Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
__ ___.scr.exe

Overview

General Information

Sample name:__ ___.scr.exe
Analysis ID:1417353
MD5:49e8704aa83c8a6445260ca25f68e99a
SHA1:f2da7dab38056c8225320d10b8b5ab3f4882cc18
SHA256:d47d5c7948096ffd22bd3d3fb6d714a5a6bd6f4b265dd3408ec149b73167bf08
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Lokibot
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • __ ___.scr.exe (PID: 7444 cmdline: "C:\Users\user\Desktop\__ ___.scr.exe" MD5: 49E8704AA83C8A6445260CA25F68E99A)
    • __ ___.scr.exe (PID: 7472 cmdline: "C:\Users\user\Desktop\__ ___.scr.exe" MD5: 49E8704AA83C8A6445260CA25F68E99A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "spencerstuartllc.top/document/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
    00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
        • 0x17450:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
        00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
        • 0x481b:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
        Click to see the 26 entries
        SourceRuleDescriptionAuthorStrings
        0.2.__ ___.scr.exe.3965030.2.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          0.2.__ ___.scr.exe.3965030.2.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          0.2.__ ___.scr.exe.3965030.2.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          0.2.__ ___.scr.exe.3965030.2.unpackLoki_1Loki Payloadkevoreilly
          • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
          • 0x133fc:$a2: last_compatible_version
          0.2.__ ___.scr.exe.3965030.2.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
          • 0x123ff:$des3: 68 03 66 00 00
          • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
          • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
          Click to see the 38 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://kbfvzoboss.bid/alien/fre.phpURL Reputation: Label: malware
          Source: http://kbfvzoboss.bid/alien/fre.phpURL Reputation: Label: malware
          Source: http://alphastand.win/alien/fre.phpURL Reputation: Label: malware
          Source: http://alphastand.trade/alien/fre.phpURL Reputation: Label: malware
          Source: http://alphastand.top/alien/fre.phpURL Reputation: Label: malware
          Source: http://alphastand.top/alien/fre.phpURL Reputation: Label: malware
          Source: spencerstuartllc.top/document/five/fre.phpAvira URL Cloud: Label: phishing
          Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "spencerstuartllc.top/document/five/fre.php"]}
          Source: __ ___.scr.exeVirustotal: Detection: 40%Perma Link
          Source: __ ___.scr.exeJoe Sandbox ML: detected
          Source: __ ___.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: __ ___.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: __ ___.scr.exe, 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, __ ___.scr.exe, 00000000.00000002.1614064248.0000000004F10000.00000004.08000000.00040000.00000000.sdmp

          Networking

          barindex
          Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
          Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
          Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
          Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
          Source: Malware configuration extractorURLs: spencerstuartllc.top/document/five/fre.php
          Source: __ ___.scr.exe, 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, __ ___.scr.exe, 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, __ ___.scr.exe, 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, __ ___.scr.exe, 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/

          System Summary

          barindex
          Source: 0.2.__ ___.scr.exe.3965030.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.__ ___.scr.exe.3965030.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.__ ___.scr.exe.3965030.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.__ ___.scr.exe.3965030.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0.2.__ ___.scr.exe.4e90000.5.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.__ ___.scr.exe.38e91b0.4.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.__ ___.scr.exe.38a1380.3.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.__ ___.scr.exe.38a1380.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
          Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: __ ___.scr.exe PID: 7444, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: Process Memory Space: __ ___.scr.exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
          Source: C:\Users\user\Desktop\__ ___.scr.exeCode function: 0_2_00B5ABB80_2_00B5ABB8
          Source: C:\Users\user\Desktop\__ ___.scr.exeCode function: 0_2_00B592E00_2_00B592E0
          Source: __ ___.scr.exe, 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs __ ___.scr.exe
          Source: __ ___.scr.exe, 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs __ ___.scr.exe
          Source: __ ___.scr.exe, 00000000.00000002.1612874697.0000000000B6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs __ ___.scr.exe
          Source: __ ___.scr.exe, 00000000.00000002.1613376458.0000000003859000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs __ ___.scr.exe
          Source: __ ___.scr.exe, 00000000.00000002.1613912571.0000000004EC3000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs __ ___.scr.exe
          Source: __ ___.scr.exe, 00000000.00000002.1614064248.0000000004F10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs __ ___.scr.exe
          Source: __ ___.scr.exe, 00000000.00000000.1610070773.00000000004EC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemstsc.exel% vs __ ___.scr.exe
          Source: __ ___.scr.exeBinary or memory string: OriginalFilenamemstsc.exel% vs __ ___.scr.exe
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeSection loaded: windows.storage.dllJump to behavior
          Source: __ ___.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.__ ___.scr.exe.3965030.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.__ ___.scr.exe.3965030.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.__ ___.scr.exe.3965030.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.__ ___.scr.exe.3965030.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0.2.__ ___.scr.exe.4e90000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.__ ___.scr.exe.38e91b0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.__ ___.scr.exe.38a1380.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.__ ___.scr.exe.38a1380.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
          Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: __ ___.scr.exe PID: 7444, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: Process Memory Space: __ ___.scr.exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
          Source: __ ___.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: __ ___.scr.exe, -J.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.__ ___.scr.exe.38a1380.3.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.__ ___.scr.exe.38a1380.3.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
          Source: __ ___.scr.exeBinary or memory string: MSB2013: The project-to-project reference with GUID {0} could not be converted because a valid .SLN file containing all projects could not be found.
