Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bUAB.exe

Overview

General Information

Sample name:bUAB.exe
Analysis ID:1426963
MD5:e3a50cd4b0d687de0371979907eecec8
SHA1:a985891877f61b6b68b9584b3ebedad6941eb7ec
SHA256:bbfd0355383f8e0df1442c646737854bfccb138b9c89e86c64c3d49d31e5fbf8
Tags:DcRatexe
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AsyncRAT
Yara detected DcRat
.NET source code references suspicious native API functions
Machine Learning detection for sample
Queries memory information (via WMI often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • bUAB.exe (PID: 7532 cmdline: "C:\Users\user\Desktop\bUAB.exe" MD5: E3A50CD4B0D687DE0371979907EECEC8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Ports": ["2016"], "Server": ["window10.duckdns.org"], "Mutex": "DcRatMutex_qw6rgvfu6ruj67fere5fhy HJG", "Certificate": "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", "Server Signature": "CfBGWgaZcSFbRY1ZjzIeyTGhsM2okmwQOujBLV9KdxvTK5nuKtxl0YRc2dkODk9hElCZE1bbstsI9BFpQuIkGa59o27bUU8qSGAak3ZjEIlIgtbTjjgbQCxSQToalikk8qsDvFS4CG/X5uWQ60CVgykbly7uvjFvKlV47JqVu1A="}
SourceRuleDescriptionAuthorStrings
bUAB.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    bUAB.exeWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x65fc:$a1: havecamera
    • 0x9b14:$a2: timeout 3 > NUL
    • 0x9b34:$a3: START "" "
    • 0x99bf:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
    • 0x9a74:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
    bUAB.exeINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
    • 0x9a74:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
    • 0x99bf:$s2: L2Mgc2NodGFza3MgL2
    • 0x993e:$s3: QW1zaVNjYW5CdWZmZXI
    • 0x998c:$s4: VmlydHVhbFByb3RlY3Q
    bUAB.exeINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
    • 0x9cf6:$q1: Select * from Win32_CacheMemory
    • 0x9d36:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
    • 0x9d84:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
    • 0x9dd2:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
    bUAB.exeINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
    • 0xa16e:$s1: DcRatBy
    SourceRuleDescriptionAuthorStrings
    dump.pcapWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x892:$b2: DcRat By qwqdanchun1
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2909667773.00000000007FE000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x1c58:$b2: DcRat By qwqdanchun1
    00000000.00000002.2910315909.00000000029C3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DcRat_2Yara detected DcRatJoe Security
      00000000.00000002.2910315909.00000000029C3000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x3efc:$b2: DcRat By qwqdanchun1
      • 0xb884:$b2: DcRat By qwqdanchun1
      • 0xbad4:$b2: DcRat By qwqdanchun1
      00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
        • 0x63fc:$a1: havecamera
        • 0x9914:$a2: timeout 3 > NUL
        • 0x9934:$a3: START "" "
        • 0x97bf:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
        • 0x9874:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
        Click to see the 10 entries
        SourceRuleDescriptionAuthorStrings
        0.0.bUAB.exe.3b0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.0.bUAB.exe.3b0000.0.unpackWindows_Trojan_DCRat_1aeea1acunknownunknown
          • 0x65fc:$a1: havecamera
          • 0x9b14:$a2: timeout 3 > NUL
          • 0x9b34:$a3: START "" "
          • 0x99bf:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
          • 0x9a74:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
          0.0.bUAB.exe.3b0000.0.unpackINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
          • 0x9a74:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
          • 0x99bf:$s2: L2Mgc2NodGFza3MgL2
          • 0x993e:$s3: QW1zaVNjYW5CdWZmZXI
          • 0x998c:$s4: VmlydHVhbFByb3RlY3Q
          0.0.bUAB.exe.3b0000.0.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
          • 0x9cf6:$q1: Select * from Win32_CacheMemory
          • 0x9d36:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
          • 0x9d84:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
          • 0x9dd2:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
          0.0.bUAB.exe.3b0000.0.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
          • 0xa16e:$s1: DcRatBy
          No Sigma rule has matched
          Timestamp:04/16/24-20:09:13.581089
          SID:2034847
          Source Port:2016
          Destination Port:49731
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/16/24-20:09:13.581089
          SID:2848152
          Source Port:2016
          Destination Port:49731
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: bUAB.exeAvira: detected
          Source: bUAB.exeMalware Configuration Extractor: AsyncRAT {"Ports": ["2016"], "Server": ["window10.duckdns.org"], "Mutex": "DcRatMutex_qw6rgvfu6ruj67fere5fhy HJG", "Certificate": "MIICMDCCAZmgAwIBAgIVAOiowOgN5NQCLKxXZz1P8wPFyFGbMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTIyMTEyNzE5NTQzNloXDTMzMDkwNTE5NTQzNlowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANRrE0IxI4zvM+hQcd9c4/yjtBdQ09rGNkpsb08nsW4aceh/GHFWKWNHRyls+IUj6Kow5TCJXpFu6pm5I+96sGG68VLJEfoj3YXIakWD2G8tJPPpO/K+AgInNvriE+lJYAq1h8v4ZIiJjeCCAHt9BoASkTJURDBrpDXmIpmJth7dAgMBAAGjMjAwMB0GA1UdDgQWBBQ9+9t2HSqwv0IrSQzqdGSkt2dxiDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAKGk8bk2LLJ+VAz3F5R8eGjfhgE9gCOLW+R0LrM9TAxnZ41mNHCVXuDXSVB8sCst7u7xIsUZwCByYPWGFnxT5CrT32bsjZQ6SP1PVPs8bPuK7fdTlX4jbsHKaAM1spt8dWRMttkGQY7sOqCKNwCKmqfw/koPiv3wPpHBQIEUleKh", "Server Signature": "CfBGWgaZcSFbRY1ZjzIeyTGhsM2okmwQOujBLV9KdxvTK5nuKtxl0YRc2dkODk9hElCZE1bbstsI9BFpQuIkGa59o27bUU8qSGAak3ZjEIlIgtbTjjgbQCxSQToalikk8qsDvFS4CG/X5uWQ60CVgykbly7uvjFvKlV47JqVu1A="}
          Source: bUAB.exeReversingLabs: Detection: 84%
          Source: bUAB.exeJoe Sandbox ML: detected
          Source: bUAB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: TrafficSnort IDS: 2034847 ET TROJAN Observed Malicious SSL Cert (AsyncRAT) 172.94.39.213:2016 -> 192.168.2.4:49731
