Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Analysis ID:1417470
MD5:04c989d29336fb35d0acf623b8bcf64c
SHA1:67c95f5de71452deb7843c9ac2880340c50e4a28
SHA256:ad132be05b5588ba7a292e3ae2faab0401f5380bbd4796483d45df99dc1500e9
Tags:exe
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Installs Task Scheduler Managed Wrapper
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • RuntimeBroker.exe (PID: 4200 cmdline: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe MD5: 04C989D29336FB35D0ACF623B8BCF64C)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, ProcessId: 6784, TargetFilename: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe" , CommandLine: "C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe, NewProcessName: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, ParentProcessId: 6784, ParentProcessName: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe" , ProcessId: 4508, ProcessName: RuntimeBroker.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeReversingLabs: Detection: 47%
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeVirustotal: Detection: 59%Perma Link
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeVirustotal: Detection: 59%Perma Link
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.dr
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.dr
Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net452\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Microsoft.Win32.TaskScheduler.dll.0.dr
Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net452\Microsoft.Win32.TaskScheduler.pdbSHA256 source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Microsoft.Win32.TaskScheduler.dll.0.dr
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32Jump to behavior
Source: global trafficTCP traffic: 192.168.2.6:49710 -> 77.38.200.133:6969
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: xn--80aa3a1a9c.online
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCSRSA4096RootG5.crt0E
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA2.crt0
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertCSRSA4096RootG5.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0F
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0=
Source: Newtonsoft.Json.dll.0.drString found in binary or memory: http://james.newtonking.com/projects/json
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: RuntimeBroker.exe, 00000002.00000002.3327883889.000001CB299A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: https://github.com/JamesNK/Newtonsoft.Json
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Microsoft.Win32.TaskScheduler.dll.0.drString found in binary or memory: https://github.com/dahall/taskscheduler
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: https://www.newtonsoft.com/json
Source: Newtonsoft.Json.dll.0.drString found in binary or memory: https://www.newtonsoft.com/jsonschema
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, Keyboard.cs.Net Code: SetHook
Source: RuntimeBroker.exe.0.dr, Keyboard.cs.Net Code: SetHook
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348AE3692_2_00007FFD348AE369
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348AC4B82_2_00007FFD348AC4B8
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348AC4A82_2_00007FFD348AC4A8
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348AC4A02_2_00007FFD348AC4A0
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348AC5782_2_00007FFD348AC578
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348A19682_2_00007FFD348A1968
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348A0F502_2_00007FFD348A0F50
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348AC6602_2_00007FFD348AC660
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348AC6D32_2_00007FFD348AC6D3
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348AC43F2_2_00007FFD348AC43F
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 3_2_00007FFD348C23993_2_00007FFD348C2399
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 3_2_00007FFD348C15183_2_00007FFD348C1518
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 3_2_00007FFD348C14303_2_00007FFD348C1430
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dll 74FE1A6A1E36BE7D893E31BBB4D4BD83BF4B927E715276CD5607982139818EBD
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Local\.microsoft\Newtonsoft.Json.dll E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
Source: RuntimeBroker.exe.0.drStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, 00000000.00000002.2081931674.0000020C38B59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, 00000000.00000002.2081931674.0000020C38B59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, 00000000.00000000.2074244768.0000020C26DA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, 00000000.00000000.2074244768.0000020C26DA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, 00000000.00000002.2082156882.0000020C41424000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSailor.exe> vs SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, 00000000.00000000.2074337572.0000020C26EAA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSailor.exe> vs SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeBinary or memory string: OriginalFilenameSailor.exe> vs SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeSection loaded: fwpuclnt.dllJump to behavior
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, TaskSchedulerSnapshot.csTask registration methods: 'InternalCreate', 'Create'
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, SystemInfo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, Tools.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
Source: RuntimeBroker.exe.0.dr, SystemInfo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: RuntimeBroker.exe.0.dr, Tools.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
Source: classification engineClassification label: mal88.spyw.evad.winEXE@4/5@2/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeFile created: C:\Users\user\AppData\Roaming\LocalJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeMutant created: NULL
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 47.53%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeVirustotal: Detection: 59%
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeString found in binary or memory: 9Task Scheduler 2.0 (1.2) does not support setting this property. You must use an InteractiveToken in order to have the task run in the current user session.#RunOnlyIfLoggedOn3RunOnlyIfNetworkAvailable-StopIfGoingOnBatteries
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess created: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe "C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe"
Source: unknownProcess created: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess created: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe "C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic file information: File size 1075712 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x106200
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.dr
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.dr
Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net452\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Microsoft.Win32.TaskScheduler.dll.0.dr
Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net452\Microsoft.Win32.TaskScheduler.pdbSHA256 source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Microsoft.Win32.TaskScheduler.dll.0.dr

Data Obfuscation

barindex
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38b59ac0.1.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38bab2f8.0.raw.unpack, DynamicUtils.cs.Net Code: CreateSharpArgumentInfoArray
Source: 0.2.SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe.20c38bab2f8.0.raw.unpack, LateBoundReflectionDelegateFactory.cs.Net Code: CreateDefaultConstructor
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeStatic PE information: 0xBF843D4D [Mon Oct 26 19:51:41 2071 UTC]
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348A7870 pushad ; retf 2_2_00007FFD348A789D
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348A789E push eax; retf 2_2_00007FFD348A78AD
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeCode function: 2_2_00007FFD348A030E push E95D947Dh; ret 2_2_00007FFD348A0329
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeFile created: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeFile created: C:\Users\user\AppData\Roaming\Local\.microsoft\Newtonsoft.Json.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeFile created: C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dllJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeFile created: C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeMemory allocated: 20C271E0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeMemory allocated: 20C40B50000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeMemory allocated: 1CB27F00000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeMemory allocated: 1CB419A0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeMemory allocated: 224AB630000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeMemory allocated: 224C3630000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Local\.microsoft\Newtonsoft.Json.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe TID: 3856Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: RuntimeBroker.exe, 00000003.00000002.3327179086.00000224A9AC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\Lo
