Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hwPMkWBZ6O.exe

Overview

General Information

Sample name:hwPMkWBZ6O.exe
renamed because original name is a hash value
Original sample name:2024-06-08_4f7c96df26709451ade16a8703b546df_avoslocker.exe
Analysis ID:1562216
MD5:4f7c96df26709451ade16a8703b546df
SHA1:4cccded38fbfe2bc528be05389a0e7ab1bb18bb7
SHA256:1e4053448fa8dbcee9851ea62a6399bda2d8188b6ac3a0093b5a0049fa9be3e4
Tags:exemalwareRansomwareuser-Joker
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Detected potential crypto function
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • hwPMkWBZ6O.exe (PID: 4072 cmdline: "C:\Users\user\Desktop\hwPMkWBZ6O.exe" MD5: 4F7C96DF26709451ADE16A8703B546DF)
    • conhost.exe (PID: 5552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: hwPMkWBZ6O.exeAvira: detected
Source: hwPMkWBZ6O.exeReversingLabs: Detection: 84%
Source: hwPMkWBZ6O.exeJoe Sandbox ML: detected
Source: hwPMkWBZ6O.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: MidlRT.pdb source: hwPMkWBZ6O.exe
Source: Binary string: MidlRT.pdbGCTL source: hwPMkWBZ6O.exe
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeCode function: 0_2_00407D6C0_2_00407D6C
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeCode function: 0_2_00403EA00_2_00403EA0
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeCode function: 0_2_00405BB50_2_00405BB5
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeCode function: 0_2_004014B60_2_004014B6
Source: hwPMkWBZ6O.exeBinary or memory string: OriginalFilename vs hwPMkWBZ6O.exe
Source: hwPMkWBZ6O.exe, 00000000.00000000.2111814165.0000000000551000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemidlrt.exej% vs hwPMkWBZ6O.exe
Source: hwPMkWBZ6O.exe, 00000000.00000002.3349290604.0000000000552000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemidlrt.exej% vs hwPMkWBZ6O.exe
Source: hwPMkWBZ6O.exeBinary or memory string: OriginalFilenamemidlrt.exej% vs hwPMkWBZ6O.exe
Source: hwPMkWBZ6O.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: hwPMkWBZ6O.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: hwPMkWBZ6O.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: classification engineClassification label: mal60.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5552:120:WilError_03
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: hwPMkWBZ6O.exeReversingLabs: Detection: 84%
Source: unknownProcess created: C:\Users\user\Desktop\hwPMkWBZ6O.exe "C:\Users\user\Desktop\hwPMkWBZ6O.exe"
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeSection loaded: midlrtmd.dllJump to behavior
Source: hwPMkWBZ6O.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: hwPMkWBZ6O.exeStatic file information: File size 2082816 > 1048576
Source: hwPMkWBZ6O.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x145200
Source: hwPMkWBZ6O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: MidlRT.pdb source: hwPMkWBZ6O.exe
Source: Binary string: MidlRT.pdbGCTL source: hwPMkWBZ6O.exe
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeCode function: 0_2_0040BF5A push eax; iretd 0_2_0040BF65
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeCode function: 0_2_00413164 pushfd ; ret 0_2_00413165
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeCode function: 0_2_0040BF66 pushad ; iretd 0_2_0040BF71
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeCode function: 0_2_004112F9 pushad ; iretd 0_2_004113F9
Source: C:\Users\user\Desktop\hwPMkWBZ6O.exeCode function: 0_2_0041119F push eax; ret 0_2_004111AD
Source: hwPMkWBZ6O.exeStatic PE information: section name: .reloc entropy: 7.901129109347179
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Software Packing