          Source: TrafficSnort IDS: 2848152 ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT Variant) 172.94.39.213:2016 -> 192.168.2.4:49731
          Source: unknownDNS query: name: window10.duckdns.org
          Source: Joe Sandbox ViewASN Name: M247GB M247GB
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownDNS traffic detected: queries for: window10.duckdns.org
          Source: bUAB.exe, 00000000.00000002.2912273923.000000001AFF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
          Source: bUAB.exe, 00000000.00000002.2909667773.0000000000807000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
          Source: bUAB.exe, 00000000.00000002.2912273923.000000001AFEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab;
          Source: bUAB.exe, 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, bUAB.exe, 00000000.00000002.2910315909.0000000002743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: bUAB.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUAB.exe PID: 7532, type: MEMORYSTR

          System Summary

          barindex
          Source: bUAB.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: bUAB.exe, type: SAMPLEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: bUAB.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: bUAB.exe, type: SAMPLEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: 00000000.00000002.2909667773.00000000007FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.2910315909.00000000029C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.2909667773.0000000000807000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.2912273923.000000001AFA6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.2910315909.0000000002743000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: Process Memory Space: bUAB.exe PID: 7532, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: C:\Users\user\Desktop\bUAB.exeCode function: 0_2_00007FFD9B8A67520_2_00007FFD9B8A6752
          Source: C:\Users\user\Desktop\bUAB.exeCode function: 0_2_00007FFD9B8A06000_2_00007FFD9B8A0600
          Source: C:\Users\user\Desktop\bUAB.exeCode function: 0_2_00007FFD9B8A59A60_2_00007FFD9B8A59A6
          Source: bUAB.exe, 00000000.00000000.1660557765.00000000003BE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs bUAB.exe
          Source: bUAB.exeBinary or memory string: OriginalFilenameClient.exe" vs bUAB.exe
          Source: bUAB.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: bUAB.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: bUAB.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: bUAB.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: 00000000.00000002.2909667773.00000000007FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.2910315909.00000000029C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.2909667773.0000000000807000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.2912273923.000000001AFA6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.2910315909.0000000002743000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: Process Memory Space: bUAB.exe PID: 7532, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: bUAB.exe, Settings.csBase64 encoded string: 'WsUhTQje46qdg2lN6JVthKiw+LAQPDmUXNV5eUfEgROdFv89WKJ5OXBQdA0ZV8DCeYqmjvHT+Fa4fGwUeLUQyw==', 'TkYgoLUZBVzMxX20nfUGzR0GU0lcgPfvXXdATyC6183xEBWX/txToy/uzmYYMLxWn7Ngs0Nb46W8/iHfO2jAvB3utnkB9ylAt5KbkBV2XKw=', 'VmzBJGQ03lXVyrXTnqsJeQzo4Uutzy+bnv96bRJu+VfOcm27jIsPlggtAUMPT6ngayeinTyrzw1GSowjSZ78jA==', 'tsQctTio8bwbLQHkd9MfpL5jMkUBsZiLhpb1ppBFw8lAL+ztbcRrM8CA6i8vSDsh0M83PaMtnTj43hkcl9yY7A==', 'gzbSl59ZwlrDDVgvI2gcD1WGL1yS/K4kbXaiB5D+2d0LbU4ZB3yyRj/n4eomiTs7zG6MBAYzEyjMFk38fR/e/gLs92IVR9p+9cXhspQmsFRQVB6DD1Tr79kfQAofEWiw', 'H2WEsBgVBmC9/R62QTBaX89PgGnTZsbjdmw6EU2Fhy+ylpXiVfAm6YeTAxT+OlMR5llG4AUOodkNIiOBNNakLA==', 'PeOYw+bEtEhjCnll95hRjz3upv9bP1uivsDB4g3zuVS6br9QlKUe8PM0BTbiO73AMT7LRVofPKAHx+ILILCW/g==', 'Vu8u5NKpQ90jbn0VVcYy/4Rly7nw8QOXeVhFueu99AtFwsNK9u59fhMgWx81PI2dBv0boTu3zi4MTXhEndRTcA==', 'YlvdchsTMVZZxYCDwrwxPovuwOCjuIdff+Em4X+Ui5VT4Tr8CJKmMv7r/EpbEDhOVKySH5miswBAlCMnIMUa6w=='
          Source: bUAB.exe, NormalStartup.csBase64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA=='
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@5/1
          Source: C:\Users\user\Desktop\bUAB.exeMutant created: NULL
          Source: C:\Users\user\Desktop\bUAB.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qw6rgvfu6ruj67fere5fhy HJG
          Source: bUAB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: bUAB.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\bUAB.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: bUAB.exeReversingLabs: Detection: 84%
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: cryptnet.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: devenum.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeSection loaded: msdmo.dllJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: bUAB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: bUAB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\bUAB.exeCode function: 0_2_00007FFD9B8A00BD pushad ; iretd 0_2_00007FFD9B8A00C1

          Boot Survival

          barindex
          Source: Yara matchFile source: bUAB.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUAB.exe PID: 7532, type: MEMORYSTR
          Source: C:\Users\user\Desktop\bUAB.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: bUAB.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUAB.exe PID: 7532, type: MEMORYSTR
          Source: C:\Users\user\Desktop\bUAB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_CacheMemory
          Source: bUAB.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
          Source: C:\Users\user\Desktop\bUAB.exeMemory allocated: B00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeMemory allocated: 1A6C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeWindow / User API: threadDelayed 4470Jump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeWindow / User API: threadDelayed 5373Jump to behavior