Source: SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, 00000000.00000002.2081479409.0000020C27101000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
Source: RuntimeBroker.exe, 00000002.00000002.3328327285.000001CB41F21000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeProcess created: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe "C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeQueries volume information: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeQueries volume information: C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dll VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeQueries volume information: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
111
Scheduled Task/Job
11
Process Injection
1
Masquerading
21
Input Capture
11
Security Software Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts111
Scheduled Task/Job
1
DLL Side-Loading
111
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Timestomp
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe47%ReversingLabsByteCode-MSIL.Trojan.Agentagen
SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe60%VirustotalBrowse
SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dll0%VirustotalBrowse
C:\Users\user\AppData\Roaming\Local\.microsoft\Newtonsoft.Json.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Local\.microsoft\Newtonsoft.Json.dll0%VirustotalBrowse
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe47%ReversingLabsByteCode-MSIL.Trojan.Agentagen
C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe60%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://james.newtonking.com/projects/json0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
xn--80aa3a1a9c.online
77.38.200.133
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://www.newtonsoft.com/jsonSecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drfalse
      high
      https://www.nuget.org/packages/Newtonsoft.Json.BsonSecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drfalse
        high
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRuntimeBroker.exe, 00000002.00000002.3327883889.000001CB299A1000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://james.newtonking.com/projects/jsonNewtonsoft.Json.dll.0.drfalse
          • URL Reputation: safe
          unknown
          https://www.newtonsoft.com/jsonschemaNewtonsoft.Json.dll.0.drfalse
            high
            https://github.com/JamesNK/Newtonsoft.JsonSecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Newtonsoft.Json.dll.0.drfalse
              high
              https://github.com/dahall/taskschedulerSecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, RuntimeBroker.exe.0.dr, Microsoft.Win32.TaskScheduler.dll.0.drfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                77.38.200.133
                xn--80aa3a1a9c.onlineLatvia
                20910BALTKOM-ASLVfalse
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1417470
                Start date and time:2024-03-29 11:37:15 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 48s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
                Detection:MAL
                Classification:mal88.spyw.evad.winEXE@4/5@2/1
                EGA Information:
                • Successful, ratio: 66.7%
                HCA Information:
                • Successful, ratio: 97%
                • Number of executed functions: 12
                • Number of non-executed functions: 9
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe, PID 6784 because it is empty
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                11:38:05Task SchedulerRun new task: MicrosoftEdgeUpdateTaskMachine path: C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                BALTKOM-ASLVydlkilluNn.elfGet hashmaliciousGafgyt, MiraiBrowse
                • 213.180.97.134
                AFWaD3vnqR.elfGet hashmaliciousMirai, GafgytBrowse
                • 213.180.97.154
                dOFtshU17q.elfGet hashmaliciousMiraiBrowse
                • 94.30.193.58
                wgOzQ8Oyzg.elfGet hashmaliciousMiraiBrowse
                • 213.180.97.139
                ktMLmEUY2l.elfGet hashmaliciousMiraiBrowse
                • 93.177.221.20
                LUNFk2Hgfu.elfGet hashmaliciousMirai, OkiruBrowse
                • 213.180.97.148
                rGZOpOzYrg.elfGet hashmaliciousMirai, MoobotBrowse
                • 93.177.221.61
                01vS5TqGur.elfGet hashmaliciousMiraiBrowse
                • 94.30.214.5
                jew.x86.elfGet hashmaliciousMiraiBrowse
                • 93.177.221.21
                WDw9LnYz2p.elfGet hashmaliciousUnknownBrowse
                • 89.201.106.220
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Roaming\Local\.microsoft\Newtonsoft.Json.dllpdfviewer.msiGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.CIL.HeapOverride.Heur.10407.9903.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.CIL.HeapOverride.Heur.10407.9903.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Trojan.Siggen21.10427.19540.12669.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Trojan.Siggen21.10427.19540.12669.exeGet hashmaliciousUnknownBrowse
                          MSIx64.msiGet hashmaliciousUnknownBrowse
                            MSIx64.msiGet hashmaliciousUnknownBrowse
                              INVOICE31401001340.exeGet hashmaliciousUnknownBrowse
                                INVOICE31401001340.exeGet hashmaliciousUnknownBrowse
                                  24ef9864.msiGet hashmaliciousUnknownBrowse
                                    C:\Users\user\AppData\Roaming\Local\.microsoft\Microsoft.Win32.TaskScheduler.dllClear-EasyPrint.b7002.ntclear.top.SK008.ch.exeGet hashmaliciousUnknownBrowse
                                      Clear-EasyPrint.b7002.ntclear.top.SK008.ch.exeGet hashmaliciousUnknownBrowse
                                        OrangeBot Installer - UAT (1.18.5.23313).msiGet hashmaliciousUnknownBrowse
                                          https://geteasypdf.com/Get hashmaliciousUnknownBrowse
                                            InstallSetup2.exeGet hashmaliciousPetite VirusBrowse
                                              CV.AppLauncherSetup6.2.7.msiGet hashmaliciousUnknownBrowse
                                                MDE_File_Sample_4e8af2004a77f531e655e2e5cb669c388d0655c9.zipGet hashmaliciousUnknownBrowse
                                                  https://fastprintapp.com/lp1?channel=hud-gdn&tracking_id=142&oid=142&affid=1025&source_id=google&sub1=142imall&gclid=EAIaIQobChMI5Lzv2NSvgwMVXaOmBB3WUQkTEAEYASAAEgI9zPD_BwEGet hashmaliciousUnknownBrowse
                                                    https://onelaunch.com/downloadGet hashmaliciousUnknownBrowse
                                                      Comprovante_Pix_023103.vbsGet hashmaliciousNetcatBrowse
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
                                                        File Type:CSV text
                                                        Category:modified
                                                        Size (bytes):425
                                                        Entropy (8bit):5.357964438493834
                                                        Encrypted:false
                                                        SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khav:ML9E4KQwKDE4KGKZI6Khk
                                                        MD5:D8F8A79B5C09FCB6F44E8CFFF11BF7CA
                                                        SHA1:669AFE705130C81BFEFECD7CC216E6E10E72CB81
                                                        SHA-256:91B010B5C9F022F3449F161425F757B276021F63B024E8D8ED05476509A6D406
                                                        SHA-512:C95CB5FC32843F555EFA7CCA5758B115ACFA365A6EEB3333633A61CA50A90FEFAB9B554C3776FFFEA860FEF4BF47A6103AFECF3654C780287158E2DBB8137767
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):333824
                                                        Entropy (8bit):6.105576145657233
                                                        Encrypted:false
                                                        SSDEEP:3072:o1sSJApTSnQU/x0ImhuDzHfs4zbYOjujDRfygDgKQINXLLHIaKlay8weCycJ5Dfm:o1sSmRIt/xhtsOju1DH5NXnIKAc
                                                        MD5:A844AC745A4005FBD3F51D79FF88583C
                                                        SHA1:92671774FD4BE9781A77D2788A8DDDBF8981EAD5
                                                        SHA-256:74FE1A6A1E36BE7D893E31BBB4D4BD83BF4B927E715276CD5607982139818EBD
                                                        SHA-512:5F0734058D9146FFEB552ABF443DF5097CF134A4737BED499467830E08D97F5D1996C1F1647C5C12289CA4D4209EFFD480010AFEBC59D50290D4CA7D45BB41F8