OS Credential Dumping1
System Information Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
hwPMkWBZ6O.exe84%ReversingLabsWin32.Virus.Expiro
hwPMkWBZ6O.exe100%AviraW32/Infector.Gen
hwPMkWBZ6O.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1562216
Start date and time:2024-11-25 10:59:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:hwPMkWBZ6O.exe
renamed because original name is a hash value
Original Sample Name:2024-06-08_4f7c96df26709451ade16a8703b546df_avoslocker.exe
Detection:MAL
Classification:mal60.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target hwPMkWBZ6O.exe, PID 4072 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: hwPMkWBZ6O.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):7.213390277350323
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:hwPMkWBZ6O.exe
File size:2'082'816 bytes
MD5:4f7c96df26709451ade16a8703b546df
SHA1:4cccded38fbfe2bc528be05389a0e7ab1bb18bb7
SHA256:1e4053448fa8dbcee9851ea62a6399bda2d8188b6ac3a0093b5a0049fa9be3e4
SHA512:2343c707047701868e4ba6af3ab085db5ea1997c1a36ff92c3702748381a33a06d5c8c017a59d213d058940c2d3fd8f27ebdeddb97fcf0c3a816696b6beeca04
SSDEEP:49152:satQfOOwViT2YcsSo3ZH4BkNpvOoROs0hxtz7CNtcW+S8:nV62YcsSo3ZH4qNUkOHhxtk8
TLSH:E3A5BE3275D0A4B7E122313087AAE361546ECA30676285C733DCC77E1FB5AC1993A79B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........2...\...\...\...]...\.......\...X...\..._...\...]...\...].a.\...U...\...Y...\.......\...^...\.Rich..\.........PE..L......+...
Icon Hash:00928e8e8686b000
Entrypoint:0x5261e0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x2BA913AD [Fri Mar 19 00:28:29 1993 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:222bb63698d5e056823213878b2e8268
Instruction
call 00007F223CD53690h
jmp 00007F223CC766DDh
cmp ecx, dword ptr [0054C1E0h]
jne 00007F223CC76875h
ret
jmp 00007F223CC76E1Dh
jmp 00007F223CBB3269h
mov edi, edi
push ebp
mov ebp, esp
push dword ptr [ebp+08h]
call 00007F223CBB325Ch
pop ecx
pop ebp
ret
mov edi, edi
push ebp
mov ebp, esp
pop ebp
jmp 00007F223CBB3219h
int3
int3
int3
int3
int3
mov edi, edi
push ebp
mov ebp, esp
test byte ptr [ebp+08h], 00000001h
push esi
mov esi, ecx
mov dword ptr [esi], 00402760h
je 00007F223CC76879h
push esi
call 00007F223CBB322Fh
pop ecx
mov eax, esi
pop esi
pop ebp
retn 0004h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
call 00007F223CC76897h
push 00000000h
call 00007F223CC76B9Eh
pop ecx
test al, al
je 00007F223CC76880h
push 00526370h
call 00007F223CC76D47h
pop ecx
xor eax, eax
ret
push 00000007h
call 00007F223CC77113h
int3
mov edi, edi
push ebp
mov ebp, esp
push FFFFFFFFh
push 00532A3Ch
mov eax, dword ptr fs:[00000000h]
push eax
push ebx
push esi
push edi
mov eax, dword ptr [0054C1E0h]
xor eax, ebp
push eax
lea eax, dword ptr [ebp-0Ch]
mov dword ptr fs:[00000000h], eax
push 00000FA0h
push 0054CEACh
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1512b00xc8.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1530000x113e8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x60e800x54.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x1349c0x18.text
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x133f00xac.text
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x1510000x2ac.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x14502c0x145200b16132fbba378059313e57ab8b37bf53False0.46127465998654366data6.6190072289557484IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x1470000x9a600x5a00359378f0ad35802ad84faf15b313c91eFalse0.20512152777777778data4.209294138396472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x1510000x12440x14009cb624e74ec1d70e05c0cd2b5d548df4False0.4013671875data5.273728621570615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x1530000x113e80x11400395fd077ac77a4cd2c80e8f2c67ceff1False0.11278589221014493data5.5043757958330595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1650000xa00000x9f000747d1e7a9cdf3b73225d9655b4626054False0.9348466981132075data7.901129109347179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