          Source: C:\Users\user\Desktop\bUAB.exe TID: 7760Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exe TID: 7816Thread sleep time: -23980767295822402s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exe TID: 7824Thread sleep count: 4470 > 30Jump to behavior
          Source: C:\Users\user\Desktop\bUAB.exe TID: 7824Thread sleep count: 5373 > 30Jump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: bUAB.exe, 00000000.00000002.2912273923.000000001AFA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
          Source: bUAB.exe, 00000000.00000002.2912981417.000000001B19F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\bUAB.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: bUAB.exe, AntiProcess.csReference to suspicious API methods: OpenProcess(1u, bInheritHandle: false, processId)
          Source: bUAB.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: bUAB.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: bUAB.exe, Amsi.csReference to suspicious API methods: Win32.VirtualAllocEx(procAddress, (UIntPtr)(ulong)patch.Length, 64u, out var _)
          Source: bUAB.exe, 00000000.00000002.2910315909.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, bUAB.exe, 00000000.00000002.2910315909.0000000002735000.00000004.00000800.00020000.00000000.sdmp, bUAB.exe, 00000000.00000002.2910315909.0000000002727000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: bUAB.exe, 00000000.00000002.2910315909.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, bUAB.exe, 00000000.00000002.2910315909.0000000002735000.00000004.00000800.00020000.00000000.sdmp, bUAB.exe, 00000000.00000002.2910315909.0000000002727000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@
          Source: C:\Users\user\Desktop\bUAB.exeQueries volume information: C:\Users\user\Desktop\bUAB.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\bUAB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: Yara matchFile source: bUAB.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUAB.exe.3b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUAB.exe PID: 7532, type: MEMORYSTR
          Source: bUAB.exe, 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
          Source: bUAB.exe, 00000000.00000002.2912273923.000000001AFF3000.00000004.00000020.00020000.00000000.sdmp, bUAB.exe, 00000000.00000002.2909667773.00000000007FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: bUAB.exe, 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
          Source: bUAB.exe, 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe
          Source: C:\Users\user\Desktop\bUAB.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000000.00000002.2910315909.00000000029C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2910315909.0000000002743000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUAB.exe PID: 7532, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000000.00000002.2910315909.00000000029C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2910315909.0000000002743000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUAB.exe PID: 7532, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
          Windows Management Instrumentation
          1
          Scheduled Task/Job
          1
          Process Injection
          1
          Disable or Modify Tools
          OS Credential Dumping1
          Query Registry
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Scheduled Task/Job
          1
          DLL Side-Loading
          1
          Scheduled Task/Job
          31
          Virtualization/Sandbox Evasion
          LSASS Memory221
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          Native API
          Logon Script (Windows)1
          DLL Side-Loading
          1
          Process Injection
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive11
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
          Obfuscated Files or Information
          NTDS31
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials13
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          bUAB.exe84%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
          bUAB.exe100%AviraHEUR/AGEN.1307404
          bUAB.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          bg.microsoft.map.fastly.net
          199.232.210.172
          truefalse
            unknown
            edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
            217.20.63.34
            truefalse
              unknown
              window10.duckdns.org
              172.94.39.213
              truetrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namebUAB.exe, 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, bUAB.exe, 00000000.00000002.2910315909.0000000002743000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  172.94.39.213
                  window10.duckdns.orgUnited States
                  9009M247GBtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1426963
                  Start date and time:2024-04-16 20:08:05 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 33s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:5
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:bUAB.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@1/2@5/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 4
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 217.20.63.34, 23.40.205.9, 23.40.205.83, 23.40.205.74, 23.40.205.26, 23.40.205.34, 23.40.205.41, 23.40.205.66, 23.40.205.56
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • VT rate limit hit for: bUAB.exe
                  TimeTypeDescription
                  20:09:14API Interceptor1x Sleep call for process: bUAB.exe modified
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comhttps://netorg5340145-my.sharepoint.com/:b:/g/personal/info_curreg_com/EYsFsgLHWKJPpZNQ4wSBOOoBqo-z__F4rwbyNsnTrr6xBA?e=O3FtTXGet hashmaliciousHTMLPhisherBrowse
                  • 217.20.50.37