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Joe Sandbox View:
                                                        • Filename: Clear-EasyPrint.b7002.ntclear.top.SK008.ch.exe, Detection: malicious, Browse
                                                        • Filename: Clear-EasyPrint.b7002.ntclear.top.SK008.ch.exe, Detection: malicious, Browse
                                                        • Filename: OrangeBot Installer - UAT (1.18.5.23313).msi, Detection: malicious, Browse
                                                        • Filename: , Detection: malicious, Browse
                                                        • Filename: InstallSetup2.exe, Detection: malicious, Browse
                                                        • Filename: CV.AppLauncherSetup6.2.7.msi, Detection: malicious, Browse
                                                        • Filename: MDE_File_Sample_4e8af2004a77f531e655e2e5cb669c388d0655c9.zip, Detection: malicious, Browse
                                                        • Filename: , Detection: malicious, Browse
                                                        • Filename: , Detection: malicious, Browse
                                                        • Filename: Comprovante_Pix_023103.vbs, Detection: malicious, Browse
                                                        Reputation:moderate, very likely benign file
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._O............" ..0..............-... ...@....... ..............................I.....`.................................0-..O....@.......................`......(,..T............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................d-......H............V..........`...H....+........................................{....*..{....*V.(......}......}....*...0..A........u2.......4.,/(.....{.....{....o....,.(.....{.....{....o....*.*.*. ..<. )UU.Z(.....{....o....X )UU.Z(.....{....o....X*...0..b........r...p......%..{.......%q5....5...-.&.+...5...o.....%..{.......%q6....6...-.&.+...6...o.....(....*..{....*..{....*..{....*r.(......}......}......}....*..0..Y........u7.......L.,G(.....{.....{....o....,/(.....{.....{....o....
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):711952
                                                        Entropy (8bit):5.967185619483575
                                                        Encrypted:false
                                                        SSDEEP:12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
                                                        MD5:195FFB7167DB3219B217C4FD439EEDD6
                                                        SHA1:1E76E6099570EDE620B76ED47CF8D03A936D49F8
                                                        SHA-256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
                                                        SHA-512:56EB7F070929B239642DAB729537DDE2C2287BDB852AD9E80B5358C74B14BC2B2DDED910D0E3B6304EA27EB587E5F19DB0A92E1CBAE6A70FB20B4EF05057E4AC
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Joe Sandbox View:
                                                        • Filename: pdfviewer.msi, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.CIL.HeapOverride.Heur.10407.9903.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.CIL.HeapOverride.Heur.10407.9903.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Trojan.Siggen21.10427.19540.12669.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Trojan.Siggen21.10427.19540.12669.exe, Detection: malicious, Browse
                                                        • Filename: MSIx64.msi, Detection: malicious, Browse
                                                        • Filename: MSIx64.msi, Detection: malicious, Browse
                                                        • Filename: INVOICE31401001340.exe, Detection: malicious, Browse
                                                        • Filename: INVOICE31401001340.exe, Detection: malicious, Browse
                                                        • Filename: 24ef9864.msi, Detection: malicious, Browse
                                                        Reputation:moderate, very likely benign file
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p$?..........." ..0.............B.... ........... ....................... ............`....................................O......................../.......... ...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................$.......H.......x...(9............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X..+....b....aX....X.....2.....cY.....cY....cY..|....(......._..{........+,..{|....3...{{......(....,...{{...*..{}.......-..*...0...........-.r...ps....z.o......-.~....*.~....
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
                                                        File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1075712
                                                        Entropy (8bit):6.020202241266955
                                                        Encrypted:false
                                                        SSDEEP:24576:czCJ3x7Bjk38WuBcAbwoA/BkjSHXP36RMG:0CJ3JCSA/Bkj0
                                                        MD5:04C989D29336FB35D0ACF623B8BCF64C
                                                        SHA1:67C95F5DE71452DEB7843C9AC2880340C50E4A28
                                                        SHA-256:AD132BE05B5588BA7A292E3AE2FAAB0401F5380BBD4796483D45DF99DC1500E9
                                                        SHA-512:74127D593AF83F76EE9242BC7B277BB87EC94218A2AD53CB78084CDFBC8B6953680589BD7C73FAC97C6990A659097CAC997DB068C0A758FEC893092EABDA8152
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 47%
                                                        • Antivirus: Virustotal, Detection: 60%, Browse
                                                        Reputation:low
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...M=............"...0..b............... .....@..... ....................................`...@......@............... .............................................................................................................................. ..H............text....a... ...b.................. ..`.rsrc................d..............@..@........................................H........A...I..............H.............................................{....*"..}....*..{....*"..}....*..{....*"..}....*..0..\........(.....(.....o......,..(7......i(.....~....,..(.........io.........io....r...p..i.H...(....*F(.....(....o....*..( ...*:.(......(....*..{....*"..}....*..{....*"..}....*..{ ...*"..} ...*..{!...*"..}!...*>.(.......(....*....0..C........r...p(...+..r...p(...+..,.r1..p(D....-..(C...r3..p 9.......s....&*..( ...*..0..\........s"...}#....( ......}-......})..
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):26
                                                        Entropy (8bit):3.95006375643621
                                                        Encrypted:false
                                                        SSDEEP:3:ggPYV:rPYV
                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:[ZoneTransfer]....ZoneId=0
                                                        File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):6.020202241266955
                                                        TrID:
                                                        • Win64 Executable GUI Net Framework (217006/5) 47.53%
                                                        • Win64 Executable GUI (202006/5) 44.25%
                                                        • Win64 Executable (generic) Net Framework (21505/4) 4.71%
                                                        • Win64 Executable (generic) (12005/4) 2.63%
                                                        • Generic Win/DOS Executable (2004/3) 0.44%
                                                        File name:SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
                                                        File size:1'075'712 bytes
                                                        MD5:04c989d29336fb35d0acf623b8bcf64c
                                                        SHA1:67c95f5de71452deb7843c9ac2880340c50e4a28
                                                        SHA256:ad132be05b5588ba7a292e3ae2faab0401f5380bbd4796483d45df99dc1500e9
                                                        SHA512:74127d593af83f76ee9242bc7b277bb87ec94218a2ad53cb78084cdfbc8b6953680589bd7c73fac97c6990a659097cac997db068c0a758fec893092eabda8152
                                                        SSDEEP:24576:czCJ3x7Bjk38WuBcAbwoA/BkjSHXP36RMG:0CJ3JCSA/Bkj0
                                                        TLSH:F4354A4163FC8B2BD5AF6B35F4700A1547F9F807A6BAE78F5A44D8AA1C537808E50363
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...M=............"...0..b............... .....@..... ....................................`...@......@............... .....