CODEFRAGMENT0x1547100x19dASCII text, with CRLF line terminatorsEnglishUnited States0.6343825665859564
CODEFRAGMENT0x1548b00x21dASCII text, with CRLF line terminatorsEnglishUnited States0.5489833641404805
CODEFRAGMENT0x154ad00x3f3ASCII text, with CRLF line terminatorsEnglishUnited States0.4124629080118694
CODEFRAGMENT0x154ec80xa0ASCII text, with CRLF line terminatorsEnglishUnited States0.89375
CODEFRAGMENT0x154f680x1b7ASCII text, with CRLF line terminatorsEnglishUnited States0.5535307517084282
CODEFRAGMENT0x1551200xd8ASCII text, with CRLF line terminatorsEnglishUnited States0.7407407407407407
CODEFRAGMENT0x1551f80x1aaASCII text, with CRLF line terminatorsEnglishUnited States0.636150234741784
CODEFRAGMENT0x1553a80x24fASCII text, with CRLF line terminatorsEnglishUnited States0.5363790186125211
CODEFRAGMENT0x1546280xe5ASCII text, with CRLF line terminatorsEnglishUnited States0.5327510917030568
CODEFRAGMENT0x1555f80x13aASCII text, with CRLF line terminatorsEnglishUnited States0.6910828025477707
CODEFRAGMENT0x1557380x132ASCII text, with CRLF line terminatorsEnglishUnited States0.6830065359477124
CODEFRAGMENT0x1558700x10eASCII text, with CRLF line terminatorsEnglishUnited States0.7222222222222222
CODEFRAGMENT0x1559800x16fASCII text, with CRLF line terminatorsEnglishUnited States0.5967302452316077
CODEFRAGMENT0x155af00x1e1ASCII text, with CRLF line terminatorsEnglishUnited States0.6257796257796258
CODEFRAGMENT0x155cd80xf8ASCII text, with CRLF line terminatorsEnglishUnited States0.7096774193548387
CODEFRAGMENT0x155dd00x26aASCII text, with CRLF line terminatorsEnglishUnited States0.4110032362459547
CODEFRAGMENT0x1560400x1bcGeneric INItialization configuration [propput]EnglishUnited States0.6081081081081081
CODEFRAGMENT0x1562000x298Generic INItialization configuration [propput]EnglishUnited States0.4382530120481928
CODEFRAGMENT0x1564980x27aGeneric INItialization configuration [propput]EnglishUnited States0.45110410094637227
CODEFRAGMENT0x1567180x109ASCII text, with CRLF line terminatorsEnglishUnited States0.7018867924528301
CODEFRAGMENT0x1568280x109ASCII text, with CRLF line terminatorsEnglishUnited States0.7094339622641509
CODEFRAGMENT0x1569380xe5ASCII text, with CRLF line terminatorsEnglishUnited States0.759825327510917
CODEFRAGMENT0x156a200xf7ASCII text, with CRLF line terminatorsEnglishUnited States0.7408906882591093
CODEFRAGMENT0x156b180xf7ASCII text, with CRLF line terminatorsEnglishUnited States0.7327935222672065
CODEFRAGMENT0x156c100xf8ASCII text, with CRLF line terminatorsEnglishUnited States0.7540322580645161
CODEFRAGMENT0x156d080x122ASCII text, with CRLF line terminatorsEnglishUnited States0.7517241379310344
CODEFRAGMENT0x156e300x12fASCII text, with CRLF line terminatorsEnglishUnited States0.7128712871287128
CODEFRAGMENT0x156f600x363ASCII text, with CRLF line terminatorsEnglishUnited States0.461361014994233
CODEFRAGMENT0x1573680xa7ASCII text, with CRLF line terminatorsEnglishUnited States0.8802395209580839
CODEFRAGMENT0x1572c80x9eASCII text, with CRLF line terminatorsEnglishUnited States0.8860759493670886
CODEFRAGMENT0x1574100x3deASCII text, with CRLF line terminatorsEnglishUnited States0.4898989898989899
CODEFRAGMENT0x1577f00xeaASCII text, with CRLF line terminatorsEnglishUnited States0.6752136752136753
CODEFRAGMENT0x157c280xcb8C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.23617936117936117