                  https://ethiocultural.com/choiys/ryosan.co.kr/efax/Get hashmaliciousHTMLPhisherBrowse
                  • 217.20.54.36
                  https://domainkey.xxabg.cn/Get hashmaliciousUnknownBrowse
                  • 217.20.54.37
                  F5ZC1F67nf.exeGet hashmaliciousCobaltStrikeBrowse
                  • 217.20.49.105
                  https://pub-ccab1e1c90754b44a899b93b24a61322.r2.dev/pp.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 217.20.49.100
                  http://validartucuentaaqui.mx.zya.me/login.live.com_login_verify_credentials_outlook.html?i=3Get hashmaliciousUnknownBrowse
                  • 217.20.49.34
                  https://omdomfinbd.com/amaz/Get hashmaliciousUnknownBrowse
                  • 146.19.181.21
                  https://www.w543.cn/Get hashmaliciousUnknownBrowse
                  • 217.20.52.98
                  https://kkx26.z11.web.core.windows.net/werrx01USAHTML/?bcda=1-877-200-1965Get hashmaliciousTechSupportScamBrowse
                  • 146.19.181.19
                  https://broken-hat-112c.u4eulk3x.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                  • 162.222.105.38
                  bg.microsoft.map.fastly.nethttps://docs.google.com/forms/d/e/1FAIpQLScaqr8AS5UHJLhHgsk75Su6KzT5rrqw0atzmeeQYQGFlm3rfA/viewform?usp=sf_linkGet hashmaliciousHTMLPhisherBrowse
                  • 199.232.214.172
                  xutnF2gKGTTy.exeGet hashmaliciousAsyncRATBrowse
                  • 199.232.210.172
                  hta.htaGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  2.htaGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  http://cubes.concordia.ca/track?type=click&enid=bWFpbGluZ2lkPTM2MjMmbWVzc2FnZWlkPTQxMjEmZGF0YWJhc2VpZD05MDEmc2VyaWFsPTEyNzU1MDM1NzUmZW1haWxpZD13YXJpZXN0NTkzMzgud2Vla2x5bWFpbEBibG9nZ2VyLmNvbSZ1c2VyaWQ9NDcxJmZsPSZleHRyYT1NdWx0aXZhcmlhdGVJZD0mJiY=&&&2028&&&http://gbmaucstans.com/?No5zl=ZGFuQHZpcnR1YWxpbnRlbGxpZ2VuY2VicmllZmluZy5jb20=Get hashmaliciousHTMLPhisherBrowse
                  • 199.232.210.172
                  https://00f82de.blob.core.windows.net/00f82de/1.html?4SdhQu6964HfYs43wfnwuulljn913CWVGBFRQHRPAHNP32199OVKO12176b14#14/43-6964/913-32199-12176Get hashmaliciousPhisherBrowse
                  • 199.232.210.172
                  ujMoHKBIfN.exeGet hashmaliciousDarkCloudBrowse
                  • 199.232.210.172
                  Shipping_Invoces_xls_0000000.vbsGet hashmaliciousGuLoaderBrowse
                  • 199.232.214.172
                  Swift_documents&Advice.vbsGet hashmaliciousGuLoaderBrowse
                  • 199.232.214.172
                  JUSTIFICANTE DE PAGO.vbsGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  window10.duckdns.orgbTa0.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                  • 172.111.136.105
                  bSX5.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                  • 172.111.136.105
                  bSkM.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                  • 173.44.50.84
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  M247GB2jQHythw1E.elfGet hashmaliciousMiraiBrowse
                  • 38.203.241.133
                  zLH4Gkr36e.elfGet hashmaliciousMiraiBrowse
                  • 194.71.126.13
                  https://www.goodnewsliverpool.co.uk/?ads_click=1&data=10345-9192-0-3318-1&nonce=b019a2f042&redir=%68%74%74%70%25%33%41aiitpune.com%2Fjs%2Ftjux%2F%2Fc2J5cm5lQGpwYy5xbGQuZWR1LmF1&$Get hashmaliciousHTMLPhisherBrowse
                  • 95.215.226.7
                  r414SHIPPINGORDERETC-0313SO6432TW102667003.scr.exeGet hashmaliciousXWormBrowse
                  • 104.250.180.178
                  J2NWKU2oJi.exeGet hashmaliciousAmadey, RHADAMANTHYSBrowse
                  • 91.202.233.180
                  UGXRHW5XnG.elfGet hashmaliciousMiraiBrowse
                  • 45.86.28.68
                  IF175.vbsGet hashmaliciousUnknownBrowse
                  • 45.61.128.239
                  VVr5Eoo84.vbsGet hashmaliciousUnknownBrowse
                  • 45.61.128.239
                  V4Mhvhr77.vbsGet hashmaliciousUnknownBrowse
                  • 45.61.128.239
                  Bf5V99.vbsGet hashmaliciousUnknownBrowse
                  • 45.61.128.239
                  No context
                  No context
                  Process:C:\Users\user\Desktop\bUAB.exe
                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                  Category:dropped
                  Size (bytes):69993
                  Entropy (8bit):7.99584879649948
                  Encrypted:true
                  SSDEEP:1536:iMveRG6BWC7T2g1wGUa5QUoaIB9ttiFJG+AOQOXl0Usvwr:feRG6BX6gUaHo9tkBHiUewr
                  MD5:29F65BA8E88C063813CC50A4EA544E93
                  SHA1:05A7040D5C127E68C25D81CC51271FFB8BEF3568
                  SHA-256:1ED81FA8DFB6999A9FEDC6E779138FFD99568992E22D300ACD181A6D2C8DE184
                  SHA-512:E29B2E92C496245BED3372578074407E8EF8882906CE10C35B3C8DEEBFEFE01B5FD7F3030ACAA693E175F4B7ACA6CD7D8D10AE1C731B09C5FA19035E005DE3AA
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:MSCF....i.......,...................I.................oXAy .authroot.stl.Ez..Q6..CK..<Tk...p.k..1...3...[..%Y.f..."K.6)..[*I.hOB."..rK.RQ*..}f..f...}....9.|.....gA...30.,O2L...0..%.U...U.t.....`dqM2.x..t...<(uad.c...x5V.x..t..agd.v......i...KD..q(. ...JJ......#..'=. ...3.x...}...+T.K..!.'.`w .!.x.r.......YafhG..O.3....'P[..'.D../....n..t....R<..=\E7L0?{..T.f...ID...,...r....3z..O/.b.Iwx.. .o...a\.s........."..'.......<;s.[...l...6.)ll..B.P.....k.... k0.".t!/.,........{...P8....B..0(.. .Q.....d...q,\.$.n.Q.\.p...R..:.hr./..8.S<a.s...+#3....D..h1.a.0....{.9.....:e.......n.~G.{.M.1..OU.....B.Q..y_>.P{...}i.=.a..QQT.U..|!.pyCD@.....l..70..w..)...W^.`l...%Y.\................i..=hYV.O8W@P.=.r.=..1m..1....)\.p..|.c.3..t..[...).....l.{.Y....\S.....y....[.mCt....Js;...H....Q..F.....g.O...[..A.=...F[..z....k...mo.lW{`....O...T.g.Y.Uh.;m.'.N..f..}4..9i..t4p_bI..`.....Ie..l.P.... ...Lg......[....5g...~D.s.h'>n.m.c.7...-..P.gG...i$...v.m.b[.yO.P/*.YH.
