Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ydpdt8Efff.exe

Overview

General Information

Sample name:Ydpdt8Efff.exe
renamed because original name is a hash value
Original sample name:039aebb1a469963963e34d31a42e6608.exe
Analysis ID:1417246
MD5:039aebb1a469963963e34d31a42e6608
SHA1:6a60e11aa5949ab9fd861397879e2b6649292e2b
SHA256:5cad07e8a93e151126f2668e4acd40bfb6a6c136720868e1abb88d6ce855488b
Tags:exe
Infos:

Detection

Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
Machine Learning detection for sample
Sigma detected: Potentially Suspicious Malware Callback Communication
Detected TCP or UDP traffic on non-standard ports
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Ydpdt8Efff.exe (PID: 6748 cmdline: "C:\Users\user\Desktop\Ydpdt8Efff.exe" MD5: 039AEBB1A469963963E34D31A42E6608)
  • cleanup
{"Type": "Metasploit Connect", "IP": "91.92.251.119", "Port": 4444}
SourceRuleDescriptionAuthorStrings
Ydpdt8Efff.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2930971142.00000000004C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      00000000.00000002.2930971142.00000000004C0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0xf3:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
      SourceRuleDescriptionAuthorStrings
      0.0.Ydpdt8Efff.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
        0.2.Ydpdt8Efff.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 91.92.251.119, DestinationIsIpv6: false, DestinationPort: 4444, EventID: 3, Image: C:\Users\user\Desktop\Ydpdt8Efff.exe, Initiated: true, ProcessId: 6748, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49729
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Ydpdt8Efff.exeAvira: detected
          Source: 00000000.00000002.2930971142.00000000004C0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "91.92.251.119", "Port": 4444}
          Source: Ydpdt8Efff.exeReversingLabs: Detection: 81%
          Source: Ydpdt8Efff.exeJoe Sandbox ML: detected
          Source: Ydpdt8Efff.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: Ydpdt8Efff.exe
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 4x nop then and dl, byte ptr [eax-6FA86FF7h]0_2_004056E0
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 4x nop then push ebp0_2_004056E0
          Source: global trafficTCP traffic: 192.168.2.4:49729 -> 91.92.251.119:4444
          Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.119
          Source: Ydpdt8Efff.exeString found in binary or memory: http://www.apache.org/
          Source: Ydpdt8Efff.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: Ydpdt8Efff.exeString found in binary or memory: http://www.zeustech.net/

          System Summary

          barindex
          Source: 00000000.00000002.2930971142.00000000004C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
          Source: Ydpdt8Efff.exe, 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs Ydpdt8Efff.exe
          Source: Ydpdt8Efff.exeBinary or memory string: OriginalFilenameab.exeF vs Ydpdt8Efff.exe
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeSection loaded: mswsock.dllJump to behavior
          Source: Ydpdt8Efff.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 00000000.00000002.2930971142.00000000004C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
          Source: Ydpdt8Efff.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal96.troj.winEXE@1/0@0/1
          Source: Ydpdt8Efff.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Ydpdt8Efff.exeReversingLabs: Detection: 81%
          Source: Ydpdt8Efff.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: Ydpdt8Efff.exe
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 0_2_0040124A push eax; ret 0_2_00401253
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 0_2_00404C71 push cs; retf 0_2_00404C8F
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 0_2_00407EC0 push ebp; ret 0_2_00407EC1
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 0_2_004026C0 push 00000050h; retf 0_2_00402776
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 0_2_00401AE2 push eax; ret 0_2_00401AEA
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 0_2_00408370 push edi; ret 0_2_0040837F