          Source: __ ___.scr.exeBinary or memory string: .vbproj
          Source: __ ___.scr.exeBinary or memory string: .csproj
          Source: __ ___.scr.exeBinary or memory string: .csprojM{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}
          Source: __ ___.scr.exeBinary or memory string: .vbprojM{F184B08F-C81C-45F6-A57F-5ABD9991F28F}
          Source: __ ___.scr.exeBinary or memory string: *.sln.sln
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@0/0
          Source: C:\Users\user\Desktop\__ ___.scr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\__ ___.scr.exe.logJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeMutant created: NULL
          Source: __ ___.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: __ ___.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
          Source: C:\Users\user\Desktop\__ ___.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: __ ___.scr.exeVirustotal: Detection: 40%
          Source: unknownProcess created: C:\Users\user\Desktop\__ ___.scr.exe "C:\Users\user\Desktop\__ ___.scr.exe"
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess created: C:\Users\user\Desktop\__ ___.scr.exe "C:\Users\user\Desktop\__ ___.scr.exe"
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess created: C:\Users\user\Desktop\__ ___.scr.exe "C:\Users\user\Desktop\__ ___.scr.exe"Jump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: __ ___.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: __ ___.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: __ ___.scr.exe, 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, __ ___.scr.exe, 00000000.00000002.1614064248.0000000004F10000.00000004.08000000.00040000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: __ ___.scr.exe, -t.cs.Net Code: Hitter System.AppDomain.Load(byte[])
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.3965030.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: __ ___.scr.exe PID: 7444, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: __ ___.scr.exe PID: 7472, type: MEMORYSTR
          Source: __ ___.scr.exeStatic PE information: 0xCFE67F87 [Fri Jul 12 06:00:39 2080 UTC]
          Source: C:\Users\user\Desktop\__ ___.scr.exeCode function: 0_2_00B545DF push ebx; retf 0004h0_2_00B545E2
          Source: C:\Users\user\Desktop\__ ___.scr.exeCode function: 0_2_00B54549 push ebx; retf 0004h0_2_00B5454A
          Source: C:\Users\user\Desktop\__ ___.scr.exeCode function: 0_2_00B54661 push esp; retf 0004h0_2_00B54662
          Source: C:\Users\user\Desktop\__ ___.scr.exeCode function: 0_2_00B54891 pushad ; retf 0004h0_2_00B54892
          Source: C:\Users\user\Desktop\__ ___.scr.exeCode function: 0_2_00B50FE8 push 20A0B802h; retf 0_2_00B51037
          Source: __ ___.scr.exeStatic PE information: section name: .text entropy: 7.616817306003862
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: __ ___.scr.exe PID: 7444, type: MEMORYSTR
          Source: C:\Users\user\Desktop\__ ___.scr.exeMemory allocated: B50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeMemory allocated: 27A0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exe TID: 7464Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
          Source: C:\Users\user\Desktop\__ ___.scr.exeMemory written: C:\Users\user\Desktop\__ ___.scr.exe base: 700000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeProcess created: C:\Users\user\Desktop\__ ___.scr.exe "C:\Users\user\Desktop\__ ___.scr.exe"Jump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeQueries volume information: C:\Users\user\Desktop\__ ___.scr.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\__ ___.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: __ ___.scr.exe PID: 7444, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: __ ___.scr.exe PID: 7472, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.3965030.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.__ ___.scr.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.2863b50.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.__ ___.scr.exe.2861328.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          111
          Process Injection
          1
          Masquerading
          OS Credential Dumping31