                  Process:C:\Users\user\Desktop\bUAB.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):330
                  Entropy (8bit):3.1414940076987787
                  Encrypted:false
                  SSDEEP:6:kKMs3llDN+SkQlPlEGYRMY9z+4KlDA3RUeVlWI/Vt:j3llMkPlE99SNxAhUeVLVt
                  MD5:B744899B447B22033F3B9819A133E0A5
                  SHA1:6DE73F94A1FE4EB2590922C3F6E82267D4E33272
                  SHA-256:C2E1BF18EC0A93E4D7AC2030827F07590D7C4CEA7E3A4A397B99F60E0BE6BBE8
                  SHA-512:42EC04C068322D912A136B12741859C32849061ABE3CF53ACC9068ADC848E8C8E14CDCD44B1F89401E526A816F9D1952A9CB62C7A9AC04379D7D75AB12E62C33
                  Malicious:false
                  Reputation:low
                  Preview:p...... .........._0)...(....................................................... ........M.........(...........i...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".b.3.6.8.5.3.8.5.a.4.7.f.d.a.1.:.0."...
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):5.621111951451253
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:bUAB.exe
                  File size:48'640 bytes
                  MD5:e3a50cd4b0d687de0371979907eecec8
                  SHA1:a985891877f61b6b68b9584b3ebedad6941eb7ec
                  SHA256:bbfd0355383f8e0df1442c646737854bfccb138b9c89e86c64c3d49d31e5fbf8
                  SHA512:273454ea78c38ed570f90a818a471e13cad94849797cf83b3bd7533581d12b381331afbea428ab571f6efeb260c9ce6bcfbfea5b0df24918b8899b11fda76cb3
                  SSDEEP:768:l9GmxD6ILNCaS+Di+LFxh635OiY8Ybage19kOId0vEgK/JjZVc6KN:l9GAHW+RxkQzbNMkOQ0nkJjZVclN
                  TLSH:E9236D0037A8C536E6BD4BB4ADF292058375D6672D03CA5D7CC814AA2B13FC996136FE
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x40cbde
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x60930A0B [Wed May 5 21:11:39 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xcb900x4b.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000xdf7.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xabe40xac0098ecc3faf77d1b7b1f4fcd67cece6b5eFalse0.5028161337209303data5.646482729064109IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0xe0000xdf70xe002083376922615c09cdda9acfd9305376False0.4017857142857143data5.110607648061562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x100000xc0x200c10c3c0a0024ae64684ddd6e1f2ef429False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0xe0a00x2d4data0.4350828729281768
                  RT_MANIFEST0xe3740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  04/16/24-20:09:13.581089TCP2034847ET TROJAN Observed Malicious SSL Cert (AsyncRAT)201649731172.94.39.213192.168.2.4
                  04/16/24-20:09:13.581089TCP2848152ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT Variant)201649731172.94.39.213192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Apr 16, 2024 20:09:11.545137882 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:11.829696894 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:11.829914093 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:13.290158987 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:13.581089020 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:13.586394072 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:13.877599001 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:13.925678015 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:14.931826115 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:15.268254042 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:15.268326044 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:15.604186058 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:25.349845886 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:25.684798002 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:25.684854984 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:25.976406097 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:26.019712925 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:26.314876080 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:26.330209017 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:26.667982101 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:26.668174982 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:27.004148006 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:35.770510912 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:36.104140997 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:36.104351997 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:36.389823914 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:36.441445112 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:36.725717068 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:36.727828979 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:37.013562918 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:37.013684988 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:37.349874973 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:46.191838026 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:46.527070999 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:46.527187109 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:46.827687979 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:46.878844023 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:47.165591002 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:47.188452005 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:47.523216963 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:47.523418903 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:47.857820034 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:56.614272118 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:56.948973894 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:56.949095011 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:57.233623981 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:57.285355091 