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 0_2_00402713 push 00000050h; retf 0_2_00402776
          Source: C:\Users\user\Desktop\Ydpdt8Efff.exeCode function: 0_2_00404B9B push ebx; iretd 0_2_00404B9C
          Source: Ydpdt8Efff.exeStatic PE information: section name: .text entropy: 7.02404492702774
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: Ydpdt8Efff.exe, 00000000.00000002.2930995962.00000000004FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000000.00000002.2930971142.00000000004C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Ydpdt8Efff.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.Ydpdt8Efff.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Ydpdt8Efff.exe.400000.0.unpack, type: UNPACKEDPE
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          DLL Side-Loading
          2
          Software Packing
          OS Credential Dumping1
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          DLL Side-Loading
          LSASS Memory1
          System Information Discovery
          Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
          Obfuscated Files or Information
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Ydpdt8Efff.exe82%ReversingLabsWin32.Trojan.CryptZMarte
          Ydpdt8Efff.exe100%AviraTR/Patched.Gen2
          Ydpdt8Efff.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.zeustech.net/0%Avira URL Cloudsafe
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0Ydpdt8Efff.exefalse
            high
            http://www.apache.org/Ydpdt8Efff.exefalse
              high
              http://www.zeustech.net/Ydpdt8Efff.exefalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              91.92.251.119
              unknownBulgaria
              34368THEZONEBGtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1417246
              Start date and time:2024-03-28 20:09:16 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 3m 49s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Ydpdt8Efff.exe
              renamed because original name is a hash value
              Original Sample Name:039aebb1a469963963e34d31a42e6608.exe
              Detection:MAL
              Classification:mal96.troj.winEXE@1/0@0/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 9
              • Number of non-executed functions: 1
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: Ydpdt8Efff.exe
              No simulations
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              THEZONEBGSecuriteInfo.com.Linux.BtcMine.798.28745.31751.elfGet hashmaliciousUnknownBrowse
              • 91.92.249.202
              SecuriteInfo.com.Linux.BtcMine.791.1794.25936.elfGet hashmaliciousUnknownBrowse
              • 91.92.249.202
              https://accedi.91-92-243-23.cprapid.com/ING/Get hashmaliciousUnknownBrowse
              • 91.92.243.23
              6Y6IpTEdR1.elfGet hashmaliciousMiraiBrowse
              • 91.92.241.246
              6CllngOjeS.elfGet hashmaliciousMiraiBrowse
              • 91.92.241.246
              QFrEHZB9q7.elfGet hashmaliciousMiraiBrowse
              • 91.92.241.246
              TVcKf6reGr.elfGet hashmaliciousMiraiBrowse
              • 91.92.241.246
              3f1esZupW0.elfGet hashmaliciousMiraiBrowse
              • 91.92.241.246
              bNEazx06Ai.elfGet hashmaliciousMiraiBrowse
              • 91.92.241.246
              C8AcOrD3Kr.elfGet hashmaliciousMiraiBrowse
              • 91.92.241.246
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.328182161985991
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:Ydpdt8Efff.exe
              File size:73'802 bytes
              MD5:039aebb1a469963963e34d31a42e6608
              SHA1:6a60e11aa5949ab9fd861397879e2b6649292e2b
              SHA256:5cad07e8a93e151126f2668e4acd40bfb6a6c136720868e1abb88d6ce855488b
              SHA512:37ce7dff742d3a9680574c96012c81fcbb3aa94435c7aeb4691f1a6fa9e9e8009e63b4d3d126302fbeab13adf453b045fd5c2dcfd4ca7d24b20f90e4e4e386a0
              SSDEEP:1536:Ia6vKe2IO6a0lRL82nTnWVMb+KR0Nc8QsJq39:W1xL5ue0Nc8QsC9
              TLSH:2C73B042D9C42575C2B7127E26752E7A9971F2FE7301C1DA754CCDB9DBC08B0A62A3C2
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L...$.XJ...........