          Virtualization/Sandbox Evasion
          Remote Services11
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory12
          System Information Discovery
          Remote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
          Process Injection
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
          Obfuscated Files or Information
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
          Software Packing
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Timestomp
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          DLL Side-Loading
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          __ ___.scr.exe40%VirustotalBrowse
          __ ___.scr.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://kbfvzoboss.bid/alien/fre.php100%URL Reputationmalware
          http://kbfvzoboss.bid/alien/fre.php100%URL Reputationmalware
          http://alphastand.win/alien/fre.php100%URL Reputationmalware
          http://alphastand.trade/alien/fre.php100%URL Reputationmalware
          http://alphastand.top/alien/fre.php100%URL Reputationmalware
          http://alphastand.top/alien/fre.php100%URL Reputationmalware
          http://www.ibsensoftware.com/0%URL Reputationsafe
          http://www.ibsensoftware.com/0%URL Reputationsafe
          spencerstuartllc.top/document/five/fre.php100%Avira URL Cloudphishing
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          http://kbfvzoboss.bid/alien/fre.phptrue
          • URL Reputation: malware
          • URL Reputation: malware
          unknown
          http://alphastand.win/alien/fre.phptrue
          • URL Reputation: malware
          unknown
          spencerstuartllc.top/document/five/fre.phptrue
          • Avira URL Cloud: phishing
          low
          http://alphastand.trade/alien/fre.phptrue
          • URL Reputation: malware
          unknown
          http://alphastand.top/alien/fre.phptrue
          • URL Reputation: malware
          • URL Reputation: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.ibsensoftware.com/__ ___.scr.exe, 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, __ ___.scr.exe, 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, __ ___.scr.exe, 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, __ ___.scr.exe, 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1417353
          Start date and time:2024-03-29 03:11:04 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 26s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:__ ___.scr.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@3/1@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 11
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\__ ___.scr.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):706
          Entropy (8bit):5.349842958726647
          Encrypted:false
          SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAq1KDLI4M9XKbbDLI4MWuPJKAVKhat92n4M6:MLUE4K5E4KH1qE4qXKDE4KhKiKhg84j
          MD5:9BA266AD16952A9A57C3693E0BCFED48
          SHA1:5DB70A3A7F1DB4E3879265AB336B2FA1AFBCECD5
          SHA-256:A6DFD14E82D7D47195A1EC7F31E64C2820AB8721EF4B5825E21E742093B55C0E
          SHA-512:678E1F639379FC24919B7CF562FA19CE53363CBD4B0EAB66486F6F8D5DD5958DE3AAE8D7842EE868EFCC39D907FDC1A3ACF464E29D37B0DAEE9874C39730FE8E
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):7.59711658149237
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
          • Win32 Executable (generic) a (10002005/4) 49.93%
          • Windows Screen Saver (13104/52) 0.07%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:__ ___.scr.exe
          File size:431'104 bytes
          MD5:49e8704aa83c8a6445260ca25f68e99a
          SHA1:f2da7dab38056c8225320d10b8b5ab3f4882cc18
          SHA256:d47d5c7948096ffd22bd3d3fb6d714a5a6bd6f4b265dd3408ec149b73167bf08
          SHA512:441a1da896435da70a1e79dbdfb40e235eefd14fd526f5cfb062b98273ecef50425b3113170e92502b1a9986798cb6a8113fcd08ea12e29ee64ca84b6ab0e66d
          SSDEEP:12288:zFFAiIlk45xaDDhUsXT5Eo4eCK6e8vV4d0:sl7O9lXlEQ7H8vV1
          TLSH:A2949C01A7FC178DF5F65BF668B1140A07B376262D36DA5E6CC122CE05AEB818C71B27
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................................@................................