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:57.569694996 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:57.572041035 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:57.905760050 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:09:57.905874014 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:09:58.244359970 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:06.909666061 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:06.957004070 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:07.111643076 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:07.241916895 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:07.242044926 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:07.453695059 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:07.531512976 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:07.735269070 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:07.997719049 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:07.998066902 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:07.999752998 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:08.333821058 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:08.333913088 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:08.668375969 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:17.519988060 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:17.861838102 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:17.862040997 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:18.150441885 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:18.191593885 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:18.481952906 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:18.484051943 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:18.817692041 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:18.817822933 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:19.152959108 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:27.942434072 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:28.276479006 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:28.276628017 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:28.561669111 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:28.613332033 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:28.902815104 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:28.904644012 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:29.241741896 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:29.241993904 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:29.576586008 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:36.900762081 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:36.957144022 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:37.244194984 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:37.285193920 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:38.363703012 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:38.697941065 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:38.698272943 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:38.984798908 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:39.035290003 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:39.320408106 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:39.322999001 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:39.657561064 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:39.657790899 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:39.992302895 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:48.786475897 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:49.121330023 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:49.121681929 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:49.409384966 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:49.457226992 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:49.742156029 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:49.744981050 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:50.081258059 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:50.081525087 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:50.417262077 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:59.223135948 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:59.558089018 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:59.558371067 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:10:59.845397949 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:10:59.894840956 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:11:00.181771994 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:11:00.183665037 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:11:00.521356106 CEST201649731172.94.39.213192.168.2.4
                  Apr 16, 2024 20:11:00.521574020 CEST497312016192.168.2.4172.94.39.213
                  Apr 16, 2024 20:11:00.857449055 CEST201649731172.94.39.213192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Apr 16, 2024 20:09:02.089090109 CEST5281653192.168.2.41.1.1.1
                  Apr 16, 2024 20:09:03.097940922 CEST5281653192.168.2.41.1.1.1
                  Apr 16, 2024 20:09:04.097817898 CEST5281653192.168.2.41.1.1.1
                  Apr 16, 2024 20:09:06.097735882 CEST5281653192.168.2.41.1.1.1
                  Apr 16, 2024 20:09:06.197458029 CEST53528161.1.1.1192.168.2.4
                  Apr 16, 2024 20:09:06.197501898 CEST53528161.1.1.1192.168.2.4
                  Apr 16, 2024 20:09:06.197535992 CEST53528161.1.1.1192.168.2.4
                  Apr 16, 2024 20:09:06.202701092 CEST53528161.1.1.1192.168.2.4
                  Apr 16, 2024 20:09:11.209065914 CEST6289153192.168.2.41.1.1.1
                  Apr 16, 2024 20:09:11.539151907 CEST53628911.1.1.1192.168.2.4