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x401511
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              DLL Characteristics:
              Time Stamp:0x4A580B24 [Sat Jul 11 03:46:44 2009 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:481f47bbb2c9c21e108d65f52b04c448
              Instruction
              inc ebx
              cdq
              cdq
              wait
              cdq
              wait
              xchg eax, edx
              std
              cmc
              std
              cwde
              inc edx
              inc ecx
              stc
              dec eax
              cwde
              das
              stc
              nop
              stc
              wait
              nop
              xchg eax, edx
              inc ebx
              inc eax
              aas
              das
              xchg eax, ecx
              dec edx
              cdq
              nop
              aas
              inc ebx
              cwde
              salc
              aas
              inc eax
              inc eax
              cwde
              das
              xchg eax, ecx
              stc
              clc
              salc
              inc ebx
              stc
              cdq
              cwde
              lahf
              dec eax
              std
              cwde
              cld
              inc edx
              dec ecx
              aaa
              wait
              std
              xchg eax, ebx
              das
              xchg eax, edx
              wait
              xchg eax, ecx
              salc
              clc
              das
              cwde
              dec ebx
              inc ecx
              cmc
              dec edx
              das
              stc
              xchg eax, edx
              aas
              xchg eax, edx
              lahf
              cmc
              inc edx
              cmc
              lahf
              aas
              wait
              cdq
              das
              inc eax
              dec edx
              std
              xchg eax, ecx
              inc edx
              salc
              dec eax
              stc
              dec eax
              nop
              das
              aaa
              aas
              std
              inc edx
              dec ebx
              xchg eax, edx
              inc edx
              cdq
              aaa
              salc
              cwde
              cld
              inc ebx
              aaa
              salc
              clc
              cld
              cwde
              das
              das
              inc edx
              dec eax
              xchg eax, ecx
              cld
              xchg eax, ecx
              dec ebx
              dec edx
              aaa
              aaa
              aas
              dec ecx
              clc
              cld
              aaa
              dec eax
              lahf
              lahf
              cdq
              cmc
              das
              lahf
              inc edx
              inc eax
              nop
              std
              inc eax
              cld
              cld
              stc
              stc
              dec eax
              dec ebx
              aas
              cdq
              dec ecx
              xchg eax, ebx
              dec ebx
              inc eax
              nop
              nop
              nop
              cld
              inc eax
              lahf
              cwde
              xchg eax, ecx
              lahf
              cdq
              dec edx
              inc ecx
              inc ebx
              cld
              inc ebx
              salc
              inc edx
              wait
              xchg eax, ecx
              nop
              cwde
              wait
              cdq
              wait
              xchg eax, ebx
              cdq
              std
              cwde
              inc ebx
              dec ebx
              xchg eax, ecx
              inc ebx
              lahf
              std
              cmc
              cwde
              clc
              wait
              daa
              dec ecx
              inc ecx
              cwde
              xchg eax, ecx
              xchg eax, ecx
              daa
              Programming Language:
              • [EXP] VC++ 6.0 SP5 build 8804
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000xa9660xb0006d71628a936db04aad377a613b9130d2False0.8174272017045454data7.02404492702774IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
              DLLImport
              MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
              KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
              ADVAPI32.dllFreeSid, AllocateAndInitializeSid
              WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
