.247.200.45:7033
          Source: Joe Sandbox ViewASN Name: FEWPBUS FEWPBUS
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45
          Source: unknownTCP traffic detected without corresponding DNS query: 158.247.200.45

          System Summary

          barindex
          Source: test2.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 0.0.test2.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 00000000.00000000.1497145384.0000000000DB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: test2.exe, 00000000.00000000.1497145384.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs test2.exe
          Source: test2.exeBinary or memory string: OriginalFilenameXClient.exe4 vs test2.exe
          Source: test2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: test2.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 0.0.test2.exe.db0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 00000000.00000000.1497145384.0000000000DB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: test2.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: test2.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: test2.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/1
          Source: C:\Users\user\Desktop\test2.exeMutant created: NULL
          Source: C:\Users\user\Desktop\test2.exeMutant created: \Sessions\1\BaseNamedObjects\1kxWUkLkK2xrr7Fy
          Source: test2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: test2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\test2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: test2.exeReversingLabs: Detection: 73%
          Source: C:\Users\user\Desktop\test2.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\test2.exeSection loaded: mswsock.dllJump to behavior
          Source: test2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: test2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: test2.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: test2.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: test2.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
          Source: test2.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
          Source: test2.exe, Messages.cs.Net Code: Memory
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test2.exeMemory allocated: 1520000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\test2.exeMemory allocated: 1B150000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\test2.exeWindow / User API: threadDelayed 9740Jump to behavior
          Source: C:\Users\user\Desktop\test2.exe TID: 352Thread sleep count: 247 > 30Jump to behavior
          Source: C:\Users\user\Desktop\test2.exe TID: 352Thread sleep time: -247000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\test2.exe TID: 352Thread sleep count: 9740 > 30Jump to behavior
          Source: C:\Users\user\Desktop\test2.exe TID: 352Thread sleep time: -9740000s >= -30000sJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\test2.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: test2.exe, 00000000.00000002.3963607804.00000000013D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\test2.exeProcess Stats: CPU usage > 42% for more than 60s
          Source: C:\Users\user\Desktop\test2.exeProcess token adjusted: DebugJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\test2.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\test2.exeQueries volume information: C:\Users\user\Desktop\test2.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\test2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: test2.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.test2.exe.db0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1497145384.0000000000DB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: test2.exe PID: 4468, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: test2.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.test2.exe.db0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1497145384.0000000000DB2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: test2.exe PID: 4468, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          DLL Side-Loading
          121
          Virtualization/Sandbox Evasion
          OS Credential Dumping11
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory121
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
          Software Packing
          Security Account Manager1
          Application Window Discovery
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Deobfuscate/Decode Files or Information
          NTDS13
          System Information Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          test2.exe74%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
          test2.exe100%AviraHEUR/AGEN.1311730
          test2.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          158.247.200.450%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          158.247.200.45true
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          158.247.200.45
          unknownUnited States
          26133FEWPBUStrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1558605
          Start date and time:2024-11-19 16:14:12 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 48s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:test2.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@1/0@0/1
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 20
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240000 for current running targets taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com
          • Execution Graph export aborted for target test2.exe, PID 4468 because it is empty
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: test2.exe
          TimeTypeDescription
          10:15:23API Interceptor14590361x Sleep call for process: test2.exe modified
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          FEWPBUS81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
          • 158.247.196.119
          nullnet_load.arm.elfGet hashmaliciousMiraiBrowse
          • 204.118.65.199
          porM7ZoSGI.exeGet hashmaliciousMerlinBrowse
          • 158.247.248.136
          LlCTrWUOQE.exeGet hashmaliciousUnknownBrowse
          • 158.247.248.136
          2CJeeUSPYN.exeGet hashmaliciousUnknownBrowse
          • 158.247.248.136
          1.jpg.exeGet hashmaliciousUnknownBrowse
          • 158.247.219.207
          SecuriteInfo.com.Win64.MalwareX-gen.20346.14970.exeGet hashmaliciousSliverBrowse
          • 158.247.208.174
          SecuriteInfo.com.Win64.MalwareX-gen.20346.14970.exeGet hashmaliciousSliverBrowse
          • 158.247.208.174
          jhpg1LVUrZ.elfGet hashmaliciousMiraiBrowse
          • 158.247.155.125
          f8txrlLgsG.elfGet hashmaliciousMiraiBrowse
          • 63.131.206.237
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):5.712252087672667
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          • Win32 Executable (generic) a (10002005/4) 49.78%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:test2.exe
          File size:303'616 bytes
          MD5:396ef18c45676b0074e41dc2212e06d3
          SHA1:fe07d7d57a66b71611086771260163432a9e7b55
          SHA256:1209c3df30d7d53edad5c43e122e5c14e350e9d229cdf1e263fd16ef22f485f0
          SHA512:3c46d42d0f054ebda330cda1a37aeaf833c697c78f476fa1db80f888608582e7fddeed8daab0e0f373ad6446131e2323f335d787b5a7b58032adcd3333bebb29
          SSDEEP:3072:TvNYzFFE9jZOjmAZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ+ZZZZZZZZZZZZZP:z8E9Z+GIIIIIIIhIIIIIIIIIIIIIIIU
          TLSH:B75410606A050EBCEFE0BA74EBDD536513A52E92013B58CF13D03F8A3537D53BA9A056
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;g.................x...(......n.... ........@.. ....................................@................................