CODEFRAGMENT0x1588e00x11b3C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.20635621275656588
CODEFRAGMENT0x159a980x756C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.29659211927582535
CODEFRAGMENT0x15a1f00xa7bC source, ASCII text, with CRLF line terminatorsEnglishUnited States0.2616474096161014
CODEFRAGMENT0x15ac700x7e1C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.2949925632126921
CODEFRAGMENT0x15b4580xa21C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.26764365599691475
CODEFRAGMENT0x15be800xc19C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.24572166612851146
CODEFRAGMENT0x15caa00x847C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.2888154789995281
CODEFRAGMENT0x15d2e80x83eC source, ASCII text, with CRLF line terminatorsEnglishUnited States0.2881516587677725
CODEFRAGMENT0x15db280x47cC source, ASCII text, with CRLF line terminatorsEnglishUnited States0.382404181184669
CODEFRAGMENT0x15dfa80x51cC source, ASCII text, with CRLF line terminatorsEnglishUnited States0.36162079510703365
CODEFRAGMENT0x15e4c80x7f3C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.28697788697788695
CODEFRAGMENT0x15ecc00x8d2C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.27723649247121346
CODEFRAGMENT0x15f5980xabdC source, ASCII text, with CRLF line terminatorsEnglishUnited States0.24190614769006913
CODEFRAGMENT0x1600580xa78C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.24440298507462688
CODEFRAGMENT0x160ad00x4a1C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.3729957805907173
CODEFRAGMENT0x160f780x4c3C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.38720262510254305
CODEFRAGMENT0x1614400x487C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.3925798101811907
CODEFRAGMENT0x1618c80x478C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.38286713286713286
CODEFRAGMENT0x161d400x48dC source, ASCII text, with CRLF line terminatorsEnglishUnited States0.37510729613733906
CODEFRAGMENT0x1621d00x744C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.30591397849462365
CODEFRAGMENT0x1629180x77dC source, ASCII text, with CRLF line terminatorsEnglishUnited States0.3072509128847157
CODEFRAGMENT0x1630980xfbASCII text, with CRLF line terminatorsEnglishUnited States0.8007968127490039
CODEFRAGMENT0x1631980x276C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.5746031746031746
CODEFRAGMENT0x1638080x402C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.38693957115009747
CODEFRAGMENT0x1634100x3f1C source, ASCII text, with CRLF line terminatorsEnglishUnited States0.38850346878097125
CODEFRAGMENT0x1578e00x343C++ source, ASCII text, with CRLF line terminatorsEnglishUnited States0.5401197604790419
CODEFRAGMENT0x163c100x146ASCII text, with CRLF line terminatorsEnglishUnited States0.5674846625766872
CODEFRAGMENT0x163d580x347ASCII text, with CRLF line terminatorsEnglishUnited States0.3706793802145411
CODEFRAGMENT0x1640a00xfeASCII text, with CRLF line terminatorsEnglishUnited States0.46062992125984253
CODEFRAGMENT0x1641a00x246ASCII text, with CRLF line terminatorsEnglishUnited States0.3247422680412371
RT_VERSION0x1542880x39cOpenPGP Secret KeyEnglishUnited States0.4523809523809524
RT_MANIFEST0x153cb00x5d3XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.36217303822937624
DLLImport