              WS2_32.dllWSARecv, WSASend
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              Mar 28, 2024 20:10:06.386260986 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:07.382877111 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:09.398458958 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:13.414086103 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:21.414071083 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:27.414592981 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:28.414031029 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:30.414032936 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:34.414139032 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:42.414051056 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:48.414510965 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:49.429656982 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:51.429661036 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:10:55.429637909 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:03.429671049 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:09.445806026 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:10.445302010 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:12.460943937 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:16.476552010 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:24.492157936 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:30.492696047 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:31.492172956 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:33.492172956 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:37.492150068 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:45.492213011 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:51.640671015 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:52.648426056 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:54.664077997 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:11:58.664042950 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:12:06.664161921 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:12:12.664531946 CET497294444192.168.2.491.92.251.119
              Mar 28, 2024 20:12:13.679620028 CET497294444192.168.2.491.92.251.119

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:20:10:05
              Start date:28/03/2024
              Path:C:\Users\user\Desktop\Ydpdt8Efff.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\Ydpdt8Efff.exe"
              Imagebase:0x400000
              File size:73'802 bytes
              MD5 hash:039AEBB1A469963963E34D31A42E6608
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2930971142.00000000004C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.2930971142.00000000004C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:0.7%
                Dynamic/Decrypted Code Coverage:25%
                Signature Coverage:0%
                Total number of Nodes:32
                Total number of Limit Nodes:1
                execution_graph 2728 401922 2729 40192d VirtualAlloc 2728->2729 2731 401993 2729->2731 2731->2731 2676 401623 2677 40162d 2676->2677 2679 401632 2676->2679 2678 401919 VirtualAlloc 2677->2678 2678->2679 2704 401946 2705 401949 VirtualAlloc 2704->2705 2707 401993 2705->2707 2684 4010e9 2685 401516 2684->2685 2686 401919 VirtualAlloc 2685->2686 2687 401632 2686->2687 2649 4c0000 2650 4c0010 2649->2650 2650->2650 2653 4c00b0 2650->2653 2652 4c0021 2652->2652 2656 4c00c5 2653->2656 2654 4c00d7 WSASocketA 2655 4c00f3 connect 2654->2655 2655->2656 2656->2654 2656->2655 2657 4c0172 2656->2657 2657->2652 2658 40664f 2659 406651 SetHandleInformation 2658->2659 2659->2659 2660 40105a 2661 401064 2660->2661 2664 401919 2661->2664 2665 40192d VirtualAlloc 2664->2665 2667 401993 2665->2667 2667->2667 2645 4019bb 2646 401949 VirtualAlloc 2645->2646 2648 401993 2646->2648 2648->2648

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 4c00b0-4c00d5 3 4c00d7-4c00f2 WSASocketA 0->3 4 4c00f3-4c0100 connect 3->4 5 4c010c-4c011c 4->5 6 4c0102-4c0105 4->6 10 4c011e-4c0132 5->10 11 4c0154-4c0161 5->11 6->4 7 4c0107 call 4c0173 6->7 7->5 15 4c0133-4c0142 10->15 11->3 14 4c0167 11->14 14->7 17 4c016c-4c0170 15->17 18 4c0144-4c014d 15->18 17->15 19 4c0172 17->19 18->11
                APIs
                • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,5C110002,77FB5C5B,0000000A,?,?,5F327377,00003233), ref: 004C00F0
                • connect.WS2_32(6174A599,?,?,00000010,?,?,5F327377,00003233), ref: 004C00FC
                Memory Dump Source
                • Source File: 00000000.00000002.2930971142.00000000004C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4c0000_Ydpdt8Efff.jbxd
                Yara matches
                Similarity
                • API ID: Socketconnect
                • String ID:
                • API String ID: 3599670298-0
                • Opcode ID: 3632f5c97856200b1ea424195428f2d2b9c51fb6c34c603f31a4b13347f93c2a