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Apr 16, 2024 20:09:02.089090109 CEST192.168.2.41.1.1.10x4a0dStandard query (0)window10.duckdns.orgA (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:03.097940922 CEST192.168.2.41.1.1.10x4a0dStandard query (0)window10.duckdns.orgA (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:04.097817898 CEST192.168.2.41.1.1.10x4a0dStandard query (0)window10.duckdns.orgA (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:06.097735882 CEST192.168.2.41.1.1.10x4a0dStandard query (0)window10.duckdns.orgA (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:11.209065914 CEST192.168.2.41.1.1.10xc965Standard query (0)window10.duckdns.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Apr 16, 2024 20:09:06.197458029 CEST1.1.1.1192.168.2.40x4a0dServer failure (2)window10.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:06.197501898 CEST1.1.1.1192.168.2.40x4a0dServer failure (2)window10.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:06.197535992 CEST1.1.1.1192.168.2.40x4a0dServer failure (2)window10.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:06.202701092 CEST1.1.1.1192.168.2.40x4a0dServer failure (2)window10.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:11.539151907 CEST1.1.1.1192.168.2.40xc965No error (0)window10.duckdns.org172.94.39.213A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:14.077347994 CEST1.1.1.1192.168.2.40xb508No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.63.34A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:14.077347994 CEST1.1.1.1192.168.2.40xb508No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.50.40A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:14.077347994 CEST1.1.1.1192.168.2.40xb508No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.50.39A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:14.077347994 CEST1.1.1.1192.168.2.40xb508No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.55.36A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:14.077347994 CEST1.1.1.1192.168.2.40xb508No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.51.27A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:14.077347994 CEST1.1.1.1192.168.2.40xb508No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.50.41A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:14.077347994 CEST1.1.1.1192.168.2.40xb508No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.48.36A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:09:14.077347994 CEST1.1.1.1192.168.2.40xb508No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.53.34A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:10:14.312493086 CEST1.1.1.1192.168.2.40x1844No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                  Apr 16, 2024 20:10:14.312493086 CEST1.1.1.1192.168.2.40x1844No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:20:08:55
                  Start date:16/04/2024
                  Path:C:\Users\user\Desktop\bUAB.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\bUAB.exe"
                  Imagebase:0x3b0000
                  File size:48'640 bytes
                  MD5 hash:E3A50CD4B0D687DE0371979907EECEC8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2909667773.00000000007FE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.2910315909.00000000029C3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2910315909.00000000029C3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000000.1660518176.00000000003B2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2909667773.0000000000807000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2912273923.000000001AFA6000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2910315909.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 00000000.00000002.2910315909.0000000002743000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2910315909.0000000002743000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:23.1%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:5
                    Total number of Limit Nodes:1
                    execution_graph 4444 7ffd9b8a7fbd 4446 7ffd9b8a7fcb 4444->4446 4445 7ffd9b8a7f8d 4446->4445 4447 7ffd9b8a8072 VirtualProtect 4446->4447 4448 7ffd9b8a80ab 4447->4448

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 15 7ffd9b8a0600-7ffd9b8a83c2 23 7ffd9b8a83c8-7ffd9b8a844e 15->23 24 7ffd9b8a8601-7ffd9b8a8642 call 7ffd9b8a7840 15->24 47 7ffd9b8a844f-7ffd9b8a846d 23->47 32 7ffd9b8a8657-7ffd9b8a8660 24->32 33 7ffd9b8a8644-7ffd9b8a8655 24->33 36 7ffd9b8a8668-7ffd9b8a8684 32->36 33->36 42 7ffd9b8a8686-7ffd9b8a8697 36->42 43 7ffd9b8a8699-7ffd9b8a869e 36->43 46 7ffd9b8a86a5-7ffd9b8a870b call 7ffd9b8a7850 call 7ffd9b8a7860 42->46 43->46 67 7ffd9b8a8711-7ffd9b8a875d 46->67 68 7ffd9b8a8792 46->68 55 7ffd9b8a8533 47->55 56 7ffd9b8a8473-7ffd9b8a84ad 47->56 58 7ffd9b8a8538-7ffd9b8a855f 55->58 56->47 64 7ffd9b8a84af-7ffd9b8a8520 56->64 78 7ffd9b8a8561-7ffd9b8a856f 58->78 64->55 99 7ffd9b8a8522-7ffd9b8a852d 64->99 67->68 95 7ffd9b8a875f-7ffd9b8a878b 67->95 71 7ffd9b8a8797-7ffd9b8a87bf 68->71 97 7ffd9b8a87c1-7ffd9b8a87d8 call 7ffd9b8a8b55 71->97 83 7ffd9b8a85e5-7ffd9b8a85fc 78->83 84 7ffd9b8a8571-7ffd9b8a858b 78->84 92 7ffd9b8a87d9-7ffd9b8a87ea 83->92 84->92 93 7ffd9b8a8591-7ffd9b8a85ac 84->93 102 7ffd9b8a87f0-7ffd9b8a88de call 7ffd9b8a7870 call 7ffd9b8a7880 92->102 103 7ffd9b8a8b11-7ffd9b8a8b24 92->103 100 7ffd9b8a85b4-7ffd9b8a85c5 93->100 95->71 106 7ffd9b8a878d-7ffd9b8a8790 95->106 97->92 99->58 104 7ffd9b8a852f-7ffd9b8a8531 99->104 112 7ffd9b8a85c7 100->112 113 7ffd9b8a85cc-7ffd9b8a85de 100->113 102->55 129 7ffd9b8a88e4-7ffd9b8a8945 call 7ffd9b8a7830 call 7ffd9b8a0628 102->129 104->78 106->97 112->92 113->93 116 7ffd9b8a85e0 113->116 116->92 136 7ffd9b8a894a-7ffd9b8a8964 129->136 136->103
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2913754056.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_bUAB.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,
                    • API String ID: 0-3772416878