KERNEL32.dllGetStdHandle, WaitForSingleObject, CloseHandle, CreateProcessA, GetExitCodeProcess, GetShortPathNameA, GetEnvironmentVariableA, GetLastError, lstrcmpiA, GetSystemDefaultLCID, IsDBCSLeadByteEx, GetLocaleInfoA, CompareStringOrdinal, MultiByteToWideChar, WideCharToMultiByte, SizeofResource, WriteFile, FindResourceA, SetCurrentDirectoryA, LoadResource, FindFirstFileExW, FindClose, GetCommandLineW, GetCommandLineA, LocalFree, VirtualQuery, GetSystemInfo, VirtualAlloc, VirtualProtect, GetCurrentDirectoryA, FormatMessageA, CreateMutexExW, OpenSemaphoreW, GetFileAttributesA, ReleaseMutex, GetFileAttributesW, GetTempFileNameA, GetProcAddress, GetModuleHandleA, CompareStringA, LockResource, DebugBreak, InitOnceExecuteOnce, FormatMessageW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetStringTypeW, GetCPInfo, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, ReadFile, GetConsoleMode, ReadConsoleW, CreateFileW, GetFileType, GetDriveTypeW, GetSystemTimeAsFileTime, DuplicateHandle, GetFullPathNameW, ExitProcess, FreeLibrary, GetModuleHandleW, GetModuleHandleExW, HeapAlloc, HeapReAlloc, HeapFree, SetLastError, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetStartupInfoW, FlushFileBuffers, GetConsoleOutputCP, RaiseException, SetStdHandle, SetFilePointerEx, SetEndOfFile, DeleteFileW, MoveFileExW, GetFileSizeEx, GetCurrentDirectoryW, GetFileAttributesExW, GetProcessHeap, GetTimeZoneInformation, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetModuleFileNameW, CreateProcessW, WriteConsoleW, OutputDebugStringW, HeapSize, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, QueryPerformanceCounter, GetCurrentProcessId, InitializeSListHead, RtlUnwind, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LoadLibraryExA, GetModuleFileNameA, CreateSemaphoreExW, ReleaseSemaphore, FindNextFileW
ole32.dllOleUninitialize, CoInitialize, StringFromGUID2, CoUninitialize, OleInitialize
RPCRT4.dllRpcStringFreeA, UuidToStringA
bcrypt.dllBCryptDestroyHash, BCryptCloseAlgorithmProvider, BCryptFinishHash, BCryptGetProperty, BCryptHashData, BCryptCreateHash, BCryptOpenAlgorithmProvider
api-ms-win-core-path-l1-1-0.dllPathCchFindExtension, PathCchAddBackslash, PathCchCanonicalizeEx, PathCchRemoveFileSpec, PathCchRenameExtension, PathCchRemoveExtension
SHLWAPI.dllPathIsRelativeA, PathIsRelativeW, SHCreateStreamOnFileEx
ADVAPI32.dllTraceEvent
OLEAUT32.dllVariantClear, SysAllocString, LoadTypeLibEx, LHashValOfNameSys, SysFreeString
MidlrtMd.dllCreatePEFile, MetaDataGetDispenser
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:04:59:58
Start date:25/11/2024
Path:C:\Users\user\Desktop\hwPMkWBZ6O.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\hwPMkWBZ6O.exe"
Imagebase:0x400000
File size:2'082'816 bytes
MD5 hash:4F7C96DF26709451ADE16A8703B546DF
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:04:59:58
Start date:25/11/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Reset < >
    Strings
    • DefaultCase : [ KWDEFAULT ] MemberDeclaration , xrefs: 004083F5
    • OneAttributeWithDefault : SimpleContractAttribute , xrefs: 00408665
    • NidlUnionBody : NidlUnionCases , xrefs: 00408405
    • OneAttributeWithDefault : ContractVersionAttribute , xrefs: 00408660, 00408661
    • OneAttributeWithDefault : OdlAttribute , xrefs: 0040865D
    • OneAttributeWithDefault : OperationAttribute , xrefs: 00408659
    • OneAttributeWithDefault : CustomAttributeUse , xrefs: 00408669
    • OneAttributeWithDefault : FromContractAttribute , xrefs: 0040866D
    Memory Dump Source
    • Source File: 00000000.00000002.3349125478.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3349108151.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349236541.0000000000547000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349256436.000000000054C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349256436.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349290604.0000000000552000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349311988.0000000000565000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_hwPMkWBZ6O.jbxd
    Similarity
    • API ID:
    • String ID: DefaultCase : [ KWDEFAULT ] MemberDeclaration $NidlUnionBody : NidlUnionCases $OneAttributeWithDefault : ContractVersionAttribute $OneAttributeWithDefault : CustomAttributeUse $OneAttributeWithDefault : FromContractAttribute $OneAttributeWithDefault : OdlAttribute $OneAttributeWithDefault : OperationAttribute $OneAttributeWithDefault : SimpleContractAttribute
    • API String ID: 0-2238874750
    • Opcode ID: 1698cc077c24d653698e18fac25b951681d5f5a8eb7224578418dfa7e5a2f21c
    • Instruction ID: 19e1a6836d8aebd14907579656854402bad9524ab0abf0741234b7148fd80153
    • Opcode Fuzzy Hash: 1698cc077c24d653698e18fac25b951681d5f5a8eb7224578418dfa7e5a2f21c
    • Instruction Fuzzy Hash: 61D2524058E3D10FD3278B6409BA5DABF60AEA312435A97EFC5C20BCA3E54D885BC357
    Memory Dump Source
    • Source File: 00000000.00000002.3349125478.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3349108151.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349236541.0000000000547000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349256436.000000000054C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349256436.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349290604.0000000000552000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349311988.0000000000565000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_hwPMkWBZ6O.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5065b86b031a83ed259657acd56524d703b5f0e92f6b3668a2d0b564f017d5b2
    • Instruction ID: aaab05739e40763d5f833645f9d053007fad5f5f69087e365689bc844ff6475b
    • Opcode Fuzzy Hash: 5065b86b031a83ed259657acd56524d703b5f0e92f6b3668a2d0b564f017d5b2
    • Instruction Fuzzy Hash: BF03999548E7C11FE71787701C7A695BF70AE53228B1E86DFC8C68A4A3D24D894BC363
    Memory Dump Source
    • Source File: 00000000.00000002.3349125478.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3349108151.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349236541.0000000000547000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349256436.000000000054C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349256436.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349290604.0000000000552000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349311988.0000000000565000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_hwPMkWBZ6O.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 757569403760b21852206191aaaae72ce9c512ff52663bd5584f218e20b1cc13
    • Instruction ID: 50341890006d49cd0f394ef5738cf47c07f2f279fe5a236f18141fee0910f5cb
    • Opcode Fuzzy Hash: 757569403760b21852206191aaaae72ce9c512ff52663bd5584f218e20b1cc13
    • Instruction Fuzzy Hash: A782075069E7E15FD303867849B96C9BF60EF9310831B51EFC5C64B8A3D6848C9BC36A
    Memory Dump Source
    • Source File: 00000000.00000002.3349125478.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3349108151.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349236541.0000000000547000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349256436.000000000054C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349256436.0000000000551000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349290604.0000000000552000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3349311988.0000000000565000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_hwPMkWBZ6O.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e32112b7529e4b2e973b43135a387a6ab2b448f9146f75dde1d98b40621e18ff
    • Instruction ID: 4177ded3e10064d9f4a77240e7dd8e27b739411d6439add5aef0f783dbc0b8f3
    • Opcode Fuzzy Hash: e32112b7529e4b2e973b43135a387a6ab2b448f9146f75dde1d98b40621e18ff
    • Instruction Fuzzy Hash: C2A1C44026EBF00FD327C32848F96E23F54DE9715931A61EFCAC24A4A3E5944857C7A7