                • Instruction ID: 8466214489eebb43eb870d3d43009fed945356eb0ee7fb975ccebe8b64d5620f
                • Opcode Fuzzy Hash: 3632f5c97856200b1ea424195428f2d2b9c51fb6c34c603f31a4b13347f93c2a
                • Instruction Fuzzy Hash: 1D11C4B4780298BEF53022639C07F7B6D1CCF42BA8F15002ABB45EA1C5C99A9D4081FE
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 20 4018d6-4018f5 22 4018f6-401905 20->22 26 401695-4016be 22->26 30 4016c0-4016c2 26->30 31 4016c4-4016e8 26->31 30->31 31->26 34 4016ea-401724 31->34 38 40172a-40177f 34->38 39 4018ce-4018e6 34->39 46 40178b-40179c 38->46 39->22 48 4017a2-4017ad 46->48 49 4018b9-4018cd 46->49 51 4017ae-4017ed 48->51 49->39 56 4017f3-40180b 51->56 56->46 58 401811-4018b5 56->58 70 4018b6 58->70 70->70
                APIs
                • VirtualAlloc.KERNELBASE(E553A458,00000000,0000017D,00001000,00000040), ref: 0040197F
                Memory Dump Source
                • Source File: 00000000.00000002.2930893133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2930881344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930906591.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930918925.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Ydpdt8Efff.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 27f018d754781c739761b132f8cb5982995dabb62ea2ddc6182b097cb6fe6f72
                • Instruction ID: d7c84810739adb075a6078031cf3a39eb578d6a81e8b50ae65beadb6036642e1
                • Opcode Fuzzy Hash: 27f018d754781c739761b132f8cb5982995dabb62ea2ddc6182b097cb6fe6f72
                • Instruction Fuzzy Hash: D541047A64D201CBC7049A609850AB533ADAB5F350B3974B7D44B7B2F3D67C8803A65F
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 71 401919-4019ac VirtualAlloc call 401a8f 80 4019b1 71->80 80->80
                APIs
                • VirtualAlloc.KERNELBASE(E553A458,00000000,0000017D,00001000,00000040), ref: 0040197F
                Memory Dump Source
                • Source File: 00000000.00000002.2930893133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2930881344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930906591.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930918925.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Ydpdt8Efff.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: ba93a02911303b323b105cfd1292a01f6d1aef5680267656836e516f4972d6dc
                • Instruction ID: 3af35dd577e5f3fac26f8ad0df66882be8e2acc0f0218c596956bf9d824474f2
                • Opcode Fuzzy Hash: ba93a02911303b323b105cfd1292a01f6d1aef5680267656836e516f4972d6dc
                • Instruction Fuzzy Hash: F8D017E87CE109D2D91411A02822BF9528D070F790E343473A64B3A1F288BC1802F1AF
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 81 401922-4019ac VirtualAlloc call 401a8f 90 4019b1 81->90 90->90
                APIs
                • VirtualAlloc.KERNELBASE(E553A458,00000000,0000017D,00001000,00000040), ref: 0040197F
                Memory Dump Source
                • Source File: 00000000.00000002.2930893133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2930881344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930906591.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930918925.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Ydpdt8Efff.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 8b12b153b771cac8d948453bc1e0a64d3a57bdd683762af58ae4abb4a8055de7
                • Instruction ID: 7577adffe00e3a6ab88418b3d03a96d943c06d4557bbab9858acddef196630da
                • Opcode Fuzzy Hash: 8b12b153b771cac8d948453bc1e0a64d3a57bdd683762af58ae4abb4a8055de7
                • Instruction Fuzzy Hash: 97E08CB838E104D7DA00967058A2FB522890B0E780F353477A24B3A1E2C8FC5802E6AF
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 91 40196e-40196f 92 401971-401975 91->92 93 401948-401968 91->93 95 401977-4019ac VirtualAlloc call 401a8f 92->95 93->95 99 4019b1 95->99 99->99
                APIs
                • VirtualAlloc.KERNELBASE(E553A458,00000000,0000017D,00001000,00000040), ref: 0040197F
                Memory Dump Source
                • Source File: 00000000.00000002.2930893133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2930881344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930906591.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930918925.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Ydpdt8Efff.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 311addec1a9be7df862dfe685aef60431735df55f4c6a95817f796c42fdf7e4e
                • Instruction ID: a0fbc1beaa82e8547af6bee1bb027a78684e435408b013c4ac7a1230fb1a7925
                • Opcode Fuzzy Hash: 311addec1a9be7df862dfe685aef60431735df55f4c6a95817f796c42fdf7e4e
                • Instruction Fuzzy Hash: B1E0CDB838D144DBC90551700C27FB96185874E300F30247B5087771E1D8FC1807D15F
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 100 401946-4019ac VirtualAlloc call 401a8f 107 4019b1 100->107 107->107