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x46a6ae
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0xCFE67F87 [Fri Jul 12 06:00:39 2080 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x6a65c0x4f.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x62a.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x6e0000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x686b40x6880051b57cec7b7288e911edcfcfd62d77bbFalse0.7807009756279905data7.616817306003862IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0x6c0000x62a0x800b9159c8aa0f5f07e02147def1e22e0cdFalse0.3466796875data3.4797650638778452IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x6e0000xc0x2004e47afa5f200ff0f32be75c22f82975bFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_VERSION0x6c0a00x3a0data0.43426724137931033
          RT_MANIFEST0x6c4400x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
          DLLImport
          mscoree.dll_CorExeMain
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:03:11:49
          Start date:29/03/2024
          Path:C:\Users\user\Desktop\__ ___.scr.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\__ ___.scr.exe"
          Imagebase:0x480000
          File size:431'104 bytes
          MD5 hash:49E8704AA83C8A6445260CA25F68E99A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1613376458.000000000397F000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1613376458.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1613270465.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:03:11:49
          Start date:29/03/2024
          Path:C:\Users\user\Desktop\__ ___.scr.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\__ ___.scr.exe"
          Imagebase:0x2d0000
          File size:431'104 bytes
          MD5 hash:49E8704AA83C8A6445260CA25F68E99A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000002.2874007006.0000000000701000.00000004.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          Reputation:low
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:6.2%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:77.8%
            Total number of Nodes:27
            Total number of Limit Nodes:1
            execution_graph 10776 b5aaf8 10777 b5ab12 10776->10777 10778 b5ab62 10777->10778 10780 b5abb8 10777->10780 10781 b5abeb 10780->10781 10802 b59c5c 10781->10802 10783 b5adc2 10784 b59c68 Wow64GetThreadContext 10783->10784 10785 b5aebc 10783->10785 10784->10785 10786 b59c80 ReadProcessMemory 10785->10786 10787 b5af9c 10786->10787 10795 b5a8e8 VirtualAllocEx 10787->10795 10788 b5b0b9 10789 b5b12c 10788->10789 10799 b5a8e8 VirtualAllocEx 10788->10799 10800 b5a790 WriteProcessMemory 10789->10800 10790 b5b398 10797 b5a790 WriteProcessMemory 10790->10797 10791 b5b19d 10791->10790 10796 b5a790 WriteProcessMemory 10791->10796 10792 b5b3d6 10793 b5b4be 10792->10793 10798 b5a668 Wow64SetThreadContext 10792->10798 10801 b5aa08 ResumeThread 10793->10801 10794 b5b57b 10794->10777 10795->10788 10796->10791 10797->10792 10798->10793 10799->10789 10800->10791 10801->10794 10803 b5b6e8 CreateProcessW 10802->10803 10805 b5b8ce 10803->10805

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 b592e0-b592ed 1 b592f6-b59306 0->1 2 b592ef-b592f1 0->2 4 b5930d-b5931d 1->4 5 b59308 1->5 3 b59595-b5959c 2->3 7 b59323-b59331 4->7 8 b5957c-b5958a 4->8 5->3 11 b59337 7->11 12 b5959d-b59616 7->12 8->12 13 b5958c-b59590 call b58a68 8->13 11->12 14 b59355-b59376 11->14 15 b59414-b59435 11->15 16 b59494-b594d1 11->16 17 b594d6-b594fc 11->17 18 b59570-b5957a 11->18 19 b5933e-b59350 11->19 20 b5937b-b5939d 11->20 21 b5943a-b59462 11->21 22 b59467-b5948f 11->22 23 b59501-b5952d 11->23 24 b593a2-b593c3 11->24 25 b5954c-b5956e 11->25 26 b5952f-b5954a call b503e0 11->26 27 b593ee-b5940f 11->27 28 b593c8-b593e9 11->28 13->3 14->3 15->3 16->3 17->3 18->3 19->3 20->3 21->3 22->3 23->3 24->3 25->3 26->3 27->3 28->3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1612860524.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_b50000___ ___.jbxd
