Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe
Analysis ID:1427718
MD5:80c97cfbc49ce4c6f39493ab42edb7aa
SHA1:8974e0027f4002b916d771c7a440a207e7c9c102
SHA256:232be72fe20e9d89ac11dddc9ff262fe283044e37ad9abd2a076b784a8e8fa4c
Tags:exe
Infos:

Detection

Customer Loader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Customer Loader
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe PID: 3060JoeSecurity_CustomerLoaderYara detected Customer LoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeReversingLabs: Detection: 87%
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeJoe Sandbox ML: detected
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: unknownDNS traffic detected: query: kyliansuperm92139124.shop replaycode: Server failure (2)
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownDNS traffic detected: queries for: kyliansuperm92139124.shop
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2076741590.000001E221723000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.mic
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2077669632.000001E223251000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2077669632.000001E2232EA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2077669632.000001E223251000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://kyliansuperm92139124.shop
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2077669632.000001E223251000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://kyliansuperm92139124.shop/customer/809
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeStatic PE information: No import functions for PE file found
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000000.1984123602.000001E221502000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, .csCryptographic APIs: 'CreateDecryptor'
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, .csCryptographic APIs: 'TransformFinalBlock'
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, .csBase64 encoded string: 'wptFkG0ATOUpMhL79wADQIlA3Wv41kVfbeMWaWFijOya0ybGEH5tlNtP74JTZbB0'
    Source: classification engineClassification label: mal60.troj.winEXE@1/1@4/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe.logJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeMutant created: NULL
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeReversingLabs: Detection: 87%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeSection loaded: wintypes.dllJump to behavior
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe PID: 3060, type: MEMORYSTR
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeMemory allocated: 1E221850000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeMemory allocated: 1E23B250000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe TID: 3012Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe TID: 2136Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2076741590.000001E221723000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Non-Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Disable or Modify Tools
    LSASS Memory31
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager12
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Deobfuscate/Decode Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe88%ReversingLabsByteCode-MSIL.Trojan.FormBook
    SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://go.mic0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    kyliansuperm92139124.shop
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://kyliansuperm92139124.shop/customer/809SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2077669632.000001E223251000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        https://kyliansuperm92139124.shopSecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2077669632.000001E2232EA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2077669632.000001E223251000.00000004.00000800.00020000.00000000.sdmpfalse
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2077669632.000001E223251000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://go.micSecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, 00000000.00000002.2076741590.000001E221723000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            No contacted IP infos
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1427718
            Start date and time:2024-04-18 01:38:10 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 2m 4s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:2
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe
            Detection:MAL
            Classification:mal60.troj.winEXE@1/1@4/0
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 92%
            • Number of executed functions: 11
            • Number of non-executed functions: 2
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe
            • Execution Graph export aborted for target SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe, PID 3060 because it is empty
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe
            TimeTypeDescription
            01:39:05API Interceptor1x Sleep call for process: SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe modified
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):1595
            Entropy (8bit):5.377564997193075
            Encrypted:false
            SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6o6+vxp3/ellHitHTHhAHKKkb:iq+wmj0qCYqGSI6o9Zp/ellCtzHeqKkb
            MD5:835643C20308DFEAFD3D5C51436A1280
            SHA1:AC4538941A2BCEEBF9753C44E123856793B9A37A
            SHA-256:6C28D1EE9502A5C036C3C97A4AD1DE177C76B798A1D0C72FAB1D2D7EE13F6A2A
            SHA-512:6D7DFE1D849BF76190E3CFD9EAEA2F5168563BB485FBB73860F7BD24E900BF8D873D35F558F671AEA2D05A64928FFB62E455008044C5E9BA143D3ACB06489BA0
            Malicious:false
            Reputation:low
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64
            File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
            Entropy (8bit):5.474775847499785
            TrID:
            • Win64 Executable GUI (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe
            File size:11'264 bytes
            MD5:80c97cfbc49ce4c6f39493ab42edb7aa
            SHA1:8974e0027f4002b916d771c7a440a207e7c9c102
            SHA256:232be72fe20e9d89ac11dddc9ff262fe283044e37ad9abd2a076b784a8e8fa4c
            SHA512:fefbb1a9f3364b9cd0d8d0cd81bb6b60925cac2904a049dae66eee0e2706693a4b468616d9f9edd457676b850357b1431dd68309399f4755f31af6cb2354cf26
            SSDEEP:192:s9G4Jor9ckjb6BmdOsIJqQmhZ6R5V8mfLmRWWbnC3LgzgF1X:p5r9ckjOSOsIgv6R/oFYgzgz
            TLSH:0F322C04EFEC4627E5A7137CC99752C11B3DBA7B6603FB1FAA8C60961C8138456937B2
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...mj.d.........."...0.d................ ....@...... .......................`............`................................