          Icon Hash:0f63e5d3f35c6917
          Entrypoint:0x40976e
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x673BC3DA [Mon Nov 18 22:46:50 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x971c0x4f.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x4259c.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x77740x78000808c5d51173cb697b1831e1855d5f1eFalse0.5011393229166666data5.741152482882237IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0xa0000x4259c0x426004dc0f0c6225dabff9aaa3667d86e7da7False0.07438059086629002data5.551053673748052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x4e0000xc0x2003ee5eb55d2c84cad34ece42377c6f250False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0xa1300x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2703360.07212548451045951
          RT_GROUP_ICON0x4c1580x14data0.9
          RT_VERSION0x4c16c0x244data0.4724137931034483
          RT_MANIFEST0x4c3b00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
          DLLImport
          mscoree.dll_CorExeMain
          TimestampSource PortDest PortSource IPDest IP
          Nov 19, 2024 16:15:24.544512987 CET497047033192.168.2.8158.247.200.45
          Nov 19, 2024 16:15:25.551495075 CET497047033192.168.2.8158.247.200.45
          Nov 19, 2024 16:15:27.551508904 CET497047033192.168.2.8158.247.200.45
          Nov 19, 2024 16:15:31.551619053 CET497047033192.168.2.8158.247.200.45
          Nov 19, 2024 16:15:39.551548958 CET497047033192.168.2.8158.247.200.45
          Nov 19, 2024 16:15:45.713706017 CET497067033192.168.2.8158.247.200.45
          Nov 19, 2024 16:15:46.723618984 CET497067033192.168.2.8158.247.200.45
          Nov 19, 2024 16:15:48.739198923 CET497067033192.168.2.8158.247.200.45
          Nov 19, 2024 16:15:52.754733086 CET497067033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:00.754920006 CET497067033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:06.865104914 CET497087033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:07.865319014 CET497087033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:09.864243984 CET497087033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:13.879822016 CET497087033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:21.879849911 CET497087033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:27.990360022 CET497107033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:29.004869938 CET497107033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:31.004939079 CET497107033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:35.004913092 CET497107033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:43.005057096 CET497107033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:53.428678989 CET497187033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:54.442470074 CET497187033192.168.2.8158.247.200.45
          Nov 19, 2024 16:16:56.461579084 CET497187033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:00.458966970 CET497187033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:08.458177090 CET497187033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:14.569569111 CET497257033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:15.641350985 CET497257033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:17.731550932 CET497257033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:21.770719051 CET497257033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:29.816572905 CET497257033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:36.021706104 CET497277033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:37.052254915 CET497277033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:39.067750931 CET497277033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:43.069685936 CET497277033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:51.067729950 CET497277033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:57.194665909 CET497307033192.168.2.8158.247.200.45