            Similarity
            • API ID:
            • String ID: Xbq$$^q
            • API String ID: 0-1593437937
            • Opcode ID: 53850b2c87dcaa8bc5dd206e5fbc55b379e9b88b0b111d3d4d6f107898e046ba
            • Instruction ID: c2cee26090a83a351534499e3d72b7d406d86073386ab84fe5b5ca7196880223
            • Opcode Fuzzy Hash: 53850b2c87dcaa8bc5dd206e5fbc55b379e9b88b0b111d3d4d6f107898e046ba
            • Instruction Fuzzy Hash: E181A570B00218DBDB19EF79985477E7BB7BFC8701B148499D80BEB298DE34C8169B91
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 111 b5abb8-b5abe9 112 b5abf0-b5ad76 111->112 113 b5abeb 111->113 120 b5ad9d-b5ade2 call b59c5c 112->120 121 b5ad78-b5ad9c 112->121 113->112 125 b5ade4-b5ae00 120->125 126 b5ae0b-b5ae75 120->126 121->120 125->126 132 b5ae77 126->132 133 b5ae7c-b5aea8 126->133 132->133 135 b5af09-b5af3b call b59c74 133->135 136 b5aeaa-b5aeb7 call b59c68 133->136 143 b5af64 135->143 144 b5af3d-b5af59 135->144 140 b5aebc-b5aedc 136->140 141 b5af05-b5af07 140->141 142 b5aede-b5aefa 140->142 145 b5af65-b5af6f 141->145 142->141 143->145 144->143 147 b5af76-b5afbc call b59c80 145->147 148 b5af71 145->148 154 b5afe5-b5affe 147->154 155 b5afbe-b5afda 147->155 148->147 156 b5b056-b5b0ce call b5a8e8 154->156 157 b5b000-b5b02c call b59c8c 154->157 155->154 169 b5b0d0-b5b0e1 156->169 170 b5b0e3-b5b0e5 156->170 162 b5b055 157->162 163 b5b02e-b5b04a 157->163 162->156 163->162 171 b5b0eb-b5b0ff 169->171 170->171 172 b5b101-b5b12a call b5a8e8 171->172 173 b5b13c-b5b153 171->173 176 b5b12c-b5b13b 172->176 174 b5b155-b5b171 173->174 175 b5b17c-b5b1bd call b5a790 173->175 174->175 179 b5b1e6-b5b21b 175->179 180 b5b1bf-b5b1db 175->180 176->173 184 b5b373-b5b392 179->184 180->179 186 b5b220-b5b2a4 184->186 187 b5b398-b5b3f6 call b5a790 184->187 197 b5b368-b5b36d 186->197 198 b5b2aa-b5b31c call b5a790 186->198 192 b5b41f-b5b452 187->192 193 b5b3f8-b5b414 187->193 199 b5b454-b5b45b 192->199 200 b5b45c-b5b46f 192->200 193->192 197->184 209 b5b31e-b5b33e 198->209 199->200 203 b5b476-b5b4a1 200->203 204 b5b471 200->204 207 b5b4a3-b5b4bc call b5a668 203->207 208 b5b50b-b5b53d call b59c98 203->208 204->203 214 b5b4be-b5b4de 207->214 215 b5b566 208->215 216 b5b53f-b5b55b 208->216 212 b5b367 209->212 213 b5b340-b5b35c 209->213 212->197 213->212 217 b5b507-b5b509 214->217 218 b5b4e0-b5b4fc 214->218 219 b5b567-b5b579 call b5aa08 215->219 216->215 217->219 218->217 223 b5b57b-b5b59b 219->223 226 b5b5c4-b5b6cd 223->226 227 b5b59d-b5b5b9 223->227 227->226
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1612860524.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_b50000___ ___.jbxd
            Similarity
            • API ID:
            • String ID: (
            • API String ID: 0-3887548279
            • Opcode ID: 24ac7ba1cb85d8b88ef52d4ae093e24190b6de22c33b3d7f0fd5c7f957419b16
            • Instruction ID: 4cb0834f0cfb353f7236c07b42340779fb874a2011635cf49e4a8cafdcff8f25
            • Opcode Fuzzy Hash: 24ac7ba1cb85d8b88ef52d4ae093e24190b6de22c33b3d7f0fd5c7f957419b16
            • Instruction Fuzzy Hash: 6C52C171D012288FDB68DF65C994BDDBBF2BF89301F1081EA9409AB295DB345E89CF41
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 240 b59c5c-b5b773 242 b5b775-b5b787 240->242 243 b5b78a-b5b798 240->243 242->243 244 b5b7af-b5b7eb 243->244 245 b5b79a-b5b7ac 243->245 246 b5b7ed-b5b7fc 244->246 247 b5b7ff-b5b8cc CreateProcessW 244->247 245->244 246->247 251 b5b8d5-b5b994 247->251 252 b5b8ce-b5b8d4 247->252 262 b5b996-b5b9bf 251->262 263 b5b9ca-b5b9d5 251->263 252->251 262->263
            APIs
            • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B5B8B9
            Memory Dump Source