            Icon Hash:00928e8e8686b000
            Entrypoint:0x400000
            Entrypoint Section:
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x64A56A6D [Wed Jul 5 13:04:45 2023 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:
            Instruction
            dec ebp
            pop edx
            nop
            add byte ptr [ebx], al
            add byte ptr [eax], al
            add byte ptr [eax+eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x904.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x1e640x20003c2c790ade67a2704ec7671f6d51f0ecFalse0.556396484375data5.610155213128363IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rsrc0x40000x9040xa00daa8861bde88ecf690bfb42423907e6aFalse0.328515625data4.903545442149542IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_GROUP_ICON0x41000x6data1.8333333333333333
            RT_VERSION0x41080x308data0.6018041237113402
            RT_VERSION0x44100x308dataEnglishUnited States0.6095360824742269
            RT_MANIFEST0x47180x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Apr 18, 2024 01:38:57.129867077 CEST5101053192.168.2.51.1.1.1
            Apr 18, 2024 01:38:58.124039888 CEST5101053192.168.2.51.1.1.1
            Apr 18, 2024 01:38:59.140032053 CEST5101053192.168.2.51.1.1.1
            Apr 18, 2024 01:39:01.155487061 CEST5101053192.168.2.51.1.1.1
            Apr 18, 2024 01:39:03.152612925 CEST53510101.1.1.1192.168.2.5
            Apr 18, 2024 01:39:03.152734041 CEST53510101.1.1.1192.168.2.5
            Apr 18, 2024 01:39:03.152741909 CEST53510101.1.1.1192.168.2.5
            Apr 18, 2024 01:39:03.152987957 CEST53510101.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Apr 18, 2024 01:38:57.129867077 CEST192.168.2.51.1.1.10xd810Standard query (0)kyliansuperm92139124.shopA (IP address)IN (0x0001)false
            Apr 18, 2024 01:38:58.124039888 CEST192.168.2.51.1.1.10xd810Standard query (0)kyliansuperm92139124.shopA (IP address)IN (0x0001)false
            Apr 18, 2024 01:38:59.140032053 CEST192.168.2.51.1.1.10xd810Standard query (0)kyliansuperm92139124.shopA (IP address)IN (0x0001)false
            Apr 18, 2024 01:39:01.155487061 CEST192.168.2.51.1.1.10xd810Standard query (0)kyliansuperm92139124.shopA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Apr 18, 2024 01:39:03.152612925 CEST1.1.1.1192.168.2.50xd810Server failure (2)kyliansuperm92139124.shopnonenoneA (IP address)IN (0x0001)false
            Apr 18, 2024 01:39:03.152734041 CEST1.1.1.1192.168.2.50xd810Server failure (2)kyliansuperm92139124.shopnonenoneA (IP address)IN (0x0001)false
            Apr 18, 2024 01:39:03.152741909 CEST1.1.1.1192.168.2.50xd810Server failure (2)kyliansuperm92139124.shopnonenoneA (IP address)IN (0x0001)false
            Apr 18, 2024 01:39:03.152987957 CEST1.1.1.1192.168.2.50xd810Server failure (2)kyliansuperm92139124.shopnonenoneA (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:01:38:55
            Start date:18/04/2024
            Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.24833.2705.exe"
            Imagebase:0x1e221500000
            File size:11'264 bytes