                                                        Icon Hash:00928e8e8686b000
                                                        Entrypoint:0x140000000
                                                        Entrypoint Section:
                                                        Digitally signed:false
                                                        Imagebase:0x140000000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0xBF843D4D [Mon Oct 26 19:51:41 2071 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:
                                                        Instruction
                                                        dec ebp
                                                        pop edx
                                                        nop
                                                        add byte ptr [ebx], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax+eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x10a0000x408.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x1081cc0x1c.text
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000x1061e80x1062007febc7f073c935dc0b91b195fefcc37dFalse0.39404972132808774data6.025061209798328IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x10a0000x4080x6002f41b1db888c78e12e457694247e160dFalse0.2799479166666667data2.4167892084815583IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_VERSION0x10a0580x3acdata0.41914893617021276
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Mar 29, 2024 11:38:05.724276066 CET497106969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:06.292213917 CET497116969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:06.729870081 CET497106969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:07.276765108 CET497116969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:08.729870081 CET497106969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:09.292361021 CET497116969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:12.729866028 CET497106969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:13.292355061 CET497116969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:20.729863882 CET497106969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:21.292484045 CET497116969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:26.735270023 CET497196969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:27.295816898 CET497206969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:27.744210005 CET497196969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:28.292397022 CET497206969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:29.745518923 CET497196969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:30.292490959 CET497206969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:33.761178017 CET497196969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:34.292414904 CET497206969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:41.761136055 CET497196969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:42.292367935 CET497206969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:47.762957096 CET497226969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:48.294059038 CET497236969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:48.776799917 CET497226969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:49.292378902 CET497236969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:50.776737928 CET497226969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:51.292491913 CET497236969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:54.776746988 CET497226969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:38:55.292357922 CET497236969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:02.776774883 CET497226969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:03.292392015 CET497236969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:08.924551964 CET497276969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:09.294114113 CET497286969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:09.933017969 CET497276969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:10.292484999 CET497286969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:11.932998896 CET497276969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:12.292365074 CET497286969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:15.948626041 CET497276969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:16.292499065 CET497286969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:23.966094017 CET497276969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:24.292375088 CET497286969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:29.981678963 CET497316969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:30.294107914 CET497326969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:30.979927063 CET497316969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:31.292368889 CET497326969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:32.979877949 CET497316969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:33.292418003 CET497326969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:36.995517969 CET497316969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:37.298099995 CET497326969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:45.011132956 CET497316969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:45.292388916 CET497326969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:51.028522015 CET497336969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:51.293904066 CET497346969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:52.026758909 CET497336969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:52.292427063 CET497346969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:54.026777983 CET497336969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:54.292398930 CET497346969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:58.042381048 CET497336969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:39:58.292407990 CET497346969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:40:06.042386055 CET497336969192.168.2.677.38.200.133
                                                        Mar 29, 2024 11:40:06.292438030 CET497346969192.168.2.677.38.200.133
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Mar 29, 2024 11:38:05.438035965 CET5590753192.168.2.61.1.1.1
                                                        Mar 29, 2024 11:38:05.713505983 CET53559071.1.1.1192.168.2.6
                                                        Mar 29, 2024 11:39:08.779867887 CET6047153192.168.2.61.1.1.1
                                                        Mar 29, 2024 11:39:08.923782110 CET53604711.1.1.1192.168.2.6
                                                        TimestampSource IPDest IPChecksumCodeType