          Nov 19, 2024 16:17:58.192737103 CET497307033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:00.192739964 CET497307033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:04.192760944 CET497307033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:12.208415031 CET497307033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:18.320703983 CET497327033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:19.333487988 CET497327033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:21.333489895 CET497327033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:25.333858967 CET497327033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:33.333753109 CET497327033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:43.366883993 CET497347033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:44.380441904 CET497347033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:46.380413055 CET497347033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:50.384089947 CET497347033192.168.2.8158.247.200.45
          Nov 19, 2024 16:18:58.396315098 CET497347033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:09.182004929 CET497367033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:10.192990065 CET497367033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:12.208622932 CET497367033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:16.208647013 CET497367033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:24.224291086 CET497367033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:39.335445881 CET497397033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:40.349622011 CET497397033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:42.349441051 CET497397033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:46.349402905 CET497397033192.168.2.8158.247.200.45
          Nov 19, 2024 16:19:54.352212906 CET497397033192.168.2.8158.247.200.45

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:10:15:19
          Start date:19/11/2024
          Path:C:\Users\user\Desktop\test2.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\test2.exe"
          Imagebase:0xdb0000
          File size:303'616 bytes
          MD5 hash:396EF18C45676B0074E41DC2212E06D3
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1497145384.0000000000DB2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1497145384.0000000000DB2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
          Reputation:low
          Has exited:false

          Reset < >
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e7a505b77ea48a2b4d347cf55c3b1a8161987dbd8a88b0429606e208f72af5c4
            • Instruction ID: aeccbaa07f040bc0cb2d419a83b4a8bb60df9e48bd6b8c3170738de95ec2ba26
            • Opcode Fuzzy Hash: e7a505b77ea48a2b4d347cf55c3b1a8161987dbd8a88b0429606e208f72af5c4
            • Instruction Fuzzy Hash: 5271E2B190D6898FD749FFB8C8196A47BE4FF56310F2841FAD059CB1D3DA286806C751
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 760f0f51bb4501b43c63db0f5321b8a08df2ad446e0d30bad848f69db5b820de
            • Instruction ID: 3b012ee6c114739a4f1610d6e6916f545ac7aa47c9d329deecdb2b2264f4827c
            • Opcode Fuzzy Hash: 760f0f51bb4501b43c63db0f5321b8a08df2ad446e0d30bad848f69db5b820de
            • Instruction Fuzzy Hash: 3951B29184E6C64EE757FFB889691A07FA4AF53215F2840FBD098CF1D3D91C6846C362
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 02f8f7659a8dd4707c1fcd22f6c4fc189ab7de31c10580acb3f2fb30544cb383
            • Instruction ID: bb18ba240bf2274e281ad3bc934ef1252a6661464bab95c0a0b77ad617a55acc
