Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Updater.exe

Overview

General Information

Sample name:Updater.exe
Analysis ID:1591997
MD5:8f3972f98564fc9d1e3e5a3840a0da85
SHA1:90e87af2bdfdf33e49eea353480cb8da362c450e
SHA256:cbdfe04b8f754e5e6150936ee604f0a478b79c6d0466ee155775ead575adea90
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Updater.exe (PID: 5440 cmdline: "C:\Users\user\Desktop\Updater.exe" MD5: 8F3972F98564FC9D1E3E5A3840A0DA85)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Updater.exeVirustotal: Detection: 15%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
Source: Updater.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 45.33.84.9:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: Updater.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: System.Configuration.pdb source: Updater.exe, 00000000.00000002.2155680672.000002A8C5419000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: b.pdb source: Updater.exe, 00000000.00000002.2155680672.000002A8C5419000.00000004.00000020.00020000.00000000.sdmp
Source: global trafficHTTP traffic detected: POST /r HTTP/1.1Content-Type: text/plain; charset=utf-8Host: can.thisilient.comContent-Length: 1520Expect: 100-continueConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: can.thisilient.com
Source: unknownHTTP traffic detected: POST /r HTTP/1.1Content-Type: text/plain; charset=utf-8Host: can.thisilient.comContent-Length: 1520Expect: 100-continueConnection: Keep-Alive
Source: Updater.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Updater.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Updater.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Updater.exe, 00000000.00000002.2156338821.000002A8C7003000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://can.thisilient.com
Source: Updater.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: Updater.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
Source: Updater.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: Updater.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Updater.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Updater.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Updater.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: Updater.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Updater.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: Updater.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: Updater.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: Updater.exeString found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: Updater.exe, 00000000.00000002.2156338821.000002A8C6F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Updater.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: Updater.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: Updater.exeString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: Updater.exe, 00000000.00000002.2156338821.000002A8C6FDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://can.thisilient.com
Source: Updater.exeString found in binary or memory: https://can.thisilient.com/r
Source: Updater.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownHTTPS traffic detected: 45.33.84.9:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: C:\Users\user\Desktop\Updater.exeCode function: 0_2_00007FFD348C3D5E0_2_00007FFD348C3D5E
Source: Updater.exeStatic PE information: No import functions for PE file found
Source: classification engineClassification label: mal52.winEXE@1/1@1/1
Source: C:\Users\user\Desktop\Updater.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Updater.exe.logJump to behavior
Source: C:\Users\user\Desktop\Updater.exeMutant created: NULL
Source: Updater.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Updater.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\Updater.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Updater.exeVirustotal: Detection: 15%
Source: C:\Users\user\Desktop\Updater.exeFile read: C:\Users\user\Desktop\Updater.exeJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Updater.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: Updater.exeStatic PE information: certificate valid
Source: Updater.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Updater.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Updater.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Updater.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: System.Configuration.pdb source: Updater.exe, 00000000.00000002.2155680672.000002A8C5419000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: b.pdb source: Updater.exe, 00000000.00000002.2155680672.000002A8C5419000.00000004.00000020.00020000.00000000.sdmp