                    • Opcode ID: 583e59fd460670c36c0d00ad8e65a61e612636d5624d84ae2ef6d051eb5fb2a3
                    • Instruction ID: 40a9f1ef75a1966d6c8ed191fdc823d2e2f552f2f8d9a1fad001abf544a5f254
                    • Opcode Fuzzy Hash: 583e59fd460670c36c0d00ad8e65a61e612636d5624d84ae2ef6d051eb5fb2a3
                    • Instruction Fuzzy Hash: DC12B430B1990A4FEB98FB689875AB973E2FF58310F55057DE01EC32D6DE38A8428751
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 563 7ffd9b8a59a6-7ffd9b8a59b3 564 7ffd9b8a59b5-7ffd9b8a59bd 563->564 565 7ffd9b8a59be-7ffd9b8a5a87 563->565 564->565 569 7ffd9b8a5a89-7ffd9b8a5a92 565->569 570 7ffd9b8a5af3 565->570 569->570 571 7ffd9b8a5a94-7ffd9b8a5aa0 569->571 572 7ffd9b8a5af5-7ffd9b8a5b1a 570->572 573 7ffd9b8a5ad9-7ffd9b8a5af1 571->573 574 7ffd9b8a5aa2-7ffd9b8a5ab4 571->574 579 7ffd9b8a5b86 572->579 580 7ffd9b8a5b1c-7ffd9b8a5b25 572->580 573->572 575 7ffd9b8a5ab6 574->575 576 7ffd9b8a5ab8-7ffd9b8a5acb 574->576 575->576 576->576 578 7ffd9b8a5acd-7ffd9b8a5ad5 576->578 578->573 581 7ffd9b8a5b88-7ffd9b8a5c30 579->581 580->579 582 7ffd9b8a5b27-7ffd9b8a5b33 580->582 593 7ffd9b8a5c9e 581->593 594 7ffd9b8a5c32-7ffd9b8a5c3c 581->594 583 7ffd9b8a5b35-7ffd9b8a5b47 582->583 584 7ffd9b8a5b6c-7ffd9b8a5b84 582->584 585 7ffd9b8a5b49 583->585 586 7ffd9b8a5b4b-7ffd9b8a5b5e 583->586 584->581 585->586 586->586 588 7ffd9b8a5b60-7ffd9b8a5b68 586->588 588->584 596 7ffd9b8a5ca0-7ffd9b8a5cc9 593->596 594->593 595 7ffd9b8a5c3e-7ffd9b8a5c4b 594->595 597 7ffd9b8a5c4d-7ffd9b8a5c5f 595->597 598 7ffd9b8a5c84-7ffd9b8a5c9c 595->598 603 7ffd9b8a5ccb-7ffd9b8a5cd6 596->603 604 7ffd9b8a5d33 596->604 599 7ffd9b8a5c61 597->599 600 7ffd9b8a5c63-7ffd9b8a5c76 597->600 598->596 599->600 600->600 602 7ffd9b8a5c78-7ffd9b8a5c80 600->602 602->598 603->604 606 7ffd9b8a5cd8-7ffd9b8a5ce6 603->606 605 7ffd9b8a5d35-7ffd9b8a5dc6 604->605 614 7ffd9b8a5dcc-7ffd9b8a5ddb 605->614 607 7ffd9b8a5ce8-7ffd9b8a5cfa 606->607 608 7ffd9b8a5d1f-7ffd9b8a5d31 606->608 610 7ffd9b8a5cfc 607->610 611 7ffd9b8a5cfe-7ffd9b8a5d11 607->611 608->605 610->611 611->611 612 7ffd9b8a5d13-7ffd9b8a5d1b 611->612 612->608 615 7ffd9b8a5ddd 614->615 616 7ffd9b8a5de3-7ffd9b8a5e48 call 7ffd9b8a5e64 614->616 615->616 623 7ffd9b8a5e4a 616->623 624 7ffd9b8a5e4f-7ffd9b8a5e63 616->624 623->624
                    Memory Dump Source
                    • Source File: 00000000.00000002.2913754056.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_bUAB.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1277d236e9e33972b055ea9509751e0c3aa2a7855b312451234c59c4fb0c2da2
                    • Instruction ID: 02e5711908e04f6258caae133e096025dcbcfabc72712744bd5d6bad707ba715
                    • Opcode Fuzzy Hash: 1277d236e9e33972b055ea9509751e0c3aa2a7855b312451234c59c4fb0c2da2
                    • Instruction Fuzzy Hash: E0F1A830A0DA8D8FEBA8DF28D8557E937D1FF58310F04426EE84DC7295DB74A9858782
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 625 7ffd9b8a6752-7ffd9b8a675f 626 7ffd9b8a676a-7ffd9b8a6837 625->626 627 7ffd9b8a6761-7ffd9b8a6769 625->627 631 7ffd9b8a6839-7ffd9b8a6842 626->631 632 7ffd9b8a68a3 626->632 627->626 631->632 634 7ffd9b8a6844-7ffd9b8a6850 631->634 633 7ffd9b8a68a5-7ffd9b8a68ca 632->633 641 7ffd9b8a6936 633->641 642 7ffd9b8a68cc-7ffd9b8a68d5 633->642 635 7ffd9b8a6889-7ffd9b8a68a1 634->635 636 7ffd9b8a6852-7ffd9b8a6864 634->636 635->633 637 7ffd9b8a6866 636->637 638 7ffd9b8a6868-7ffd9b8a687b 636->638 637->638 638->638 640 7ffd9b8a687d-7ffd9b8a6885 638->640 640->635 643 7ffd9b8a6938-7ffd9b8a695d 641->643 642->641 644 7ffd9b8a68d7-7ffd9b8a68e3 642->644 650 7ffd9b8a69cb 643->650 651 7ffd9b8a695f-7ffd9b8a6969 643->651 645 7ffd9b8a68e5-7ffd9b8a68f7 644->645 646 7ffd9b8a691c-7ffd9b8a6934 644->646 648 7ffd9b8a68f9 645->648 649 7ffd9b8a68fb-7ffd9b8a690e 645->649 646->643 648->649 649->649 652 7ffd9b8a6910-7ffd9b8a6918 649->652 654 7ffd9b8a69cd-7ffd9b8a69fb 650->654 651->650 653 7ffd9b8a696b-7ffd9b8a6978 651->653 652->646 655 7ffd9b8a697a-7ffd9b8a698c 653->655 656 7ffd9b8a69b1-7ffd9b8a69c9 653->656 661 7ffd9b8a6a6b 654->661 662 7ffd9b8a69fd-7ffd9b8a6a08 654->662 657 7ffd9b8a698e 655->657 658 7ffd9b8a6990-7ffd9b8a69a3 655->658 656->654 657->658 658->658 660 7ffd9b8a69a5-7ffd9b8a69ad 658->660 660->656 664 7ffd9b8a6a6d-7ffd9b8a6b45 661->664 662->661 663 7ffd9b8a6a0a-7ffd9b8a6a18 662->663 665 7ffd9b8a6a1a-7ffd9b8a6a2c 663->665 666 7ffd9b8a6a51-7ffd9b8a6a69 663->666 674 7ffd9b8a6b4b-7ffd9b8a6b5a 664->674 667 7ffd9b8a6a2e 665->667 668 7ffd9b8a6a30-7ffd9b8a6a43 665->668 666->664 667->668 668->668 670 7ffd9b8a6a45-7ffd9b8a6a4d 668->670 670->666 675 7ffd9b8a6b5c 674->675 676 7ffd9b8a6b62-7ffd9b8a6bc4 call 7ffd9b8a6be0 674->676 675->676 683 7ffd9b8a6bc6 676->683 684 7ffd9b8a6bcb-7ffd9b8a6bdf 676->684 683->684
                    Memory Dump Source
                    • Source File: 00000000.00000002.2913754056.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_bUAB.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aa55c422a96f0274a61ff159f57c5f960620638b969f4bb8fb3af031ffc17d68
                    • Instruction ID: 8d860c2729537c68f86df90057621b5cce437d491b281946f6b81316ab960f95
                    • Opcode Fuzzy Hash: aa55c422a96f0274a61ff159f57c5f960620638b969f4bb8fb3af031ffc17d68
                    • Instruction Fuzzy Hash: D0E1E670A09A4E8FEBA8DF28C8557E977D1FF58310F04826ED84DC72A5CF74A9418781
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2913754056.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_bUAB.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: 885867b0bbdd49c51c5fb7ed4bb5fb8b90731d5aa7e1b8a78b2c48cb5697e0c5
                    • Instruction ID: bc6b9f4418c27849d6c812dace07685d0b11066e38c32035e86412541f3095f5
                    • Opcode Fuzzy Hash: 885867b0bbdd49c51c5fb7ed4bb5fb8b90731d5aa7e1b8a78b2c48cb5697e0c5
                    • Instruction Fuzzy Hash: B0411931A0D78C4FDB1D9BA898566F97BE0EF96321F0442AFD089C3192DA756406C792
                    Uniqueness

                    Uniqueness Score: -1.00%