                                                        Mar 29, 2024 11:38:08.626734018 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:08.626754999 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:08.626765966 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:08.626777887 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:11.952656984 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:11.952678919 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:15.368809938 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:21.658783913 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:21.658802986 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:27.846877098 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:27.846894979 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:30.968101025 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:30.968120098 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:30.968132973 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:35.681051970 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:42.276127100 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:38:49.295073032 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:03.385411024 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:12.937393904 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:17.853511095 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:25.499408007 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:25.499428034 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:32.873506069 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:32.873528004 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:36.201483011 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:46.579648018 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:46.579672098 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:53.653722048 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:39:57.253273964 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        Mar 29, 2024 11:40:01.007731915 CET77.38.200.133192.168.2.6d57f(Host unreachable)Destination Unreachable
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Mar 29, 2024 11:38:05.438035965 CET192.168.2.61.1.1.10x810cStandard query (0)xn--80aa3a1a9c.onlineA (IP address)IN (0x0001)false
                                                        Mar 29, 2024 11:39:08.779867887 CET192.168.2.61.1.1.10x56ddStandard query (0)xn--80aa3a1a9c.onlineA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Mar 29, 2024 11:38:05.713505983 CET1.1.1.1192.168.2.60x810cNo error (0)xn--80aa3a1a9c.online77.38.200.133A (IP address)IN (0x0001)false
                                                        Mar 29, 2024 11:39:08.923782110 CET1.1.1.1192.168.2.60x56ddNo error (0)xn--80aa3a1a9c.online77.38.200.133A (IP address)IN (0x0001)false

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:11:38:03
                                                        Start date:29/03/2024
                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.26783.2877.exe"
                                                        Imagebase:0x20c26da0000
                                                        File size:1'075'712 bytes
                                                        MD5 hash:04C989D29336FB35D0ACF623B8BCF64C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:11:38:03
                                                        Start date:29/03/2024
                                                        Path:C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe"
                                                        Imagebase:0x1cb279f0000
                                                        File size:1'075'712 bytes
                                                        MD5 hash:04C989D29336FB35D0ACF623B8BCF64C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 47%, ReversingLabs
                                                        • Detection: 60%, Virustotal, Browse
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:3
                                                        Start time:11:38:05
                                                        Start date:29/03/2024
                                                        Path:C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Users\user\AppData\Roaming\Local\.microsoft\RuntimeBroker.exe
                                                        Imagebase:0x224a9780000
                                                        File size:1'075'712 bytes
                                                        MD5 hash:04C989D29336FB35D0ACF623B8BCF64C
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:false

                                                        Reset < >
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2082621900.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd34890000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 8tx4$?O_^$psx4
                                                          • API String ID: 0-3800927976
                                                          • Opcode ID: effdcc239cd139d4e925902ce16df204a0b4ee6414cbfe8d6717fc567e6f32c6
                                                          • Instruction ID: a16a6611de851b4259e330fbd9b0d636247f076bcc649baecd8ebed9aebe5113
                                                          • Opcode Fuzzy Hash: effdcc239cd139d4e925902ce16df204a0b4ee6414cbfe8d6717fc567e6f32c6
                                                          • Instruction Fuzzy Hash: C951B457B0FAD21BE35257AD28B10E92F64AF4332470C40BBD1DCCB1E7E85DA9099356
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2082621900.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd34890000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (tx4$8tx4
                                                          • API String ID: 0-589491909
                                                          • Opcode ID: ec2663055582f7e78faebadd52db95c7c15c89fe259142ecf5512bbb8f2f7dce
                                                          • Instruction ID: e287cbc493c7be8181546b75558fd1627b37a106cec031086138b6ec96ce875c
                                                          • Opcode Fuzzy Hash: ec2663055582f7e78faebadd52db95c7c15c89fe259142ecf5512bbb8f2f7dce
                                                          • Instruction Fuzzy Hash: B631B552B0DFC64FE3569B6C58B51A57FE0EF9335130900BBC188DB1A3D91DAC0A9361
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2082621900.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd34890000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Pwx4
                                                          • API String ID: 0-2108008736
                                                          • Opcode ID: 7c0d1ee8f364ad5102ca1f95be054006e806614d3fb1474fcd92b5d6e7d77c25
                                                          • Instruction ID: 233b3eea6d04eed3d21174f7d70b54f4d42bbd58ebb8c216fd8b7cfe7786d0ca
                                                          • Opcode Fuzzy Hash: 7c0d1ee8f364ad5102ca1f95be054006e806614d3fb1474fcd92b5d6e7d77c25
                                                          • Instruction Fuzzy Hash: 3AF0F622B09C0D4FEBE5EB5C94A56943BD1EFEA39134901E3E40CCB36AD918DD828790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2082621900.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd34890000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cc6a5eb1e9f4688b56c306700c3b1a48f67abd7bc29073968267fa188dacecf1