Source: Updater.exeStatic PE information: 0x886E3A6B [Mon Jul 14 04:34:51 2042 UTC]
Source: C:\Users\user\Desktop\Updater.exeCode function: 0_2_00007FFD348C785E push eax; iretd 0_2_00007FFD348C786D
Source: C:\Users\user\Desktop\Updater.exeCode function: 0_2_00007FFD348C7C5E push eax; retf 0_2_00007FFD348C7C6D
Source: C:\Users\user\Desktop\Updater.exeCode function: 0_2_00007FFD348C021D push E95D5C98h; ret 0_2_00007FFD348C0259
Source: C:\Users\user\Desktop\Updater.exeCode function: 0_2_00007FFD348C782E pushad ; iretd 0_2_00007FFD348C785D
Source: C:\Users\user\Desktop\Updater.exeCode function: 0_2_00007FFD348C7C2E pushad ; retf 0_2_00007FFD348C7C5D
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Updater.exeMemory allocated: 2A8C5640000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Updater.exeMemory allocated: 2A8DEF30000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Updater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Updater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Updater.exeWindow / User API: threadDelayed 672Jump to behavior
Source: C:\Users\user\Desktop\Updater.exeWindow / User API: threadDelayed 2377Jump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 1936Thread sleep time: -8301034833169293s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 2752Thread sleep count: 672 > 30Jump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 2752Thread sleep count: 2377 > 30Jump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 2536Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Updater.exe TID: 4148Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Updater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Updater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: Updater.exe, 00000000.00000002.2157611329.000002A8DF766000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Updater.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Updater.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Updater.exeQueries volume information: C:\Users\user\Desktop\Updater.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Updater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Updater.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Updater.exe11%ReversingLabs
Updater.exe15%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://can.thisilient.com0%Avira URL Cloudsafe
https://can.thisilient.com0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
can.thisilient.com
45.33.84.9
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://can.thisilient.com/rfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://can.thisilient.comUpdater.exe, 00000000.00000002.2156338821.000002A8C7003000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameUpdater.exe, 00000000.00000002.2156338821.000002A8C6F31000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://can.thisilient.comUpdater.exe, 00000000.00000002.2156338821.000002A8C6FDC000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        45.33.84.9
        can.thisilient.comUnited States
        63949LINODE-APLinodeLLCUSfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1591997
        Start date and time:2025-01-15 16:25:52 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 2m 14s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:2
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Updater.exe
        Detection:MAL
        Classification:mal52.winEXE@1/1@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 93%
        • Number of executed functions: 3
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Excluded IPs from analysis (whitelisted): 13.107.246.45
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        TimeTypeDescription
        10:26:44API Interceptor15x Sleep call for process: Updater.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        45.33.84.9ZipThis.exeGet hashmaliciousUnknownBrowse
          ZipThis.exeGet hashmaliciousUnknownBrowse
            http://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              can.thisilient.comZipThis.exeGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              ZipThis.exeGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              http://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              LINODE-APLinodeLLCUShttps://realazure.action.azurecomm.net/api/v2/a/c?url=https://evoicemanageroauth-receptionextension.ayesgroup.com.tr/api/&d=AIAACYB2LC5AFHPW2VWJHSV6UVQVRFTHKQBDW7UWQ3KNJXOX5BDUSXJ3ZQRQJPJ5OCLBPZWKD4BJYLQE5BL3GPZPYFC3R7C3HOFZMPETSYONQACZBWKXDVJSZWINJEC6Z4RKVWOIGO4NDLG6FQA6LFOFNHOYVHNU6O5BF2CIF5XY7JZBYIXDHOQTPGKEQXDCQ5S3LP7YSIX6WCUPVILRNCLWJT2MHVSBN2DFV42FB6TTKWPS3I3ZHCMOW63EIPBFPUC2TNHK25YXIBLVSK2QFSGRKUWIP7I&s=CJMEZBXJGCDDZHAVATKKCN5IOIKFCP44FAQWT2LF3YTNOXOSBYKAGet hashmaliciousHTMLPhisherBrowse