            • Source File: 00000000.00000002.1612860524.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_b50000___ ___.jbxd
            Similarity
            • API ID: CreateProcess
            • String ID:
            • API String ID: 963392458-0
            • Opcode ID: 32e8b78412b7ae317ca97511b0972a657c4f9f5539f33b5095592a7ed42badb1
            • Instruction ID: 3d90f9e9eb75f1e29a8899e5bc763f9fabad5fb1e65e09b708d9b12563b46f4e
            • Opcode Fuzzy Hash: 32e8b78412b7ae317ca97511b0972a657c4f9f5539f33b5095592a7ed42badb1
            • Instruction Fuzzy Hash: F081C074C00269DFDB20CFA9C940BEDBBF5AB49304F1491EAE548B7260DB749A89CF54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 267 b5a790-b5a7fb 269 b5a812-b5a873 WriteProcessMemory 267->269 270 b5a7fd-b5a80f 267->270 272 b5a875-b5a87b 269->272 273 b5a87c-b5a8ce 269->273 270->269 272->273
            APIs
            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B5A863
            Memory Dump Source
            • Source File: 00000000.00000002.1612860524.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_b50000___ ___.jbxd
            Similarity
            • API ID: MemoryProcessWrite
            • String ID:
            • API String ID: 3559483778-0
            • Opcode ID: e1db8a45c86345d5154ecab71fd9aa831bc8e00adf7e6cc9319961d8c399cb47
            • Instruction ID: 364eb26213bbb45173a58472e5314963ac249054cc66aab1b2c8f78c642475a2
            • Opcode Fuzzy Hash: e1db8a45c86345d5154ecab71fd9aa831bc8e00adf7e6cc9319961d8c399cb47
            • Instruction Fuzzy Hash: C84199B5D012589FCF00CFA9D984ADEFBF1BB49310F20906AE818B7250D775AA45CF64
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 278 b59c80-b5bbd5 ReadProcessMemory 280 b5bbd7-b5bbdd 278->280 281 b5bbde-b5bc1c 278->281 280->281
            APIs
            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B5BBC5
            Memory Dump Source
            • Source File: 00000000.00000002.1612860524.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_b50000___ ___.jbxd
            Similarity
            • API ID: MemoryProcessRead
            • String ID:
            • API String ID: 1726664587-0
            • Opcode ID: 8dc575727385aecdb1fd2df9422c8ef98c22ec2241b44c7089bb222d155dba35
            • Instruction ID: 312454ee102069a29001900db2ddabf71c8d3a89c0787b45ead7e9580bf22600
            • Opcode Fuzzy Hash: 8dc575727385aecdb1fd2df9422c8ef98c22ec2241b44c7089bb222d155dba35
            • Instruction Fuzzy Hash: 1F4158B9D04258DFCF10CFAAD984ADEFBB5BB19310F14906AE814B7210D375A945CF64
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 284 b5a8e8-b5a9a2 VirtualAllocEx 287 b5a9a4-b5a9aa 284->287 288 b5a9ab-b5a9f5 284->288 287->288
            APIs
            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00B5A992
            Memory Dump Source
            • Source File: 00000000.00000002.1612860524.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_b50000___ ___.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: a9e438f8268e5f56ef33ad2562ea02d5f7383baddb9e41f8baaa10efb61768fd
            • Instruction ID: aea73e11abb83eb1f118d230be1982432c5213a9b036f96e1cf860baad08782c
            • Opcode Fuzzy Hash: a9e438f8268e5f56ef33ad2562ea02d5f7383baddb9e41f8baaa10efb61768fd
            • Instruction Fuzzy Hash: E331A6B9D00258DFCF10CFA9D980ADEFBB1BB49310F20A42AE814B7210D735A945CF69
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 293 b5a668-b5a6c8 295 b5a6df-b5a727 Wow64SetThreadContext 293->295 296 b5a6ca-b5a6dc 293->296 298 b5a730-b5a77c 295->298 299 b5a729-b5a72f 295->299 296->295 299->298
            APIs
            • Wow64SetThreadContext.KERNEL32(?,?), ref: 00B5A717
            Memory Dump Source
            • Source File: 00000000.00000002.1612860524.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_b50000___ ___.jbxd
            Similarity
            • API ID: ContextThreadWow64