                                                          • Instruction ID: b3c204263f5f4c6fc6a55ddc9f108c0f91ba470b46e8c1926da0d6c71b21c0df
                                                          • Opcode Fuzzy Hash: cc6a5eb1e9f4688b56c306700c3b1a48f67abd7bc29073968267fa188dacecf1
                                                          • Instruction Fuzzy Hash: 66210AA2B0DBC90FE7968B2C58B10617FE1EFDB35074501AFD089C7297C91C5C069362
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2082621900.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd34890000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0946c0ceb3edfa7eacb6923cf261866a79854d3c4de3f11142bceecae9a63a6b
                                                          • Instruction ID: 7037ee886a2dbc2d61d08d3d0a893dcfc184914322c44538e7a2459296676333
                                                          • Opcode Fuzzy Hash: 0946c0ceb3edfa7eacb6923cf261866a79854d3c4de3f11142bceecae9a63a6b
                                                          • Instruction Fuzzy Hash: B5812131B1890E4FEB95EBA8C4A5AFD7BE1FF9B300F4401B5D10DE7296DE28A8419750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2082621900.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd34890000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 28af1e89be12012ac4bf52d7dffcebe99bf9407f4ad9431e510debd8a12e18e2
                                                          • Instruction ID: 9d6ba94d385e0b32a2476b52a20814c140fd8d8e57f573c70e8c83daac01f7d8
                                                          • Opcode Fuzzy Hash: 28af1e89be12012ac4bf52d7dffcebe99bf9407f4ad9431e510debd8a12e18e2
                                                          • Instruction Fuzzy Hash: 2F21D611B0CD460FEB96A7A800722A96BC29F9B351B5901B1D50CC77CBDD6C9C464361
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2082621900.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd34890000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70093c199c4630bc5476d922f3ca1237968401425f5877d95c08e740a88464a2
                                                          • Instruction ID: 2890e1787745b654b101a46caf30bdb99e350393d4d75577a339f8898b04c5b0
                                                          • Opcode Fuzzy Hash: 70093c199c4630bc5476d922f3ca1237968401425f5877d95c08e740a88464a2
                                                          • Instruction Fuzzy Hash: C1F0C271A0EA894FDB45DB2C88A5D953FE0EF6734074A41E5D048CF5A3C92CEC428710
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2082621900.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd34890000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6d1e5c80cbf676927ac5ec1bd245613e23f85c69d20c0da7d4391543d632bfc1
                                                          • Instruction ID: 495d6b8b6cab5eb2d74287a187633762a6fc22648f4a2739132740a6c477b42d
                                                          • Opcode Fuzzy Hash: 6d1e5c80cbf676927ac5ec1bd245613e23f85c69d20c0da7d4391543d632bfc1
                                                          • Instruction Fuzzy Hash: BAF06561B09D094FEB84EB2C84A99517BE1EB6B34179501A1E409CB266D868EC865720
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2082621900.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ffd34890000_SecuriteInfo.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: df2f0d1035289a668f89f431f8a12fb0290b0b86d143436f70f794e8544ca8fc
                                                          • Instruction ID: 73b39f957b6f6211483c87934e47b46910afde8f2cb72282b9d9853ce7b84dcd
                                                          • Opcode Fuzzy Hash: df2f0d1035289a668f89f431f8a12fb0290b0b86d143436f70f794e8544ca8fc
                                                          • Instruction Fuzzy Hash: F1E01271708D4D8FDB84EF1C84A59557BE1EB6B3413960091D409CB376D928DD868B20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Execution Graph

                                                          Execution Coverage:13%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:3
                                                          Total number of Limit Nodes:0
                                                          execution_graph 7388 7ffd348af838 7389 7ffd348af841 SetWindowsHookExW 7388->7389 7391 7ffd348af911 7389->7391

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 7ffd348ae369-7ffd348ae3a0 3 7ffd348ae3b9-7ffd348ae3cb 0->3 4 7ffd348ae3a2-7ffd348ae3af 0->4 8 7ffd348ae3cd-7ffd348ae3f9 3->8 9 7ffd348ae3fe-7ffd348ae421 3->9 4->3 7 7ffd348ae3b1-7ffd348ae3b7 4->7 7->3 19 7ffd348ae7ac-7ffd348ae7b7 8->19 15 7ffd348ae486-7ffd348ae498 9->15 16 7ffd348ae423-7ffd348ae43b 9->16 23 7ffd348ae5c8-7ffd348ae5da 15->23 24 7ffd348ae49e-7ffd348ae4c3 15->24 21 7ffd348ae457-7ffd348ae468 16->21 22 7ffd348ae43d-7ffd348ae455 16->22 29 7ffd348ae46a-7ffd348ae47f 21->29 30 7ffd348ae481 21->30 22->21 34 7ffd348ae79a-7ffd348ae7ab 23->34 35 7ffd348ae5e0-7ffd348ae5f6 23->35 24->23 37 7ffd348ae4c9-7ffd348ae4dd 24->37 29->30 30->19 34->19 35->34 44 7ffd348ae5fc-7ffd348ae610 35->44 41 7ffd348ae7b8-7ffd348ae870 37->41 42 7ffd348ae4e3-7ffd348ae4ed 37->42 67 7ffd348ae87c-7ffd348ae889 41->67 68 7ffd348ae872-7ffd348ae877 call 7ffd348ac660 41->68 45 7ffd348ae506-7ffd348ae511 42->45 46 7ffd348ae4ef-7ffd348ae504 42->46 44->34 51 7ffd348ae513-7ffd348ae550 45->51 52 7ffd348ae552-7ffd348ae563 45->52 46->45 51->52 52->23 60 7ffd348ae565-7ffd348ae57d 52->60 65 7ffd348ae599-7ffd348ae5aa 60->65 66 7ffd348ae57f-7ffd348ae597 60->66 74 7ffd348ae5ac-7ffd348ae5c1 65->74 75 7ffd348ae5c3 65->75 66->65 73 7ffd348ae88b-7ffd348ae8b3 67->73 68->67 76 7ffd348ae8b9-7ffd348ae8c4 73->76 77 7ffd348aeaa4-7ffd348aeab9 73->77 74->75 75->19 80 7ffd348ae8c6-7ffd348ae8ce 76->80 81 7ffd348ae932-7ffd348ae937 76->81 92 7ffd348aeabb-7ffd348aeac2 77->92 93 7ffd348aeac3-7ffd348aeb0e 77->93 80->77 85 7ffd348ae8d4-7ffd348ae8e9 80->85 82 7ffd348ae939-7ffd348ae945 81->82 83 7ffd348ae9a3-7ffd348ae9ad 81->83 82->77 91 7ffd348ae94b-7ffd348ae95e 82->91 88 7ffd348ae9cf-7ffd348ae9d7 83->88 89 7ffd348ae9af 83->89 86 7ffd348ae8eb-7ffd348ae910 85->86 87 7ffd348ae912-7ffd348ae91d 85->87 86->87 98 7ffd348ae960-7ffd348ae963 86->98 87->77 95 7ffd348ae923-7ffd348ae930 87->95 96 7ffd348ae9da-7ffd348ae9e5 88->96 99 7ffd348ae9b4-7ffd348ae9bc call 7ffd348ac680 89->99 91->96 92->93 113 7ffd348aeb2b-7ffd348aeb3c 93->113 114 7ffd348aeb10-7ffd348aeb16 93->114 95->80 95->81 96->77 100 7ffd348ae9eb-7ffd348aea06 96->100 103 7ffd348ae965 98->103 104 7ffd348ae96f-7ffd348ae977 98->104 106 7ffd348ae9c1-7ffd348ae9cd 99->106 100->77 102 7ffd348aea0c-7ffd348aea1f 100->102 102->77 107 7ffd348aea25-7ffd348aea36 102->107 103->104 104->77 108 7ffd348ae97d-7ffd348ae9a2 104->108 106->88 107->77 115 7ffd348aea38-7ffd348aea47 107->115 118 7ffd348aeb4d-7ffd348aeb70 113->118 119 7ffd348aeb3e-7ffd348aeb45 113->119 116 7ffd348aeb18-7ffd348aeb29 114->116 117 7ffd348aeb71-7ffd348aebea 114->117 120 7ffd348aea49-7ffd348aea54 115->120 