                APIs
                • VirtualAlloc.KERNELBASE(E553A458,00000000,0000017D,00001000,00000040), ref: 0040197F
                Memory Dump Source
                • Source File: 00000000.00000002.2930893133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2930881344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930906591.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930918925.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Ydpdt8Efff.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: a011d70bd54103a5df8f3d78ef4e2278df315bf296a5598b7ee2fb67c7c3f396
                • Instruction ID: 7a6661d00783b37d7d5038a807918380967d5ed852eed2dc99faed2aea391ee3
                • Opcode Fuzzy Hash: a011d70bd54103a5df8f3d78ef4e2278df315bf296a5598b7ee2fb67c7c3f396
                • Instruction Fuzzy Hash: 6EE0C2B838D1509ACA1A91701C22BB9660A0B0F700F2430775182BB2E2CCA86403A56E
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 108 4019bb-4019bc VirtualAlloc 112 401993-4019ac call 401a8f 108->112 115 4019b1 112->115 115->115
                APIs
                • VirtualAlloc.KERNELBASE(E553A458,00000000,0000017D,00001000,00000040), ref: 0040197F
                Memory Dump Source
                • Source File: 00000000.00000002.2930893133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2930881344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930906591.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930918925.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Ydpdt8Efff.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 09ec768fbdaf10882dd08c1d37e2179c705bc503faca3900c7f81ff55a25d3c1
                • Instruction ID: 89669ebcae44759d5d66a78b7c40b2929234cdb47495c3d3946b5ed0dd90646c
                • Opcode Fuzzy Hash: 09ec768fbdaf10882dd08c1d37e2179c705bc503faca3900c7f81ff55a25d3c1
                • Instruction Fuzzy Hash: 1AE012B838D154DADE1A91701C72BBA665A0B5F700F6430775182BB1E2CDA86803E5AE
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 116 401938-4019ac VirtualAlloc call 401a8f 123 4019b1 116->123 123->123
                APIs
                • VirtualAlloc.KERNELBASE(E553A458,00000000,0000017D,00001000,00000040), ref: 0040197F
                Memory Dump Source
                • Source File: 00000000.00000002.2930893133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2930881344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930906591.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930918925.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Ydpdt8Efff.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 133a01d38235c24a05b37c0e30e0822974487780fe8f30917403de2ca63384e0
                • Instruction ID: e9555c8fa2a40c0895332757e9404b2d8ec7f131aa51b5aff967827efa60cc1a
                • Opcode Fuzzy Hash: 133a01d38235c24a05b37c0e30e0822974487780fe8f30917403de2ca63384e0
                • Instruction Fuzzy Hash: 9AD05EE838E144D2D91556701C32FB96205070B740F703433A246361F198FC1803A16F
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 124 401958-4019ac VirtualAlloc call 401a8f 130 4019b1 124->130 130->130
                APIs
                • VirtualAlloc.KERNELBASE(E553A458,00000000,0000017D,00001000,00000040), ref: 0040197F
                Memory Dump Source
                • Source File: 00000000.00000002.2930893133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2930881344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930906591.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930918925.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Ydpdt8Efff.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 9c22fd7207eafed1ea0c304e14a7b96ec77022a8c94e506df53804fbd266cb02
                • Instruction ID: f165791bad876e7fb0912c95c0f753183b7373789b5b51c2b71cc292266f49fe
                • Opcode Fuzzy Hash: 9c22fd7207eafed1ea0c304e14a7b96ec77022a8c94e506df53804fbd266cb02
                • Instruction Fuzzy Hash: 7AD0A9A838D008DBD81110B82C22FF9A282274F340F3020B368423B2E1ACE81842A19F
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.2930893133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.2930881344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930906591.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930918925.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2930932267.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Ydpdt8Efff.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f894387548492b77ebc09e8d08b23c21f30236bd567b06251a2c8edf301d366b
                • Instruction ID: ad6c81752351c17291338c756f6c4006304f653367e79a63addac75503686636
                • Opcode Fuzzy Hash: f894387548492b77ebc09e8d08b23c21f30236bd567b06251a2c8edf301d366b
                • Instruction Fuzzy Hash: 05E08C35910204AFC7208F08D488C72FBB8EF4B370B15A494EA88AB351D670EC02CB98
                Uniqueness

                Uniqueness Score: -1.00%