            • Opcode Fuzzy Hash: 02f8f7659a8dd4707c1fcd22f6c4fc189ab7de31c10580acb3f2fb30544cb383
            • Instruction Fuzzy Hash: 79B14BA1A1DA494FE399FF3884192B97BD2FF99350F6400FAD45EC72D7DD2868028781
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e94c6745e5adef83abcfc57e0d87c338d33c7e7d849c274410e06f2250ccab0c
            • Instruction ID: 71c63f1db437587bbc52ab1d17d1d8044dc2ecd4341edbfd8a4bf24bc8ec3c56
            • Opcode Fuzzy Hash: e94c6745e5adef83abcfc57e0d87c338d33c7e7d849c274410e06f2250ccab0c
            • Instruction Fuzzy Hash: 31A124A1B1DD094BE799FF3CC4192B976E6FF88350F6401B9E45ED32C6DD28A8028781
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 66e013ac0f72c12db5ff380fba7425fa7ed0a1e19d1ab6df56de30a06b1284a3
            • Instruction ID: ed62a8f6d164174cf6abea0678559fcf5f85be99b9f87dedcb8f8a1d3d6709e7
            • Opcode Fuzzy Hash: 66e013ac0f72c12db5ff380fba7425fa7ed0a1e19d1ab6df56de30a06b1284a3
            • Instruction Fuzzy Hash: C15104A1A5DA4E4FE799FB38C45D1E97B96FF89250B9004FAE41EC31C7CD28B8018751
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f7ac8db8ed861c42c1d55e92a7ab3b53694fa8f4346330c3fd0aa21434bfdd2b
            • Instruction ID: a837875e861050a13c48ed40f875239732a43d0ad055fcde8ae3d1242ea76813
            • Opcode Fuzzy Hash: f7ac8db8ed861c42c1d55e92a7ab3b53694fa8f4346330c3fd0aa21434bfdd2b
            • Instruction Fuzzy Hash: FD513861A5EA860FE396FB38D85A6753BD5EF86210B1800FAD88DC71D3DC1DAC428352
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 122fc5e2270c539382dda819e2e282d129b1fe1c1e88d1ab7d6638aaac2f4448
            • Instruction ID: fa5ebf62d74bc5793b41c0d03ad4c63ba620fe31f3f9b224ef498d3790428388
            • Opcode Fuzzy Hash: 122fc5e2270c539382dda819e2e282d129b1fe1c1e88d1ab7d6638aaac2f4448
            • Instruction Fuzzy Hash: 3D51F47094E6864FE746FB7488166A5BFA1FF17320F2802F9D0A9C71D7CA2DA842C751
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 01dcb97c00125d062769bb293a1451d6e666ca58b46eb93980cbc37f89d8d7ea
            • Instruction ID: 5035e83ce889690d7bc04f4c6e00bdf0e3999a7eafeccae21dd627de0ed63026
            • Opcode Fuzzy Hash: 01dcb97c00125d062769bb293a1451d6e666ca58b46eb93980cbc37f89d8d7ea
            • Instruction Fuzzy Hash: BA519E74A0DA5C8FDB58FF68C459BA97BE5FB55311F1001AEE00AC3691CB36E801CB51
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 577f9fd39131a8f58f9925c536e351940e5644aeeec97e7e7f4b5e8017127796
            • Instruction ID: f97cc679eb75483391b71b6c42ee963a5b93eec4bbd554851165b5f55fbfd866
            • Opcode Fuzzy Hash: 577f9fd39131a8f58f9925c536e351940e5644aeeec97e7e7f4b5e8017127796
            • Instruction Fuzzy Hash: B341D36170DA890FE786EB7C985A2787BD1EF9A215B0801FEE44DC72E3DD189C068351
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e9b96e13876e093b090322f335d84e3d345f9d4a5d3508ab8cb3fa72cdbe063e
            • Instruction ID: c3991cc596525b710b2ed2d04c3dd39d7dac0ad4bcfdc921d5ee2a9e889c85f7
            • Opcode Fuzzy Hash: e9b96e13876e093b090322f335d84e3d345f9d4a5d3508ab8cb3fa72cdbe063e
            • Instruction Fuzzy Hash: B041C761B19A094FFB45FBBCD84D6BDB7D5FB98351F1042BAE40DC3192DD28A8418391
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 91a995f79c0117e1dea097a18edbd1a24fefc018ebf2958052f0a58065989740
            • Instruction ID: 95379c3c086020f14d3cbfa67b0475609e15ae43685d1b0e606bc89a0ab655ef
            • Opcode Fuzzy Hash: 91a995f79c0117e1dea097a18edbd1a24fefc018ebf2958052f0a58065989740
            • Instruction Fuzzy Hash: CA419C74A09A1DCFDB98FF68C499BA977E5FB15315F20016EE00AC3691CB36E8418B40
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b2fa9a3f12b692a17bd57c3c922e675667e3ce6f7ee3e3931b65919191faddb0
            • Instruction ID: 679e6a02e56b0185968626fb9f433646b4e7a46b129c35f513062a52e2319f38