121 7ffd348aea92-7ffd348aeaa3 115->121 116->113 116->114 134 7ffd348aebec-7ffd348aebfc 117->134 135 7ffd348aebfe-7ffd348aec0f 117->135 122 7ffd348aeb47-7ffd348aeb49 119->122 120->121 126 7ffd348aea56-7ffd348aea6b 120->126 122->118 134->134 134->135 136 7ffd348aec20-7ffd348aec51 135->136 137 7ffd348aec11-7ffd348aec1f 135->137 141 7ffd348aeca7-7ffd348aecae 136->141 142 7ffd348aec53-7ffd348aec59 136->142 137->136 143 7ffd348aecef-7ffd348aed18 141->143 144 7ffd348aecb0-7ffd348aecb1 141->144 142->141 145 7ffd348aec5b-7ffd348aec5c 142->145 146 7ffd348aecb4-7ffd348aecb7 144->146 147 7ffd348aec5f-7ffd348aec62 145->147 148 7ffd348aed19-7ffd348aed5d 146->148 149 7ffd348aecb9-7ffd348aecca 146->149 147->148 151 7ffd348aec68-7ffd348aec78 147->151 161 7ffd348aee09-7ffd348aee0f 148->161 162 7ffd348aed63-7ffd348aed69 148->162 154 7ffd348aece6-7ffd348aeced 149->154 155 7ffd348aeccc-7ffd348aecd2 149->155 152 7ffd348aec7a-7ffd348aec9c 151->152 153 7ffd348aeca0-7ffd348aeca5 151->153 152->153 153->141 153->147 154->143 154->146 155->148 158 7ffd348aecd4-7ffd348aece2 155->158 158->154
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: d
                                                          • API String ID: 0-2564639436
                                                          • Opcode ID: 84eabdf2c5f4c6d1439c89561777910807fdd9ddf55629e56bf24397fbf2d84d
                                                          • Instruction ID: f24b38a87c847bdcf6f4b4a22d04d6d3f1a841fd67a047364c284da359d6dd08
                                                          • Opcode Fuzzy Hash: 84eabdf2c5f4c6d1439c89561777910807fdd9ddf55629e56bf24397fbf2d84d
                                                          • Instruction Fuzzy Hash: 74522631B4EB4A0FE3A9DB2C84A567577E1FF56310B1849BAD18EC7193DE28F8428351
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 253 7ffd348af838-7ffd348af83f 254 7ffd348af84a-7ffd348af8bd 253->254 255 7ffd348af841-7ffd348af849 253->255 259 7ffd348af949-7ffd348af94d 254->259 260 7ffd348af8c3-7ffd348af8d0 254->260 255->254 261 7ffd348af8d2-7ffd348af90f SetWindowsHookExW 259->261 260->261 263 7ffd348af917-7ffd348af948 261->263 264 7ffd348af911 261->264 264->263
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID: HookWindows
                                                          • String ID:
                                                          • API String ID: 2559412058-0
                                                          • Opcode ID: 1c4c3a6a01b6a6b88ce9a7eff16693591a3698ea44fc9a764d646eb877f1afab
                                                          • Instruction ID: 20994787f76b0ec6c374c32a5cb7041faa97934b29d53924a299aa0cdac47f6b
                                                          • Opcode Fuzzy Hash: 1c4c3a6a01b6a6b88ce9a7eff16693591a3698ea44fc9a764d646eb877f1afab
                                                          • Instruction Fuzzy Hash: 89411531A0CA4C4FDB58DB6898566F9BBE1EF59321F04423ED049D3292CE74A81287C1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 02f1b7c85d28ffbef4994875dcd55130a22597882fac0ca596da5c32275d6234
                                                          • Instruction ID: 232f9008ea82f0f627b1e97981de5bae296d8faffbb9a8f51c880fa7eb1b0701
                                                          • Opcode Fuzzy Hash: 02f1b7c85d28ffbef4994875dcd55130a22597882fac0ca596da5c32275d6234
                                                          • Instruction Fuzzy Hash: BFE1A613A0E6D51BE751A7BCA8711EA7BA0AF43324B0C51FBD188CB0D3E96C74499396
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c78b0b4c5bf0cc0b738ee718ff63e5f195f9ae9d2845cc62ac2ab98fe9245b11
                                                          • Instruction ID: c36bea04c8b46a6cd475a6617e98928d02d563d83acc81886d2ff2d97b8dc3dc
                                                          • Opcode Fuzzy Hash: c78b0b4c5bf0cc0b738ee718ff63e5f195f9ae9d2845cc62ac2ab98fe9245b11
                                                          • Instruction Fuzzy Hash: 86C1C907B0E5D11BF761A7FCB8721EA6B54AF43324B0C51BBD1888B0D3ADAC74469396
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 27d016233426666b3bac5f77c8d9aca6db5327d5af393c86516598b5000d1937
                                                          • Instruction ID: 18cae95dc3fe8cfda7eb51df866b21192b80ac0f0cb139f16afffd877737c10d
                                                          • Opcode Fuzzy Hash: 27d016233426666b3bac5f77c8d9aca6db5327d5af393c86516598b5000d1937
                                                          • Instruction Fuzzy Hash: 4DD1B817B0E5D11BE761A7BCB8711EA7BA0AF43324B0C51BBD188CB0D3ADAC74459396
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 316af0f35f34ac09b4647d5288dcd18855ceeb57637bb346b680973b42c753c1
                                                          • Instruction ID: cff42c39287551be90129478d8c13859766a09d78c735c9069421c7c96072ee0
                                                          • Opcode Fuzzy Hash: 316af0f35f34ac09b4647d5288dcd18855ceeb57637bb346b680973b42c753c1
                                                          • Instruction Fuzzy Hash: 17C1DA07B0E6D11BF761A7FCB8711EA6B50AF43324B0C51BBD1888B0D3ADAC74459396
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70b95f41ebccfa9a1ce65376e8d59710f0f0fd9834448990a1985500180b207b
                                                          • Instruction ID: 4b6c1f0e12ab4511413877d8d49c50f842ac2c140afbe6959f2719b3e2299682
                                                          • Opcode Fuzzy Hash: 70b95f41ebccfa9a1ce65376e8d59710f0f0fd9834448990a1985500180b207b
                                                          • Instruction Fuzzy Hash: F0B1E517B0D6A21BD32177FCB8B51EA7B64DF8237570C55BBD2C8CA093A868704A83D5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cae00cc202255634960326bda963730d815511477ce47c2d5c7dad107412a3fc
                                                          • Instruction ID: aca436194a389c9c634f559ec5abc2d735c425544ea277973b72ad89b81e269b
                                                          • Opcode Fuzzy Hash: cae00cc202255634960326bda963730d815511477ce47c2d5c7dad107412a3fc
                                                          • Instruction Fuzzy Hash: 46A1E707B0E6D11BF751A7FCB8711EA6B60AF43324B0C51BBD1888B0D3ADAC74459396
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e89db795e16ee86d036ddbda06bb6ac5cb83c9eb5766a1934a8e581491f6020a
                                                          • Instruction ID: 2f843f9fbb2175e22055ee8f010a90eacd81e898b1ea74b117f6eca7adaa706b
                                                          • Opcode Fuzzy Hash: e89db795e16ee86d036ddbda06bb6ac5cb83c9eb5766a1934a8e581491f6020a
                                                          • Instruction Fuzzy Hash: 4571F423B0D5A157D321BBFCB8B61EABBA4EF4137870C5177D2CC9B093E86874468295
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e31051c8845d169af9e3b3c886e5a96c8d6ba69d9a9ba7a7f933d27e75c40952
                                                          • Instruction ID: 9a710f7327a4c59d99e76c77d871482c93bd0a5b2d60f7a89e0c439d74d67d55