            MD5 hash:80C97CFBC49CE4C6F39493AB42EDB7AA
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Reset < >
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID: Z%3
              • API String ID: 0-492248033
              • Opcode ID: 8aac46eab6d03055055705874a3c444810b1ddd80b10547e87a64c658b7f9a39
              • Instruction ID: 3f680b8a4c3cb7279125952685edf32bf5d7fdaca09246508e6202431466277f
              • Opcode Fuzzy Hash: 8aac46eab6d03055055705874a3c444810b1ddd80b10547e87a64c658b7f9a39
              • Instruction Fuzzy Hash: 29D19231A1D98A4FE788EBA894046AABBE1FF55740F1441BAD009D72C7CB35EC46C785
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID: Z%3
              • API String ID: 0-492248033
              • Opcode ID: baaee9bcc629014beda4cecfdfc38df76d88b0093f0b833b022db5687f6f28fa
              • Instruction ID: c650fc45a328e73b34306077058318c2b98e1c4fad6a94838df748da52bfdac7
              • Opcode Fuzzy Hash: baaee9bcc629014beda4cecfdfc38df76d88b0093f0b833b022db5687f6f28fa
              • Instruction Fuzzy Hash: CFC16430A1994E8FDB88FF18C451AAA77E2FF98344F504569D41EC72C6CE39E951CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4a2b7a7d7cb634000e2b2ec29b795c64393eb9ceec4aee5ac9936f4fff6427b8
              • Instruction ID: 217456027849fc0a5ad0feb1719c7e26ce70b5ea3b88e86004df85372c56abda
              • Opcode Fuzzy Hash: 4a2b7a7d7cb634000e2b2ec29b795c64393eb9ceec4aee5ac9936f4fff6427b8
              • Instruction Fuzzy Hash: AE51D232D0D9AA4FE7A5BB2898152B977D0FFD5394F4402BAD84DC71C2EF282D068785
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dff179874697b83f31c207ee728672ec64bcbfc36bcb94489195a419675a4ab9
              • Instruction ID: 65aebc2d9efe926f06095e1c6bbcd98a01d44eb03e00ee6a1e7d822c3244b59a
              • Opcode Fuzzy Hash: dff179874697b83f31c207ee728672ec64bcbfc36bcb94489195a419675a4ab9
              • Instruction Fuzzy Hash: FB51A930A1D95A5FE789FF24C462AAA77E2FF94340F50407AD409C72C6CE39AD41C750
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 71f3597e0a67aa3fabf3bfb0f7ba72dab278e3371014f9e9b32a6bcfc0edde3d
              • Instruction ID: a5c51935247419bb507df32d312a318493967627103ceda548a88a17ec36f92b
              • Opcode Fuzzy Hash: 71f3597e0a67aa3fabf3bfb0f7ba72dab278e3371014f9e9b32a6bcfc0edde3d
              • Instruction Fuzzy Hash: FD21C272D0D6899FE706AB3484652EDBFB0EF56340F0440BFD485C62E3DA6C164ACB91
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c13e872773e28e9dfc550d0014c1a665d0134639d1f9c6b49bcab9e4a2d0bc7b
              • Instruction ID: e91ba6bc1b7d1ec55f06538074856df6c64fb1cc69e431886a0c0e3c6cbf5006
              • Opcode Fuzzy Hash: c13e872773e28e9dfc550d0014c1a665d0134639d1f9c6b49bcab9e4a2d0bc7b
              • Instruction Fuzzy Hash: 8811B136D1C96A8EF7B4B724D8152BA72D1EFC83A0F440179E85DD35C2EF282C0A8685
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6afada4e1f3d85c5f82545216f27c489110f404a68d8299edb697a951398ca15
              • Instruction ID: 9add5733d41befdee3b44ccd9e69d80475bbae4cc8507a4ac48e04f694aed155
              • Opcode Fuzzy Hash: 6afada4e1f3d85c5f82545216f27c489110f404a68d8299edb697a951398ca15