              • 66.228.45.195
              Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
              • 50.116.26.15
              https://m365.eu.vadesecure.com/safeproxy/v4?f=P2kPCMrad6wbkDicjo9-gccMP9mht8icnqc8BSBVdA_Y7h7opqWdVmIuu6aydhxUqmDN6F6EdXlLyB2l0qIMlQ&i=5-xWt8no16hszAEjWVJq7eaI9aJqiiKo6Nhcmhm-VGlgucrJV_O22YeSLcAbYkmTq4CwxD0j9z8vSmI-321xIA&k=xkCw&r=pXE3RoNwGsBbFpqq5275TB1w64v1huZFRPWjs9IU8PkouXkx5H5uI3MDfotj5UVm&s=fdffd7ecf746462b0c7628930ed8d07f470444f4a342766d2b3d92d5b7331db4&u=https%3A%2F%2Ftiny.pl%2Fc1rp2m9fGet hashmaliciousHTMLPhisherBrowse
              • 45.33.29.14
              RFQ PC25-1301 Product Specifications_PDF.exeGet hashmaliciousFormBookBrowse
              • 172.104.236.215
              MACHINE SPECIFICATIONS.exeGet hashmaliciousFormBookBrowse
              • 45.56.79.23
              http://premiumsub.hosted.phplist.com/Get hashmaliciousUnknownBrowse
              • 45.33.29.14
              1N6ZpdYnU3.exeGet hashmaliciousFormBookBrowse
              • 178.79.184.196
              http://www.jadavisinjurylawyers.com/Get hashmaliciousUnknownBrowse
              • 173.255.204.62
              boatnet.arm7.elfGet hashmaliciousUnknownBrowse
              • 104.237.135.249
              boatnet.m68k.elfGet hashmaliciousUnknownBrowse
              • 172.105.120.101
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              3b5074b1b5d032e5620f69f9f700ff0ePersonliche Nachricht fur e4060738.pdfGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              https://pub-2d00d32ff6d84ef6999828eaf509b772.r2.dev/index.html#watson.becky@aidb.orgGet hashmaliciousHTMLPhisherBrowse
              • 45.33.84.9
              Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
              • 45.33.84.9
              http://www.flamingoblv.comGet hashmaliciousUnknownBrowse
              • 45.33.84.9
              NZZ71x6Cyz.dllGet hashmaliciousWannacryBrowse
              • 45.33.84.9
              qqnal04.exeGet hashmaliciousPhemedrone StealerBrowse
              • 45.33.84.9
              RFQ_43200046412000086500125.vbsGet hashmaliciousDiscord Token StealerBrowse
              • 45.33.84.9
              0969686.vbeGet hashmaliciousAgentTeslaBrowse
              • 45.33.84.9
              Inquiry.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
              • 45.33.84.9
              No context
              Process:C:\Users\user\Desktop\Updater.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1143
              Entropy (8bit):5.363323400812904
              Encrypted:false
              SSDEEP:24:ML9E4KQwKDE4KGKZI6KhwE4kLE4qXKIE4TKBGKoZAE4KKUNb:MxHKQwYHKGSI6owHoHitHTHhAHKKkb
              MD5:A975604E9D55484A4B077C59874EEE81
              SHA1:C9C7EB649A74DAF98D0EE85FB068683B354B01AA
              SHA-256:48F4690F7DA0CD34B59E447E73B182F81A444E19F618EF6CB378D7A5FC00825A
              SHA-512:46B22945CDEAD7AED49FB3FF079EE8E6D51571BB8C5DFDCC2AC00EEE858FC6E55C8BEF846080ACC31D7C57ABD2EFE1D410B2177D98D540148397B9C8DFB4DFE3
              Malicious:true
              Reputation:low
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Net.Http, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Net.Http\f4b68470ad08185826d827aa6e7875b6\System.Net.Http.ni.dll",0..2,"System.Web, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, Publ
              File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
              Entropy (8bit):6.880048281652988
              TrID:
              • Win64 Executable GUI Net Framework (217006/5) 49.88%
              • Win64 Executable GUI (202006/5) 46.43%
              • Win64 Executable (generic) (12005/4) 2.76%
              • Generic Win/DOS Executable (2004/3) 0.46%
              • DOS Executable Generic (2002/1) 0.46%
              File name:Updater.exe
              File size:20'776 bytes
              MD5:8f3972f98564fc9d1e3e5a3840a0da85
              SHA1:90e87af2bdfdf33e49eea353480cb8da362c450e
              SHA256:cbdfe04b8f754e5e6150936ee604f0a478b79c6d0466ee155775ead575adea90
              SHA512:f0909e35e839bc8735d1f3b8c1ae37dc9b78ba9d8278a17f2dd660c1cfc18fa42a95d7a8cb9cbe44e73778440e3bb117c97377933860e68c07723c09b91f6f84
              SSDEEP:384:U+uUE99n53Fc4LVlDsQw/uo6ki2rcNi1HUfIXSJIVE8E9VF0Ny+P/s:UH9nysnDs8r2AkNTW2EIXs
              TLSH:E1927C46AB608C03DF578E7AF0E6852159B1B38B9CB9D9DB910EC1790E443802FD5A7C
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...k:n..........."...0.................. .....@..... .......................`.......x....`...@......@............... .....