                                                          • Opcode Fuzzy Hash: e31051c8845d169af9e3b3c886e5a96c8d6ba69d9a9ba7a7f933d27e75c40952
                                                          • Instruction Fuzzy Hash: 5981A957A0F6D11FF75197BCA8751E97B90AF43314B0C41BBD188CB1D3DAACA806A392
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3328732630.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffd348a0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dc2db8cb3aed913c6a8431a18a8e32e9b9b7306639546002ed628866a8cc5941
                                                          • Instruction ID: 56402cd494dfcc4344a179d1be8e669ce126413fe42007f7b69af8d01406be4d
                                                          • Opcode Fuzzy Hash: dc2db8cb3aed913c6a8431a18a8e32e9b9b7306639546002ed628866a8cc5941
                                                          • Instruction Fuzzy Hash: 0961BC53B0F6D51FF791976C68751EA6B90EF43324B0841FBD288CB1D3D95CA806A3A2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Execution Graph

                                                          Execution Coverage:19.3%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:3
                                                          Total number of Limit Nodes:0
                                                          execution_graph 1294 7ffd348c3058 1295 7ffd348c3061 SetWindowsHookExW 1294->1295 1297 7ffd348c3131 1295->1297

                                                          Callgraph

                                                          • Executed
                                                          • Not Executed
                                                          • Opacity -> Relevance
                                                          • Disassembly available
                                                          callgraph 0 Function_00007FFD348C33F8 30 Function_00007FFD348C3600 0->30 1 Function_00007FFD348C04F8 2 Function_00007FFD348C05F8 3 Function_00007FFD348C1AF7 4 Function_00007FFD348C10F5 5 Function_00007FFD348C31FA 6 Function_00007FFD348C34FA 7 Function_00007FFD348C18F0 8 Function_00007FFD348C04F0 9 Function_00007FFD348C05F3 10 Function_00007FFD348C06F3 11 Function_00007FFD348C11F2 12 Function_00007FFD348C0CE8 13 Function_00007FFD348C04E8 14 Function_00007FFD348C11EA 15 Function_00007FFD348C0DE9 16 Function_00007FFD348C0EE9 17 Function_00007FFD348C18E0 18 Function_00007FFD348C04E0 19 Function_00007FFD348C31E2 20 Function_00007FFD348C1518 21 Function_00007FFD348C1915 22 Function_00007FFD348C0F1B 23 Function_00007FFD348C1110 24 Function_00007FFD348C2F14 25 Function_00007FFD348C1411 26 Function_00007FFD348C2206 27 Function_00007FFD348C0F05 28 Function_00007FFD348C000B 29 Function_00007FFD348C270A 31 Function_00007FFD348C02FD 32 Function_00007FFD348C0538 33 Function_00007FFD348C0338 34 Function_00007FFD348C0F3A 35 Function_00007FFD348C123A 36 Function_00007FFD348C1430 37 Function_00007FFD348C1B2D 38 Function_00007FFD348C012D 39 Function_00007FFD348C1C34 39->36 40 Function_00007FFD348C0532 41 Function_00007FFD348C122A 42 Function_00007FFD348C0E29 43 Function_00007FFD348C031D 44 Function_00007FFD348C0558 45 Function_00007FFD348C3058 46 Function_00007FFD348C065A 47 Function_00007FFD348C014D 48 Function_00007FFD348C024D 49 Function_00007FFD348C044D 50 Function_00007FFD348C2F4D 51 Function_00007FFD348C324D 52 Function_00007FFD348C0552 53 Function_00007FFD348C0F52 54 Function_00007FFD348C3648 55 Function_00007FFD348C1245 56 Function_00007FFD348C0F4A 57 Function_00007FFD348C0949 57->2 57->32 57->44 89 Function_00007FFD348C05B8 57->89 100 Function_00007FFD348C0B9D 57->100 110 Function_00007FFD348C05C8 57->110 58 Function_00007FFD348C1A40 58->1 58->8 58->13 58->18 94 Function_00007FFD348C04A8 58->94 59 Function_00007FFD348C023D 60 Function_00007FFD348C2644 61 Function_00007FFD348C2E41 61->7 61->17 61->24 104 Function_00007FFD348C2EDC 61->104 62 Function_00007FFD348C1075 63 Function_00007FFD348C1175 64 Function_00007FFD348C067A 65 Function_00007FFD348C0070 66 Function_00007FFD348C0572 67 Function_00007FFD348C1265 68 Function_00007FFD348C066A 69 Function_00007FFD348C276A 70 Function_00007FFD348C1060 71 Function_00007FFD348C325D 72 Function_00007FFD348C335D 73 Function_00007FFD348C0562 74 Function_00007FFD348C0E62 75 Function_00007FFD348C0498 76 Function_00007FFD348C1295 77 Function_00007FFD348C2399 77->20 77->70 96 Function_00007FFD348C06A8 77->96 78 Function_00007FFD348C3599 78->30 79 Function_00007FFD348C328D 80 Function_00007FFD348C0493 81 Function_00007FFD348C0592 82 Function_00007FFD348C0388 83 Function_00007FFD348C1185 84 Function_00007FFD348C1285 85 Function_00007FFD348C068A 86 Function_00007FFD348C1980 87 Function_00007FFD348C1780 88 Function_00007FFD348C0582 90 Function_00007FFD348C00AD 91 Function_00007FFD348C33AD 92 Function_00007FFD348C05B2 93 Function_00007FFD348C26B1 95 Function_00007FFD348C05A8 97 Function_00007FFD348C12A5 98 Function_00007FFD348C22A9 98->20 98->87 99 Function_00007FFD348C029D 101 Function_00007FFD348C05A2 102 Function_00007FFD348C25A2 103 Function_00007FFD348C10D5 105 Function_00007FFD348C33DA 106 Function_00007FFD348C32CD 107 Function_00007FFD348C33CD 108 Function_00007FFD348C17D3 109 Function_00007FFD348C05D2 111 Function_00007FFD348C12C5 112 Function_00007FFD348C19C5 112->1 112->8 112->13 112->18 112->94 113 Function_00007FFD348C11C5 114 Function_00007FFD348C18C5 115 Function_00007FFD348C0EC9 116 Function_00007FFD348C01BD 117 Function_00007FFD348C31BD 118 Function_00007FFD348C32BD 119 Function_00007FFD348C05C2 120 Function_00007FFD348C0DC1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 168 7ffd348c3058-7ffd348c305f 169 7ffd348c306a-7ffd348c30dd 168->169 170 7ffd348c3061-7ffd348c3069 168->170 174 7ffd348c3169-7ffd348c316d 169->174 175 7ffd348c30e3-7ffd348c30e8 169->175 170->169 176 7ffd348c30f2-7ffd348c312f SetWindowsHookExW 174->176 177 7ffd348c30ef-7ffd348c30f0 175->177 178 7ffd348c3137-7ffd348c3168 176->178 179 7ffd348c3131 176->179 177->176 179->178
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000003.00000002.3329049809.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_3_2_7ffd348c0000_RuntimeBroker.jbxd
                                                          Similarity
                                                          • API ID: HookWindows
                                                          • String ID:
                                                          • API String ID: 2559412058-0
                                                          • Opcode ID: cb80da51b9ef6e0499002baf3d4ae11a1a11161ef9b60886285c4eb5b464be41
                                                          • Instruction ID: 121c62d671b35330a0dae69d17d6e0dbbcdb0b0a274e502f65ad25ff37ee0c1d
                                                          • Opcode Fuzzy Hash: cb80da51b9ef6e0499002baf3d4ae11a1a11161ef9b60886285c4eb5b464be41
                                                          • Instruction Fuzzy Hash: 61410A31A0CA5D4FDB18EB5C98566F9BBE1EB5A321F00027FD04DD3292CA74A81287C1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%