              • Instruction Fuzzy Hash: 0E01713170C9494FCB85EB2CD469F547BE1FFA9310B4A01E6E009CB2A7DA28DC85C792
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b5425bb4bfa97a62b928f31d3d56b79f39a06d0b220d191db04323a421eb6882
              • Instruction ID: ff821124100d9059b522484b08adef56a1e6c2e99091d39ac4913cf515d1b10c
              • Opcode Fuzzy Hash: b5425bb4bfa97a62b928f31d3d56b79f39a06d0b220d191db04323a421eb6882
              • Instruction Fuzzy Hash: E201A43290EBD55FD38AA77C98256603FA0EF87660F0D41EBE089C71D7DA486C858396
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8e9d7e97b461fd48cb5efb1ebd3ce5848ca25f7ea2ea9a77554ecff5100f9372
              • Instruction ID: bab3bfa1f66be9bdd954907952c288ee53e7d84800d2cbc51e9c71210954f34d
              • Opcode Fuzzy Hash: 8e9d7e97b461fd48cb5efb1ebd3ce5848ca25f7ea2ea9a77554ecff5100f9372
              • Instruction Fuzzy Hash: 4BF0C821D0E9961FE295B77444266B4EAE4DF86240F4911FDD44CC71D3DD0C2D848356
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b1217242905d1669e83a31e4978f1959f3a7010f7c7529c30f296186dd7db2a0
              • Instruction ID: 5e09c449f42fc37782d23a199fc9bdd5c269db5df0f8ecff213a8e58119b9a02
              • Opcode Fuzzy Hash: b1217242905d1669e83a31e4978f1959f3a7010f7c7529c30f296186dd7db2a0
              • Instruction Fuzzy Hash: DFF08221E0E85A5FE6D9B37814262B8A6C4EF8A280F4914BAE44DD71C7DD0D2C848289
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 448ec7efbf88589ae27bc9572f60233cdd874db773a503942f2740beb66f0f9f
              • Instruction ID: a1cfa4edeacf2e7946a0ec88be5d6526354a35c51db4be33567b3cadacebd32f
              • Opcode Fuzzy Hash: 448ec7efbf88589ae27bc9572f60233cdd874db773a503942f2740beb66f0f9f
              • Instruction Fuzzy Hash: 49C08C3004AD8B8BC68CEA44CC5116A72E2FFD8204FC0046CE08ED2290CAAF5981C702
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID: [($!c($"k($(O_^
              • API String ID: 0-3179932953
              • Opcode ID: 85893a7886dcb8a5c32eed30f59f5a7bfa408dbed646b0e7cbba72793644e8dd
              • Instruction ID: 3da73c61437779fa74845e301fdfe6a67b77d134b375c2fbc502a28c470acc38
              • Opcode Fuzzy Hash: 85893a7886dcb8a5c32eed30f59f5a7bfa408dbed646b0e7cbba72793644e8dd
              • Instruction Fuzzy Hash: 7C11911F736E2296850077BEB0441D957D4EBD9277B884A37C344CE183DA58A8CA83F9
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2078601264.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848f10000_SecuriteInfo.jbxd
              Similarity
              • API ID:
              • String ID: [($!c($"k($(O_^
              • API String ID: 0-3179932953
              • Opcode ID: 0c611c2cce40a4b8e91acadeeede7804f593ab7148e1963e48919183df011bd9
              • Instruction ID: aa6dbcec87045902d2a1cde36b73a13e17a2aac2386844ce231b1591cf4ef204
              • Opcode Fuzzy Hash: 0c611c2cce40a4b8e91acadeeede7804f593ab7148e1963e48919183df011bd9
              • Instruction Fuzzy Hash: 3111A30773AA77964600767E74811D953D4FED5276B894737D248CE1839A0868CA82F9
              Uniqueness

              Uniqueness Score: -1.00%