            • String ID:
            • API String ID: 983334009-0
            • Opcode ID: c5adad2fd2a218ecbaa15f5d0f06db24e1a4610e729b16b1d7610e7d8938726c
            • Instruction ID: 5088a8b8a3ea3ccb6749d3556903dda5db54adfdda7e50c4ca88089ba578c84d
            • Opcode Fuzzy Hash: c5adad2fd2a218ecbaa15f5d0f06db24e1a4610e729b16b1d7610e7d8938726c
            • Instruction Fuzzy Hash: DC31CBB4D002589FCB10DFAAD984AEEFFF0BB49314F24806AE414B7210C738A989CF54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 304 b59c68-b5ba64 306 b5ba66-b5ba78 304->306 307 b5ba7b-b5bac2 Wow64GetThreadContext 304->307 306->307 308 b5bac4-b5baca 307->308 309 b5bacb-b5bb03 307->309 308->309
            APIs
            • Wow64GetThreadContext.KERNEL32(?,?), ref: 00B5BAB2
            Memory Dump Source
            • Source File: 00000000.00000002.1612860524.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_b50000___ ___.jbxd
            Similarity
            • API ID: ContextThreadWow64
            • String ID:
            • API String ID: 983334009-0
            • Opcode ID: 7829058b34222fa2937b5f2d9e120cffa7d7d0ad628dff28bdef3235b69e69e5
            • Instruction ID: 9f906329112a402ddf009418f076d7467a9bf42b7a6a7935bf5e1fe52d6a953d
            • Opcode Fuzzy Hash: 7829058b34222fa2937b5f2d9e120cffa7d7d0ad628dff28bdef3235b69e69e5
            • Instruction Fuzzy Hash: 0E31ABB5D01258DFCB10CFAAD584ADEFBF1BB09314F24806AE814B7210D779A949CF54
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 312 b5aa08-b5aa96 ResumeThread 315 b5aa9f-b5aae1 312->315 316 b5aa98-b5aa9e 312->316 316->315
            APIs
            • ResumeThread.KERNELBASE(?), ref: 00B5AA86
            Memory Dump Source
            • Source File: 00000000.00000002.1612860524.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_b50000___ ___.jbxd
            Similarity
            • API ID: ResumeThread
            • String ID:
            • API String ID: 947044025-0
            • Opcode ID: 589cc354ab347c41a88f67f91addd57c2e120348c6a2b1a57d86d7400e135ec8
            • Instruction ID: 8a7f3970da4a483c9b44864e4dd58b05b4bf35f0ce7414c4ce56d607672ae915
            • Opcode Fuzzy Hash: 589cc354ab347c41a88f67f91addd57c2e120348c6a2b1a57d86d7400e135ec8
            • Instruction Fuzzy Hash: D831CAB4D012189FCB14CFAAD984ADEFBF4BB49310F10946AE818B7310C735A845CF98
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 380 aad5b8-aad5ca 381 aad65e-aad665 380->381 382 aad5d0 380->382 383 aad5d2-aad5de 381->383 382->383 385 aad66a-aad66f 383->385 386 aad5e4-aad606 383->386 385->386 387 aad608-aad626 386->387 388 aad674-aad689 386->388 391 aad62e-aad63e 387->391 392 aad640-aad648 388->392 391->392 393 aad696 391->393 394 aad64a-aad65b 392->394 395 aad68b-aad694 392->395 395->394
            Memory Dump Source
            • Source File: 00000000.00000002.1612724927.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_aad000___ ___.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5cc091d823a0b173f8624bc8aa723db7d4759cf20755f9f886acb3b7c82c1938
            • Instruction ID: 3a787750aa8c64362b81f98dbefebe60775117482fdc836d41f11ea8e2b52b09
            • Opcode Fuzzy Hash: 5cc091d823a0b173f8624bc8aa723db7d4759cf20755f9f886acb3b7c82c1938
            • Instruction Fuzzy Hash: 052134B1504200EFCB05DF14DAC4B2ABFA5FB99318F24C56DE84A0B696C336D856CBA1
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.1612724927.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_aad000___ ___.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
            • Instruction ID: 2066af595c62a0673f58cbfbb2eca9fb40586b154781ec458f324c175584405a
            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
            • Instruction Fuzzy Hash: 0311D376504240CFCF16CF14D5C4B16BF72FB95314F24C6A9D84A0B656C33AD85ACBA1
            Uniqueness

            Uniqueness Score: -1.00%