            • Opcode Fuzzy Hash: b2fa9a3f12b692a17bd57c3c922e675667e3ce6f7ee3e3931b65919191faddb0
            • Instruction Fuzzy Hash: A231E561B1D9494FE789FB7C985E378B6C1EB99215F1401BEE40EC32D3DD28AC018345
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 15f12b182946c6f5de8c0156ad3e49f952ffe7d98732a9e22e7c104ba66f25f3
            • Instruction ID: beb3f387ea3a7f5d1e5f0017edd914a81aaedef97e44e4e6b35d1c55a70590ff
            • Opcode Fuzzy Hash: 15f12b182946c6f5de8c0156ad3e49f952ffe7d98732a9e22e7c104ba66f25f3
            • Instruction Fuzzy Hash: 68418071A1990A8FEB89FF78C0596B9B7E5FF54310F2401BDD02ED32C6CE29A8418741
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0c6f489bf6a0ab22598689ed70948174bbf40a4d10da2134c8fd46b47268f466
            • Instruction ID: 16c1d33ac0a2f5a05341bc0439162e9657a86636039fd4dbed045649f8d3e37d
            • Opcode Fuzzy Hash: 0c6f489bf6a0ab22598689ed70948174bbf40a4d10da2134c8fd46b47268f466
            • Instruction Fuzzy Hash: 0A4192B0A19A4E8FEB45FBB8C4596E9BBF1FF89300F6445B9D049D32C6CD28B8018751
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d8a4e2590f7cfbb16cf8c56aee6a74c5650d9ed7d4e702d307bba5104a6688d3
            • Instruction ID: 8b6604e753d9e175318f610f40d17a0d9e56c02f2cdc251d8c6a0dd7696e4a8c
            • Opcode Fuzzy Hash: d8a4e2590f7cfbb16cf8c56aee6a74c5650d9ed7d4e702d307bba5104a6688d3
            • Instruction Fuzzy Hash: 7321F7A0E4E6524BF756FF78C55A2B826A6BF85320F7400F9E41DC71C7DD2DB8024291
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 84418b300071630c65ddc2fb1717c56ec1296c800f56ae24717a7d7727aa8ef9
            • Instruction ID: ed738bfe98138b903bc430a536d3552e47406af7d42e0c104c408a9360485412
            • Opcode Fuzzy Hash: 84418b300071630c65ddc2fb1717c56ec1296c800f56ae24717a7d7727aa8ef9
            • Instruction Fuzzy Hash: FA01C8B19086CD8FD74DEF38886D1A93FF1FB96104B5400EFD05AE65D2DA3514418751
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0b4cbcae328b4775563665f058e272335a7cc0f59b01c707014dc6c0d9bdd83a
            • Instruction ID: fed09da2ef9e8b6d3de54e5270e230642aaa10a0eca0fc27117c6aff5f533278
            • Opcode Fuzzy Hash: 0b4cbcae328b4775563665f058e272335a7cc0f59b01c707014dc6c0d9bdd83a
            • Instruction Fuzzy Hash: F60142A0E0E6820BF75AFE78842E2B82695BF41300F3400FDD40D825D3ED1CA8008341
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e253caa243400334c822a90040d872a7734beb0668235892fc67a312e2b665c4
            • Instruction ID: d67e9b133f0691d4c4e04a8544934139e06965b6bf65cc55ff83eb6906fc952a
            • Opcode Fuzzy Hash: e253caa243400334c822a90040d872a7734beb0668235892fc67a312e2b665c4
            • Instruction Fuzzy Hash: 83F0AFB0D4E4128AF256FF38C2596B876AABB95320F7001B4D42DC21CADE39B4518291
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 029e7508dc173888e4dfc9f8aa9f5a3cbdf132be9c1e0ec28ed217a49cc5e552
            • Instruction ID: f83baecdf4d3b70e2e43dd2dcc0fadef8a555b8837a4954aa179fe7e093f9072
            • Opcode Fuzzy Hash: 029e7508dc173888e4dfc9f8aa9f5a3cbdf132be9c1e0ec28ed217a49cc5e552
            • Instruction Fuzzy Hash: B9D0C240C8E2C20AE70B7A780E465D07F649B031A0B6902D2D454C74D7D88D249A4372
            Memory Dump Source
            • Source File: 00000000.00000002.3966148576.00007FFB4AEB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AEB0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffb4aeb0000_test2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 601ada45d6178046a3fa4ab6708d94b39b13961137dfee1a60bdd767dd58d12b
            • Instruction ID: 690e259453e7dd180369fedfa12ac2b022917d73eddecc1a3c9e189fe41adcbe
            • Opcode Fuzzy Hash: 601ada45d6178046a3fa4ab6708d94b39b13961137dfee1a60bdd767dd58d12b
            • Instruction Fuzzy Hash: F0E0C27286838C4FE742BE7058121DA7B28FF51200F5105CBF418C7092E620A6188382