              Icon Hash:00928e8e8686b000
              Entrypoint:0x140000000
              Entrypoint Section:
              Digitally signed:true
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x886E3A6B [Mon Jul 14 04:34:51 2042 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:
              Signature Valid:true
              Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
              Signature Validation Error:The operation completed successfully
              Error Number:0
              Not Before, Not After
              • 21/02/2024 13:51:07 21/02/2025 13:51:07
              Subject Chain
              • E=contactus@lightnertok.com, CN=LIGHTNER TOK LTD, O=LIGHTNER TOK LTD, L=Tel Aviv-Jaffa, S=Tel Aviv, C=IL, OID.1.3.6.1.4.1.311.60.2.1.3=IL, SERIALNUMBER=516201944, OID.2.5.4.15=Private Organization
              Version:3
              Thumbprint MD5:CEC13869EA7B5624B992C775556F2F58
              Thumbprint SHA-1:B0F054A3A02999D47B5FADE5C33FA9C9FE1B951F
              Thumbprint SHA-256:661CCA115D81F163E9E7C33A3D60D2BFC02F95829864B132267E130EDA8DAE07
              Serial:4469809AA0E206829C99CD18
              Instruction
              dec ebp
              pop edx
              nop
              add byte ptr [ebx], al
              add byte ptr [eax], al
              add byte ptr [eax+eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x610.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x22000x2f28
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x375c0x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x17780x18004827aa12af5b139f82d6a5776d2c9760False0.544921875data5.494857000998824IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x40000x6100x80022cfa201420d24581bc417b9031ae853False0.3251953125data3.6438015075611085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0x40900x324data0.42786069651741293
              RT_MANIFEST0x43c40x246XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4965635738831615
              TimestampSource PortDest PortSource IPDest IP
              Jan 15, 2025 16:26:46.169296980 CET49711443192.168.2.645.33.84.9
              Jan 15, 2025 16:26:46.169344902 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:46.169653893 CET49711443192.168.2.645.33.84.9
              Jan 15, 2025 16:26:46.209505081 CET49711443192.168.2.645.33.84.9
              Jan 15, 2025 16:26:46.209520102 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:46.760302067 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:46.760380983 CET49711443192.168.2.645.33.84.9
              Jan 15, 2025 16:26:46.823524952 CET49711443192.168.2.645.33.84.9
              Jan 15, 2025 16:26:46.823549032 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:46.824002981 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:46.871815920 CET49711443192.168.2.645.33.84.9
              Jan 15, 2025 16:26:46.908992052 CET49711443192.168.2.645.33.84.9
              Jan 15, 2025 16:26:46.951344013 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:47.017781973 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:47.027735949 CET49711443192.168.2.645.33.84.9
              Jan 15, 2025 16:26:47.027766943 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:47.326566935 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:47.327081919 CET4434971145.33.84.9192.168.2.6
              Jan 15, 2025 16:26:47.327207088 CET49711443192.168.2.645.33.84.9
              Jan 15, 2025 16:26:47.331907034 CET49711443192.168.2.645.33.84.9
              TimestampSource PortDest PortSource IPDest IP
              Jan 15, 2025 16:26:45.889770985 CET6350553192.168.2.61.1.1.1
              Jan 15, 2025 16:26:46.065325975 CET53635051.1.1.1192.168.2.6
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jan 15, 2025 16:26:45.889770985 CET192.168.2.61.1.1.10x32b2Standard query (0)can.thisilient.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jan 15, 2025 16:26:46.065325975 CET1.1.1.1192.168.2.60x32b2No error (0)can.thisilient.com45.33.84.9A (IP address)IN (0x0001)false
              • can.thisilient.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.64971145.33.84.94435440C:\Users\user\Desktop\Updater.exe
              TimestampBytes transferredDirectionData
              2025-01-15 15:26:46 UTC155OUTPOST /r HTTP/1.1
              Content-Type: text/plain; charset=utf-8
              Host: can.thisilient.com
              Content-Length: 1520
              Expect: 100-continue
              Connection: Keep-Alive
              2025-01-15 15:26:47 UTC25INHTTP/1.1 100 Continue
              2025-01-15 15:26:47 UTC1520OUTData Raw: 56 30 46 63 58 55 42 6d 57 41 55 50 41 41 31 51 55 55 5a 52 44 67 52 43 62 46 73 4c 56 6b 41 58 45 67 42 42 5a 77 78 53 58 68 78 4b 45 55 78 44 55 46 68 43 41 52 41 36 56 55 52 47 58 55 42 62 49 6c 39 47 57 77 41 61 43 41 30 56 54 6c 56 52 43 31 4a 49 42 52 6c 48 57 45 46 41 45 6c 6b 43 53 52 46 59 55 78 39 43 55 78 49 4a 47 78 59 46 55 33 4a 44 55 51 42 41 42 6c 73 77 52 51 59 57 51 52 49 4d 55 46 46 58 55 51 30 4d 41 46 56 45 45 51 64 52 4a 78 46 41 64 31 59 51 55 45 4e 58 41 69 6c 63 57 77 52 61 52 6c 46 52 62 56 42 44 59 46 46 66 46 30 64 51 55 30 78 64 51 6b 59 4f 43 45 4e 6d 52 41 46 44 4c 77 5a 50 45 55 74 4d 51 41 52 55 53 68 6b 53 43 6c 49 66 45 68 31 50 41 78 45 62 5a 55 31 42 52 67 4d 4d 48 6e 70 34 53 6d 34 35 4a 78 4d 58 58 45 70 4c 59 51 6f
              Data Ascii: V0FcXUBmWAUPAA1QUUZRDgRCbFsLVkAXEgBBZwxSXhxKEUxDUFhCARA6VURGXUBbIl9GWwAaCA0VTlVRC1JIBRlHWEFAElkCSRFYUx9CUxIJGxYFU3JDUQBABlswRQYWQRIMUFFXUQ0MAFVEEQdRJxFAd1YQUENXAilcWwRaRlFRbVBDYFFfF0dQU0xdQkYOCENmRAFDLwZPEUtMQARUShkSClIfEh1PAxEbZU1BRgMMHnp4Sm45JxMXXEpLYQo
              2025-01-15 15:26:47 UTC190INHTTP/1.1 200 OK
              Content-Type: application/json
              Date: Wed, 15 Jan 2025 15:26:47 GMT
              Server: Nginx
              Vary: Accept-Encoding
              Via: 1.1 google
              Connection: close
              Transfer-Encoding: chunked
              2025-01-15 15:26:47 UTC65INData Raw: 33 62 0d 0a 7b 22 6d 65 73 73 61 67 65 22 3a 22 4f 6b 20 66 72 6f 6d 20 72 65 70 6f 72 74 20 70 6f 73 74 20 73 65 72 76 69 63 65 20 50 4f 53 54 22 2c 22 73 74 61 74 75 73 22 3a 32 30 30 7d 0d 0a
              Data Ascii: 3b{"message":"Ok from report post service POST","status":200}
              2025-01-15 15:26:47 UTC5INData Raw: 30 0d 0a 0d 0a
              Data Ascii: 0


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:10:26:43
              Start date:15/01/2025
              Path:C:\Users\user\Desktop\Updater.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\Updater.exe"
              Imagebase:0x2a8c5300000
              File size:20'776 bytes
              MD5 hash:8F3972F98564FC9D1E3E5A3840A0DA85
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:11%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:3
                Total number of Limit Nodes:0
                execution_graph 5669 7ffd348c8644 5670 7ffd348c864d LoadLibraryExW 5669->5670 5672 7ffd348c86fd 5670->5672

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000000.00000002.2158480570.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd348c0000_Updater.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f1d54d2dead8a1ed19d9933895acf018540b6744f49320982aade954bc685836
                • Instruction ID: 52f8b3f80a0cc4583896eb7007c326421ca5ea629c448c0be214f304b1580675
                • Opcode Fuzzy Hash: f1d54d2dead8a1ed19d9933895acf018540b6744f49320982aade954bc685836
                • Instruction Fuzzy Hash: 2E228271E18A5D8FEBA4DB5C88A5798BBE1FFA9340F4002EBD44DE3251DE345D828B40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 433 7ffd348c8644-7ffd348c864b 434 7ffd348c8656-7ffd348c86bf 433->434 435 7ffd348c864d-7ffd348c8655 433->435 437 7ffd348c86c9-7ffd348c86fb LoadLibraryExW 434->437 438 7ffd348c86c1-7ffd348c86c6 434->438 435->434 439 7ffd348c8703-7ffd348c872a 437->439 440 7ffd348c86fd 437->440 438->437 440->439
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2158480570.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd348c0000_Updater.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: daf8f8de418b0e0704cb7d518df4138617db2ce92b47fdd3c3bc59103529d621
                • Instruction ID: e6e25a62607e207b1668ca83f0cf65c1dcae7441a50f490d087a2c7fc2ecf668
                • Opcode Fuzzy Hash: daf8f8de418b0e0704cb7d518df4138617db2ce92b47fdd3c3bc59103529d621
                • Instruction Fuzzy Hash: 9F31D331A0CA4C9FDB19DB98D889BE9BBE0FF66321F04426FD049D3151DB74A846CB91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 442 7ffd348c8072-7ffd348c86bf 445 7ffd348c86c9-7ffd348c86fb LoadLibraryExW 442->445 446 7ffd348c86c1-7ffd348c86c6 442->446 447 7ffd348c8703-7ffd348c872a 445->447 448 7ffd348c86fd 445->448 446->445 448->447
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2158480570.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd348c0000_Updater.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: db343e48b6d88f7ded4bf026a1031aff0131b9d79a06a0294b2c74f90e8ceb58
                • Instruction ID: 1f33ba398462614ea6f5289b9a670e72c12b351b1bf6a0e1885dc1a0c5d8ff39
                • Opcode Fuzzy Hash: db343e48b6d88f7ded4bf026a1031aff0131b9d79a06a0294b2c74f90e8ceb58
                • Instruction Fuzzy Hash: C5219471A08A1C9FDB58DF9CD449BF9BBE0FB69321F00422FD00AD3651DB74A8458B91